Application Security

Find out more about the world of application security and how Threat Stack can help you secure the top layer of your stack.

  • Attack Simulation: Deconstructing an Attack in a Containerized Application30:20

    Attack Simulation: Deconstructing an Attack in a Containerized Application

    Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the cloud management console.

    Watch Video
  • 8 Best Practices for Strengthening Security in Cloud-Native Environments

    8 Best Practices for Strengthening Security in Cloud-Native Environments

    Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and other well-known benefits. But there are still plenty...

    View Infographic
  • Ten Application Security Terms That Every Developer Should Know

    Ten Application Security Terms That Every Developer Should Know

    A few months ago I gave a talk about securing microservices at the Boston Cloud Native Computing Meetup. After the presentation, a young developer (a recent college grad) came up to me and said,...

    View Infographic
  • Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

    Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

    Learn how to secure cloud-native applications with a comprehensive and proactive approach

    Read Content
  • Stretch Right With Threat Stack Application Security Monitoring

    Stretch Right With Threat Stack Application Security Monitoring

    In our last post, we explored how Threat Stack’s Application Security Monitoring embeds security in development processes — without negatively impacting agility or speed of application development...

    View Infographic
  • 16 Cloud Security Experts Share the Most Costly Security Technology Misconceptions When It Comes to Cloud Migration

    16 Cloud Security Experts Share the Most Costly Security Technology Misconceptions When It Comes to Cloud Migration

    More companies are migrating their infrastructure to the cloud to take advantage of benefits like reliability, scalability, and lower costs, but cloud migration remains a complex task requiring...

    View Infographic
  • Stretching Left With Threat Stack Application Security Monitoring

    Stretching Left With Threat Stack Application Security Monitoring

    Developers have always been overworked. They face a constant flow of feature-focused work from the business and need to balance that with work involving performance, quality and reliability, and...

    View Infographic
  • Threat Stack Launches New Unified Application Security Monitoring Solution

    Threat Stack Launches New Unified Application Security Monitoring Solution

    Threat Stack’s Application Security Monitoring enables cloud security observability across the full stack & full lifecycle in a single solution Even when companies have a formal software security...

    View Infographic
  • How to Create a Threat Model for Cloud Infrastructure Security

    How to Create a Threat Model for Cloud Infrastructure Security

    Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP The practice of creating a threat model can help teams proactively understand and develop a strategy for managing...

    View Infographic
  • 3 Questions to Ask When You’re Ready to Operationalize Your Security

    3 Questions to Ask When You’re Ready to Operationalize Your Security

    New global data from Checkmarx reveals that 92 percent of organizations struggle to implement security into DevOps — even though they say they want to. The heart of this issue is the common...

    View Infographic
  • 22 Most Under-Used AWS Security Metrics

    22 Most Under-Used AWS Security Metrics

    22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users can take advantage of, but it’s easy for users...

    View Infographic
  • loading
    Loading More...