Free Resources

  • How SailPoint Secures Containerized Infrastructure on AWS Cloud36:01

    How SailPoint Secures Containerized Infrastructure on AWS Cloud

    Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

    Watch Video
  • Inside an Active Shellbot Cryptomining Malware Campaign23:00

    Inside an Active Shellbot Cryptomining Malware Campaign

    Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

    Watch Video
  • How to Achieve SOC 2 Compliance in a Containerized  Environment58:50

    How to Achieve SOC 2 Compliance in a Containerized Environment

    Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers

    Watch Video
  • Securing Microservices in a Containerized Environment58:16

    Securing Microservices in a Containerized Environment

    Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.

    Watch Video
  • Deploying Compliant Kubernetes52:25

    Deploying Compliant Kubernetes

    Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.

    Watch Video
  • AWS Security: Visualizing Security Data in 201935:26

    AWS Security: Visualizing Security Data in 2019

    Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.

    Watch Video
  • Security Challenges in a Changing Cloud Infrastructure

    Security Challenges in a Changing Cloud Infrastructure

    Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps systems.

    Read Content
  • Cloud Security Threat Briefing: Docker Cryptojacking Exploit

    Cloud Security Threat Briefing: Docker Cryptojacking Exploit

    Cloud Security Threat Briefing: Inside an Actual Docker Cryptojacking Exploit

    Read Content
  • Forrester TEI Study of Threat Stack

    Forrester TEI Study of Threat Stack

    Read Content
  • How to Spend Your Security Budget in a DevOps World22:06

    How to Spend Your Security Budget in a DevOps World

    Learn how to build a scalable, cloud-based security program that fits your organization's budget

    Watch Video
  • Container Security: Taking a Layered Approach to Infrastructure Security47:57

    Container Security: Taking a Layered Approach to Infrastructure Security

    Watch Video
  • The State of Security Budget in 2018

    The State of Security Budget in 2018

    Read Content
  • The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams

    The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams

    The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.

    Read Content
  • Security and DevOps with Kubernetes1:00:49

    Security and DevOps with Kubernetes

    Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".

    Watch Video
  • ESG Brief - Container Security

    ESG Brief - Container Security

    Read Content
  • Cloud Security Threat Briefing

    Cloud Security Threat Briefing

    Read Content
  • What Critical AWS Misconfigurations Look Like

    What Critical AWS Misconfigurations Look Like

    Read Content
  • Draft and Develop: A Solution to the Cyber Security Skills Shortage30:30

    Draft and Develop: A Solution to the Cyber Security Skills Shortage

    Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

    Watch Video
  • Manage Decades of Technical Debt More Effectively42:13

    Manage Decades of Technical Debt More Effectively

    Watch Video
  • Refocusing Security Operations in the Cloud Era

    Refocusing Security Operations in the Cloud Era

    This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and DevOps practices.

    Read Content
  • loading
    Loading More...