OneLogin brings efficient and secure application access to the modern enterprise as a leading provider of single sign-on and cloud-based identity management tools. Read this case study to learn how OneLogin gains granular security control with Threat Stack on AWS.
Cloud Infrastructure Security Buyer’s Guide
Read this eBook to learn how to navigate through the cloud security market space and how to choose the righ...
Other content in this Stream
The State of Security Budgeting in 2018: Key Findings
The State of Security Budgeting in 2018
The 2018 State of Security Budgeting Report found that budgets are increasing but many are concerned that won't be enough. This executive summary discusses the common challenges and key takeaways
The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams
The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.
How to Build and Mature a SecOps Program in the Cloud
ESG Brief - Container Security
Threat Stack Testimonial - Remi Cattiau, Nuxeo
Cloud Security Threat Briefing
Cloud Security Threat Briefing: Anatomy of a Sophisticated Public Cloud Attack
Inside an Enterprise Breach on a Public Cloud Environment
Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.
Threat Stack Testimonial - Martin Rues, Outreach
Outreach CISO, Martin Rues, describes how Threat Stack gives him visibility into his cloud infrastructure, while supplementing his team with experts to train and guide Outreach to a more secure cloud
Threat Stack Explainer Video
Attack Simulation Overview
See How: Public Cloud Attack
What Critical AWS Misconfigurations Look Like
Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally
Manage Decades of Technical Debt More Effectively
#SecOpsThis: Log Management
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: Secret Management
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: AWS Keys
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys
#SecOpsThis: On Call Rotation Access