Security Research & Strategy

Resources to help you plan and build security in the cloud

  • Inside an Enterprise Breach on a Public Cloud Environment45:39

    Inside an Enterprise Breach on a Public Cloud Environment

    Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

    Watch Video
  • Request a Demo of Threat Stack's Cloud Security Platform

    Get in Touch
  • ×

    Access All Security Content

    First Name
    Last Name
    Company
    Job Title
    Country
    I'm interested in a demo of Threat Stack's cloud security solution
    Yes, I'd like to opt-in to Threat Stack communications
    Yes, I'd like to opt-in to Threat Stack communications
    *We value your privacy - link to Privacy Page
    Thank you!
    Error - something went wrong!
  • Security Observability: Operationalizing Data in Complex, Distributed Systems

    Security Observability: Operationalizing Data in Complex, Distributed Systems

    It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a serverless-style architecture. And while these are...

    Read Article
  • How to Find and Remediate Open Infrastructure Ports

    How to Find and Remediate Open Infrastructure Ports

    The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches....

    Read Article
  • Best Practices for User Access Management

    Best Practices for User Access Management

    Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In an age of sophisticated, ever-evolving...

    Read Article
  • 50 Best Cloud Security Training Resources

    50 Best Cloud Security Training Resources

    The bad news is there’s a global shortage of trained cybersecurity professionals: According to PWC, there will be 1.5 million cybersecurity job openings by 2019, and the talent market is not...

    Read Article
  • Draft and Develop: A Solution to the Cyber Security Skills Shortage30:30

    Draft and Develop: A Solution to the Cyber Security Skills Shortage

    Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

    Watch Video
  • Why DevOps Needs Security During an Infrastructure Transition

    Why DevOps Needs Security During an Infrastructure Transition

    The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of...

    Read Article
  • #SecOpsThis: Log Management1:25

    #SecOpsThis: Log Management

    Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management

    Watch Video
  • #SecOpsThis: Secret Management1:16

    #SecOpsThis: Secret Management

    Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management

    Watch Video
  • #SecOpsThis: AWS Keys1:18

    #SecOpsThis: AWS Keys

    Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys

    Watch Video
  • #SecOpsThis: On Call Rotation Access1:21

    #SecOpsThis: On Call Rotation Access

    Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: On Call Rotation Access

    Watch Video
  • #SecOpsThis: SOC 21:22

    #SecOpsThis: SOC 2

    Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: SOC 2

    Watch Video
  • Three Homegrown SecOps Tools Used by the Threat Stack Team

    Three Homegrown SecOps Tools Used by the Threat Stack Team

    As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the most...

    Read Article
  • Refocusing Security Operations in the Cloud Era

    Refocusing Security Operations in the Cloud Era

    This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and DevOps practices.

    Read Flipbook
  • Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap

    Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap

    If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. That was certainly the case with Threat Stack’s use...

    Read Article
  • Visualizing Detection and Remediation in the Cloud57:00

    Visualizing Detection and Remediation in the Cloud

    Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog

    Watch Video
  • 3 Things to Know About Kubernetes Security

    3 Things to Know About Kubernetes Security

    Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. The operational benefits of containers, including optimized build times...

    Read Article
  • Who Watches the Watchers: How a Security Company Does Security47:35

    Who Watches the Watchers: How a Security Company Does Security

    How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization simultaneously more secure and efficient.

    Watch Video
  • SecOps Playbook for Cloud Infrastructure

    SecOps Playbook for Cloud Infrastructure

    Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, and improve operational efficiency

    Read Flipbook
  • Cyber Attack Simulation: A Crypto Crime in Action24:59

    Cyber Attack Simulation: A Crypto Crime in Action

    See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly identify the attack before it becomes a breach.

    Watch Video
  • loading
    Loading More...