Must See Resources

Welcome to our cloud security resource center! We hope you find something interesting to read, watch, and share with your colleagues.

  • Cloud Security Threat Briefing

    Cloud Security Threat Briefing

    Read Content
  • Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

    Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

    Learn how to secure cloud-native applications with a comprehensive and proactive approach

    Read Content
  • Overseeing and Maintaining an AWS Cloud Environment With Threat Stack - Lola1:26

    Overseeing and Maintaining an AWS Cloud Environment With Threat Stack - Lola

    <p>With Threat Stack, you can manage all your agents to see the tasks they’re performing while being able to spot any irregularities in your network. Threat Stack gives you easy access to any inciden

    Watch Video
  • Scaling Your Business Alongside Your AWS Cloud Security Infrastructure - Conga1:41

    Scaling Your Business Alongside Your AWS Cloud Security Infrastructure - Conga

    <p>As your business grows, it can be difficult to keep your network secure. Threat Stack works with your company to help you achieve your business and security goals. Ensure that your customers feel s

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

    How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

    Learn how OneLogin saves DevOps time, money, and resources with Threat Stack on AWS public cloud.

    Read Content
  • Stratasan Case Study

    Stratasan Case Study

    Read Content
  • JASK and Threat Stack

    JASK and Threat Stack

    Read Content
  • Threat Stack Customer Stories2:09

    Threat Stack Customer Stories

    Watch Video
  • Cloud Security Observability & Incident Response in an AWS Environment w/ Threat Stack & Red Canary1:36

    Cloud Security Observability & Incident Response in an AWS Environment w/ Threat Stack & Red Canary

    Watch Video
  • How SailPoint Secures Containerized Infrastructure on AWS Cloud36:01

    How SailPoint Secures Containerized Infrastructure on AWS Cloud

    Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

    Watch Video
  • Inside an Active Shellbot Cryptomining Malware Campaign23:00

    Inside an Active Shellbot Cryptomining Malware Campaign

    Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

    Watch Video
  • Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

    Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

    Security Observability and outlines six principles that will help you create a roadmap for modernizing your monitoring and controls and proactively managing risk within modern cloud-native environment

    Read Content
  • Anatomy of a Threat Stack Insight Report

    Anatomy of a Threat Stack Insight Report

    View Infographic
  • Continuing Evolution of The Shellbot Malware

    Continuing Evolution of The Shellbot Malware

    Threat Stack’s latest SOC report provides an in-depth analysis of this new variant of the ongoing, persistent Shellbot cyrptomining campaign.

    Read Content
  • Threat Stack Testimonial - SecOps Services0:59

    Threat Stack Testimonial - SecOps Services

    Watch Video
  • Identifying the Best Cloud Service Providers

    Identifying the Best Cloud Service Providers

    How do you choose a public cloud provider — or if you’re planning to go multi-cloud — cloud providers?

    View Infographic
  • How to Achieve SOC 2 Compliance in a Containerized  Environment58:50

    How to Achieve SOC 2 Compliance in a Containerized Environment

    Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers

    Watch Video
  • Build-Time Security: Securing Your CI/CD Pipeline

    Build-Time Security: Securing Your CI/CD Pipeline

    Learn about the risks associated with build-servers and CI/CD processes across ephemeral infrastructures

    Read Content
  • Anatomy of a Threat Stack Oversight Notification

    Anatomy of a Threat Stack Oversight Notification

    View Infographic
  • Threat Stack Testimonial - Darran Rolls, SailPoint2:36

    Threat Stack Testimonial - Darran Rolls, SailPoint

    Watch Video
  • Data Portability

    Data Portability

    Read Content
  • loading
    Loading More...