eBooks & Reports

This Stream includes all of our eBooks & Reports Flipbooks

  • Securing Serverless Compute

    Securing Serverless Compute

    This 451 Pathfinder Paper discusses the state of container and serverless security and provides recommendations on how to secure cloud workloads regardless of deployment.

    Read Content
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • Cloud Security Requirements Analysis Worksheet

    Cloud Security Requirements Analysis Worksheet

    Read Content
  • Threat Stack SOC Report Q3 2019

    Threat Stack SOC Report Q3 2019

    The Q3 2019 Threat Stack SOC report covers key trends identified by the Threat Stack Cloud SecOps Program.

    Read Content
  • Leveraging DevSecOps to Secure Cloud-native Applications

    Leveraging DevSecOps to Secure Cloud-native Applications

    Leveraging DevSecOps to secure cloud-native applications - ESG Report 2019

    Read Content
  • Best Practices: Cloud Workload Security

    Get Your Copy
  • Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

    Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

    Learn how to secure cloud-native applications with a comprehensive and proactive approach

    Read Content
  • How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

    How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

    Learn how OneLogin saves DevOps time, money, and resources with Threat Stack on AWS public cloud.

    Read Content
  • Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

    Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

    Security Observability and outlines six principles that will help you create a roadmap for modernizing your monitoring and controls and proactively managing risk within modern cloud-native environment

    Read Content
  • Continuing Evolution of The Shellbot Malware

    Continuing Evolution of The Shellbot Malware

    Threat Stack’s latest SOC report provides an in-depth analysis of this new variant of the ongoing, persistent Shellbot cyrptomining campaign.

    Read Content
  • Build-Time Security: Securing Your CI/CD Pipeline

    Build-Time Security: Securing Your CI/CD Pipeline

    Learn about the risks associated with build-servers and CI/CD processes across ephemeral infrastructures

    Read Content
  • Security Challenges in a Changing Cloud Infrastructure

    Security Challenges in a Changing Cloud Infrastructure

    Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps systems.

    Read Content
  • Cloud Security Threat Briefing: Docker Cryptojacking Exploit

    Cloud Security Threat Briefing: Docker Cryptojacking Exploit

    Cloud Security Threat Briefing: Inside an Actual Docker Cryptojacking Exploit

    Read Content
  • Forrester TEI Study of Threat Stack

    Forrester TEI Study of Threat Stack

    Read Content
  • The State of Security Budget in 2018

    The State of Security Budget in 2018

    Read Content
  • The State of Security Budgeting in 2018

    The State of Security Budgeting in 2018

    The 2018 State of Security Budgeting Report found that budgets are increasing but many are concerned that won't be enough. This executive summary discusses the common challenges and key takeaways

    Read Content
  • The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams

    The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams

    The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.

    Read Content
  • ESG Brief - Container Security

    ESG Brief - Container Security

    Read Content
  • Cloud Security Threat Briefing

    Cloud Security Threat Briefing

    Read Content
  • What Critical AWS Misconfigurations Look Like

    What Critical AWS Misconfigurations Look Like

    Read Content
  • Refocusing Security Operations in the Cloud Era

    Refocusing Security Operations in the Cloud Era

    This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and DevOps practices.

    Read Content
  • SecOps Playbook for Cloud Infrastructure

    SecOps Playbook for Cloud Infrastructure

    Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, and improve operational efficiency

    Read Content
  • loading
    Loading More...