There are many tools and processes for improving security in cloud environments, but many security and operations teams still complain about their lack of "visibility" into the cloud. In this Dark Reading webinar, Securosis' Rich Mogull and Threat Stack's Chris Ford discuss practices and tools that will help your team monitor security in cloud environments that incorporate many cloud applications and services. You'll also get advice on how to evaluate and measure cloud security, and how to work with service providers to improve it.
T-72 Hours to Report a Breach: Are you GDPR Ready?
GDPR deadlines are fast approaching and many US companies are behind the curve. Watch this video to learn h...
Other content in this Stream
The State of Security Budgeting in 2018: Key Findings
The State of Security Budgeting in 2018
The 2018 State of Security Budgeting Report found that budgets are increasing but many are concerned that won't be enough. This executive summary discusses the common challenges and key takeaways
The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams
The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.
How to Build and Mature a SecOps Program in the Cloud
ESG Brief - Container Security
Threat Stack Testimonial - Remi Cattiau, Nuxeo
Cloud Security Threat Briefing
Cloud Security Threat Briefing: Anatomy of a Sophisticated Public Cloud Attack
Inside an Enterprise Breach on a Public Cloud Environment
Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.
Threat Stack Testimonial - Martin Rues, Outreach
Outreach CISO, Martin Rues, describes how Threat Stack gives him visibility into his cloud infrastructure, while supplementing his team with experts to train and guide Outreach to a more secure cloud
Threat Stack Explainer Video
Attack Simulation Overview
See How: Public Cloud Attack
What Critical AWS Misconfigurations Look Like
Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally
Manage Decades of Technical Debt More Effectively
#SecOpsThis: Log Management
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: Secret Management
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: AWS Keys
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys
#SecOpsThis: On Call Rotation Access