Security Research & Strategy

Resources to help you plan and build security in the cloud

  • Security Challenges in a Changing Cloud Infrastructure

    Security Challenges in a Changing Cloud Infrastructure

    Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps systems.

    Read Content
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • ×

    Access All Security Content

    First Name
    Last Name
    Company
    Job Title
    Country
    I'm interested in a demo of Threat Stack's cloud security solution
    Yes, I'd like to opt-in to Threat Stack communications
    Yes, I'd like to opt-in to Threat Stack communications
    *We value your privacy - link to Privacy Page
    Thank you!
    Error - something went wrong!
  • Forrester TEI Study of Threat Stack

    Forrester TEI Study of Threat Stack

    Read Content
  • The State of Security Budget in 2018

    The State of Security Budget in 2018

    Read Content
  • The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams

    The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams

    The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.

    Read Content
  • Cloud Security Threat Briefing

    Cloud Security Threat Briefing

    Read Content
  • Inside an Enterprise Breach on a Public Cloud Environment45:39

    Inside an Enterprise Breach on a Public Cloud Environment

    Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

    Watch Video
  • Security Observability: Operationalizing Data in Complex, Distributed Systems

    Security Observability: Operationalizing Data in Complex, Distributed Systems

    It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a serverless-style architecture. And while these are...

    View Infographic
  • How to Find and Remediate Open Infrastructure Ports

    How to Find and Remediate Open Infrastructure Ports

    The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches....

    View Infographic
  • Best Practices for User Access Management

    Best Practices for User Access Management

    Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In an age of sophisticated, ever-evolving...

    View Infographic
  • 50 Best Cloud Security Training Resources

    50 Best Cloud Security Training Resources

    The bad news is there’s a global shortage of trained cybersecurity professionals: According to PWC, there will be 1.5 million cybersecurity job openings by 2019, and the talent market is not...

    View Infographic
  • Draft and Develop: A Solution to the Cyber Security Skills Shortage30:30

    Draft and Develop: A Solution to the Cyber Security Skills Shortage

    Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

    Watch Video
  • Why DevOps Needs Security During an Infrastructure Transition

    Why DevOps Needs Security During an Infrastructure Transition

    The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of...

    View Infographic
  • #SecOpsThis: Log Management1:25

    #SecOpsThis: Log Management

    Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management

    Watch Video
  • #SecOpsThis: Secret Management1:16

    #SecOpsThis: Secret Management

    Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management

    Watch Video
  • #SecOpsThis: AWS Keys1:18

    #SecOpsThis: AWS Keys

    Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys

    Watch Video
  • #SecOpsThis: On Call Rotation Access1:21

    #SecOpsThis: On Call Rotation Access

    Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: On Call Rotation Access

    Watch Video
  • #SecOpsThis: SOC 21:22

    #SecOpsThis: SOC 2

    Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: SOC 2

    Watch Video
  • Three Homegrown SecOps Tools Used by the Threat Stack Team

    Three Homegrown SecOps Tools Used by the Threat Stack Team

    As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the most...

    View Infographic
  • Refocusing Security Operations in the Cloud Era

    Refocusing Security Operations in the Cloud Era

    This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and DevOps practices.

    Read Content
  • Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap

    Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap

    If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. That was certainly the case with Threat Stack’s use...

    View Infographic
  • loading
    Loading More...