Kevin Durkin

  • How to Answer Tough Board-Level Security & Compliance Questions in 2018

    How to Answer Tough Board-Level Security & Compliance Questions in 2018

    GDPR. Meltdown. Spectre. SOC 2. Coming at you like mosquitos on a hot summer night, these topics are of top concern for board members and security teams alike this year. But what do you do when...

    Read Article
  • How to Obtain Buy-in on Security Initiatives for Your SaaS Company

    How to Obtain Buy-in on Security Initiatives for Your SaaS Company

    Strong security is vital to any SaaS company, enabling platform stability and integrity while instilling confidence in potential customers. There’s nothing new in this statement, but, with an eye...

    Read Article
  • How to Cut Time-to-Security-Incident-Detection on AWS

    How to Cut Time-to-Security-Incident-Detection on AWS

    Time-to-detection is everything these days. If you don’t find a breach yourself, chances are someone else will. A recent study points out that up to 27% of breaches are discovered by third...

    Read Article
  • 10 Best Practices for Securing Your Workloads on AWS

    10 Best Practices for Securing Your Workloads on AWS

    Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security implementations meant to fight them off. To help...

    Read Article
  • Meeting Compliance in the Cloud ≠ A Choice

    Meeting Compliance in the Cloud ≠ A Choice

    In the past, we’ve talked about various ways that compliance can add value to your business. But what happens when you don’t attain or maintain compliance. (Note: In the following, we focus on...

    Read Article
  • 73% of Companies Have Critical AWS Security Misconfigurations

    73% of Companies Have Critical AWS Security Misconfigurations

    Threat Stack Delivers Wake Up Call Wide open SSH and infrequent software updates among top risks identified in the majority of cloud-based environments How effective are your AWS security...

    Read Article
  • loading
    Loading More...