How SailPoint Secures Containerized Infrastructure on AWS Cloud
Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud
Inside an Active Shellbot Cryptomining Malware Campaign
Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations
How to Achieve SOC 2 Compliance in a Containerized Environment
Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers
Securing Microservices in a Containerized Environment
Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.
Deploying Compliant Kubernetes
Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.
AWS Security: Visualizing Security Data in 2019
Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.
Security Challenges in a Changing Cloud Infrastructure
Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps systems.
Cloud Security Threat Briefing: Docker Cryptojacking Exploit
Cloud Security Threat Briefing: Inside an Actual Docker Cryptojacking Exploit
Forrester TEI Study of Threat Stack
How to Spend Your Security Budget in a DevOps World
Learn how to build a scalable, cloud-based security program that fits your organization's budget
Container Security: Taking a Layered Approach to Infrastructure Security
The State of Security Budget in 2018
The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams
The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.
Security and DevOps with Kubernetes
Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".
ESG Brief - Container Security
Cloud Security Threat Briefing
What Critical AWS Misconfigurations Look Like
Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally
Manage Decades of Technical Debt More Effectively
Refocusing Security Operations in the Cloud Era
This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and DevOps practices.