How to Use Threat Stack to Enable Proactive Security

How to Use Threat Stack to Enable Proactive Security

We recently discussed some pretty sobering statistics in the world of cybersecurity, ranging from astronomical misconfiguration rates to the depressing lack of speed with which breaches are detected. Not only are attacks ...
Access Management Lessons From Timehop’s Cloud Security Breach

Access Management Lessons From Timehop’s Cloud Security Breach

Over the past couple of weeks, both Macy’s and Timehop experienced breaches as a result of authentication weaknesses. On July 4, social media startup Timehop experienced a data breach that affected 21 ...
Three Homegrown SecOps Tools Used by the Threat Stack Team

Three Homegrown SecOps Tools Used by the Threat Stack Team

As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the ...
Profile of an Ideal Security Hire in 2018

Profile of an Ideal Security Hire in 2018

It seems that organizations are finally understanding the importance of bridging the gap between security and operations. In a survey we conducted recently, 85% of respondents said that employing SecOps best practices ...
How to Use Alerts to Become More Proactive About Security

How to Use Alerts to Become More Proactive About Security

We all understand the importance of being proactive about our health. Rather than waiting for symptoms of disease to land us in the ER, we eat healthy, exercise, and see our doctors ...
Understanding Cryptojacking — Why It Matters to You and How to Defend Against It

Understanding Cryptojacking — Why It Matters to You and How to Defend Against It

Security researchers have recently uncovered several high profile cases of cryptojacking involving companies like Tesla and the LA Times. In these incidents, cryptocurrency “miners” illegally gained access to an organization’s public cloud ...
Threat Stack a Four-Time Winner in 2018 Info Security Products Guide’s Global Excellence Awards

Threat Stack a Four-Time Winner in 2018 Info Security Products Guide’s Global Excellence Awards

Threat Stack was honored in four categories as winners of the 14th Annual Info Security PG’s Global Excellence Awards® were announced in San Francisco at a gala attended by finalists, judges, and ...
Three Mistakes Teams Make in Operationalizing Security (and a Better Alternative)

Three Mistakes Teams Make in Operationalizing Security (and a Better Alternative)

With the challenges presented by today’s cloud security landscape, organizations with limited time and resources are taking a variety of approaches in their attempts to incorporate security into their operations practices. Some ...
How to Benchmark Your SecOps Maturity and Make Continuous Improvement

How to Benchmark Your SecOps Maturity and Make Continuous Improvement

Over 50% of companies admit to cutting back on security measures to meet a business deadline or objective, according to our recent SecOps Report. In other words, security is falling by the ...
Threat Stack Launches Cloud SecOps Program

Threat Stack Launches Cloud SecOps Program

Security + Operations — Better Together! Yesterday was a game-changer for Threat Stack and the cybersecurity community! That’s when we launched the Threat Stack Cloud SecOps Program℠, offering a radical transformation in ...