Top Resources

Welcome to our cloud security resource center! We hope you find something interesting to read, watch, and share with your colleagues.

  • SecOps Report: 52% of Companies Sacrifice Cybersecurity for Speed

    SecOps Report: 52% of Companies Sacrifice Cybersecurity for Speed

    Recent Threat Stack survey finds that 52% of companies sacrifice cybersecurity for speed. This report examines why the vision for SecOps hasn’t become a reality at most organizations.

    Read Flipbook
  • Gartner Report: Market Guide for Cloud Workload Protection Platforms

    Read Now
  • Security Tested, Ops Approved: Log Management with Threat Stack and Graylog

    Attend Webinar
  • 4 Things You Need to Know About SOC 2 Compliance

    4 Things You Need to Know About SOC 2 Compliance

    Compliance isn’t as simple as a connect-the-dots exercise. When you consider how fast companies are moving to and expanding on the cloud, alongside the proliferation of cloud-based security...

    Read Article
  • 10 Best Practices for Securing Your Workloads on AWS

    10 Best Practices for Securing Your Workloads on AWS

    Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security implementations meant to fight them off. To help...

    Read Article
  • Pick Any 3: Good, Fast, or Safe. DevOps From Scratch

    Reserve Your Seat
  • Why an Infrastructure Transition is the Perfect Time to Invest in Security

    Why an Infrastructure Transition is the Perfect Time to Invest in Security

    You’re in the midst of an infrastructure transition, and you have a million and one things on your plate. Whether you are deploying containers for the first time or configuring your orchestration...

    Read Article
  • Request a Demo of Threat Stack's Cloud Security Platform

    Get in Touch
  • Security Hunt Challenge: Find the Exploit to Win

    Play Now
  • SecOps Playbook for Cloud Infrastructure

    SecOps Playbook for Cloud Infrastructure

    Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, and improve operational efficiency

    Read Flipbook
  • Build Security into Your Evolving Infrastructure

    Build Security into Your Evolving Infrastructure

    Read Flipbook
  • Gartner CISO Playbook: Retaining Controls in the Cloud

    Read Now
  • The Top 7 AWS Security Issues: What You Need to Know

    The Top 7 AWS Security Issues: What You Need to Know

    Despite the rapidly growing need for cloud-native visibility into behavior and activity across AWS environments, companies are still learning about best practices for AWS security. Amazon Web...

    Read Article
  • How to Achieve Type 2 SOC 2 With Zero Exceptions — Webinar Recap

    How to Achieve Type 2 SOC 2 With Zero Exceptions — Webinar Recap

    SOC 2 compliance is one of the most common customer use cases we come across here at Threat Stack. Developed by the American Institute of CPAs (AICPA), the framework is designed for service...

    Read Article
  • Cyber Attack Simulation: A Crypto Crime in Action24:59

    Cyber Attack Simulation: A Crypto Crime in Action

    See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly identify the attack before it becomes a breach.

    Watch Video
  • Sigstr's Tale of Building Customer Trust and Winning Business through Security with AWS and Threat Stack48:15

    Sigstr's Tale of Building Customer Trust and Winning Business through Security with AWS and Threat Stack

    Learn how Sigstr builds customer trust and wins business through security with AWS and Threat Stack

    Watch Video
  • ZoomInfo Case Study

    ZoomInfo Case Study

    Learn how ZoomInfo tackles cloud infrastructure security, SOC 2, and GDPR by leveraging Threat Stack.

    Read Flipbook
  • Securing Your SaaS Business from the Ground Up

    Securing Your SaaS Business from the Ground Up

    Learn how to create a comprehensive security strategy on AWS for your SaaS Organization – and how Threat Stack can help you figure it all out.

    Read Flipbook
  • How to Build and Mature a SecOps Program in the Cloud39:10

    How to Build and Mature a SecOps Program in the Cloud

    Watch this video for practical advice to help you build and mature a cloud secops program for your organization.

    Watch Video
  • The Threat Stack Cloud SecOps Program℠2:40

    The Threat Stack Cloud SecOps Program℠

    Learn about our three-part program to unify Security and Operations to make security a competitive differentiator.

    Watch Video
  • Threat Stack Corporate Overview

    Threat Stack Corporate Overview

    Read Flipbook
  • Threat Stack Cloud SecOps Program℠ Datasheet

    Threat Stack Cloud SecOps Program℠ Datasheet

    Learn about our three-part program to unify Security and Operations to make security a competitive differentiator.

    Read Flipbook
  • Pick Any Three: Good, Fast, or Safe. DevOps from Scratch39:52

    Pick Any Three: Good, Fast, or Safe. DevOps from Scratch

    Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality while maintaining quality & security through DevOps

    Watch Video
  • How Threat Stack Passed SOC 2 with Zero Exceptions

    How Threat Stack Passed SOC 2 with Zero Exceptions

    Learn how Threat Stack leveraged Threat Stack and refined SecOps practices to achieve SOC 2 with zero exceptions.

    Read Flipbook
  • How to Achieve Type 2 SOC 2 with Zero Exceptions45:08

    How to Achieve Type 2 SOC 2 with Zero Exceptions

    Do you have the chops needed to pass Type 2 SOC 2 with zero exceptions? Watch this video for advice from our Head of Ops and Sr. Infrastructure Security Engineer who recently went through the process.

    Watch Video
  • Security Practices Guide for SOC 2 Compliance

    Security Practices Guide for SOC 2 Compliance

    Looking to achieve SOC 2 Compliance? Check out this guide to learn about the essential security practices needed to meet its requirements.

    Read Flipbook
  • 52% of Companies Sacrifice Cybersecurity for Speed45:54

    52% of Companies Sacrifice Cybersecurity for Speed

    Recent Threat Stack survey finds that over 50% of companies cut back on security to meet a business objective. Watch this webinar to learn about the misalignment and how you can overcome the obstacles

    Watch Video
  • loading
    Loading More...