What's your cloud SecOps story? Take our assessment to baseline your maturity! https://go.threatstack.com/cloud-secops-maturity-assessment
Get Access to Threat Stack's Cloud Security PlatformStart Trial
Other content in this Stream
Security Challenges in a Changing Cloud Infrastructure
Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps systems.
ESG Brief - Container Security
Security Observability: Operationalizing Data in Complex, Distributed Systems
It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a serverless-style architecture. And while these are...
Manage Decades of Technical Debt More Effectively
Why Kubernetes is Not a Silver Bullet
Container adoption is on a meteoric rise. Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. It’s not hard to see why —...
Why DevOps Needs Security During an Infrastructure Transition
The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of...
#SecOpsThis: Log Management
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: Secret Management
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: AWS Keys
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys
#SecOpsThis: SOC 2
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: SOC 2
What is SecOps? A Definition, Benefits, Best Practices, and More
While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point...
3 Things to Know About Kubernetes Security
Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. The operational benefits of containers, including optimized build times...
Infrastructure in Transition: Securing Containers
Organizations are migrating from virtual server workloads to containers at a frenzied pace, buying into the increasingly popular technology and taking advantage of containers’ many benefits in...
24 DevOps Pros Reveal the Most Important Characteristic of a Successful DevOps Engineer
There’s no precisely defined career track for DevOps engineers because they’re typically developers or sysadmins who develop an interest in other aspects of operations — such as network...
20 Dev Leaders and Hiring Managers Reveal Their Favorite DevOps Interview Questions
We champion a security-first DevOps culture at Threat Stack, and I’ve had the opportunity of building DevOps best practices into the company since its earliest days. In our experience, this is the...
How to Build and Mature a SecOps Program in the Cloud
Watch this video for practical advice to help you build and mature a cloud secops program for your organization.
Pick Any Three: Good, Fast, or Safe. DevOps from Scratch
Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality while maintaining quality & security through DevOps
How Threat Stack Does DevOps — Series Overview
Pete Cheslock, Threat Stack’s Senior Director of Operations, has just published a four-part blog series that gives deep insights into his experience “doing DevOps” at a variety of companies — in...
How Threat Stack Does DevOps (Part IV): Making Engineers Accountable
Early on at Threat Stack, we focused on giving engineers the tools and ownership over their applications that would empower them to deploy and manage their applications in a safe way without...
How to Integrate Security Into a DevOps World