Find out more about the world of application security and how Threat Stack can help you secure the top layer of your stack.
Attack Simulation: Deconstructing an Attack in a Containerized Application
Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the cloud management console.
8 Best Practices for Strengthening Security in Cloud-Native Environments
Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and other well-known benefits. But there are still plenty...
Ten Application Security Terms That Every Developer Should Know
A few months ago I gave a talk about securing microservices at the Boston Cloud Native Computing Meetup. After the presentation, a young developer (a recent college grad) came up to me and said,...
Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security
Learn how to secure cloud-native applications with a comprehensive and proactive approach
Stretch Right With Threat Stack Application Security Monitoring
In our last post, we explored how Threat Stack’s Application Security Monitoring embeds security in development processes — without negatively impacting agility or speed of application development...
16 Cloud Security Experts Share the Most Costly Security Technology Misconceptions When It Comes to Cloud Migration
More companies are migrating their infrastructure to the cloud to take advantage of benefits like reliability, scalability, and lower costs, but cloud migration remains a complex task requiring...
Stretching Left With Threat Stack Application Security Monitoring
Developers have always been overworked. They face a constant flow of feature-focused work from the business and need to balance that with work involving performance, quality and reliability, and...
Threat Stack Launches New Unified Application Security Monitoring Solution
Threat Stack’s Application Security Monitoring enables cloud security observability across the full stack & full lifecycle in a single solution Even when companies have a formal software security...
How to Create a Threat Model for Cloud Infrastructure Security
Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP The practice of creating a threat model can help teams proactively understand and develop a strategy for managing...
3 Questions to Ask When You’re Ready to Operationalize Your Security
New global data from Checkmarx reveals that 92 percent of organizations struggle to implement security into DevOps — even though they say they want to. The heart of this issue is the common...
22 Most Under-Used AWS Security Metrics
22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users can take advantage of, but it’s easy for users...