Defining the “Full Stack” in Full Stack Security Observability

Defining the “Full Stack” in Full Stack Security Observability

Here at Threat Stack, we’ve been talking a lot about security observability recently (check out this article and whitepaper). When you design and monitor your systems for security observability, you reduce risk ...
How to Defend Against ZombieLoad

How to Defend Against ZombieLoad

Earlier this week a group of security researchers from Graz University of Technology, imec-DistriNet, KU Leuven, Worcester Polytechnic Institute, and Cyberus Technology identified and analyzed a vulnerability in Intel chips being called ...
Cloud Security Observability: How to Reduce Risk in Your Cloud-Native Infrastructure

Cloud Security Observability: How to Reduce Risk in Your Cloud-Native Infrastructure

Security Observability has become an important concept recently as companies have started building software with a cloud-native mindset, embracing distributed, immutable, and ephemeral systems. As infrastructure has shifted from traditional deployment methods, ...
Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

Modern healthcare is a full participant in the digital economy, and personal health information (PHI) is at its center. But today’s digital landscape is a volatile threat environment where sensitive personal data ...
A Threat Stack SOC Analysis: The Continuing Evolution of the Shellbot Cryptomining Malware

A Threat Stack SOC Analysis: The Continuing Evolution of the Shellbot Cryptomining Malware

Update: Threat Stack to Present Live Threat Briefing On New Cryptomining Shellbot Malware Variant When Live Online, May 16, 2019, 1:00 p.m. ET (or on demand after 45 minutes) About This Threat ...
7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right ...
How to Achieve Full Stack, Multi-Cloud Security Observability

How to Achieve Full Stack, Multi-Cloud Security Observability

You probably know AWS as the leading cloud platform provider. These days, however, many companies are using additional cloud providers as well. According to Gartner’s October 2018 report “Market Insight: Multicloud Becomes ...
How to Track Agent-Based User Activity

How to Track Agent-Based User Activity

More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in ...
How to Understand Your Attacker’s Mindset

How to Understand Your Attacker’s Mindset

In this post we’ll try to develop an understanding of a typical attacker’s mindset and then show you how companies like yours can use this knowledge to enhance their security posture. Before ...
The Economic Impact of Threat Stack – A Forrester Research Study

The Economic Impact of Threat Stack – A Forrester Research Study

Cost Savings and Business Benefits Enabled by Threat Stack When investing in cloud security platforms and services, businesses naturally want to measure ROI beyond number of deterred attacks. After all, effective cloud ...
Loading...