Genesys DevOps and Security leaders asked themselves "how can we react to something we can't see?" - thus their cloud-native solution was born. Read this case study to learn how Genesys leverages Threat Stack to gain host-level visibility into who is doing what, where, and when - across their ever changing and complex cloud environment.
Everything You Need To Know About Compliance for Cloud Infrastructure
Read this eBook to learn how to build a PCI DSS and HIPAA compliant business in the cloud
Get Access to Threat Stack's Cloud Security PlatformStart Trial
Other content in this Stream
Securing Serverless Compute
This 451 Pathfinder Paper discusses the state of container and serverless security and provides recommendations on how to secure cloud workloads regardless of deployment.
Security Challenges in a Changing Cloud Infrastructure
Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps systems.
Forrester TEI Study of Threat Stack
The State of Security Budget in 2018
The SecOps Playbook Part II: A Practitioner's Guide for Security and Operations Teams
The SecOps Playbook for Cloud Infrastructure, Part II gives Security and Ops practitioners tips on integrating security into DevOps — without sacrificing speed.
Cloud Security Threat Briefing
Inside an Enterprise Breach on a Public Cloud Environment
Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.
Security Observability: Operationalizing Data in Complex, Distributed Systems
It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a serverless-style architecture. And while these are...
How to Find and Remediate Open Infrastructure Ports
The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches....
Best Practices for User Access Management
Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In an age of sophisticated, ever-evolving...
50 Best Cloud Security Training Resources
The bad news is there’s a global shortage of trained cybersecurity professionals: According to PWC, there will be 1.5 million cybersecurity job openings by 2019, and the talent market is not...
Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally
Why DevOps Needs Security During an Infrastructure Transition
The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of...
#SecOpsThis: Log Management
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: Secret Management
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: AWS Keys
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys
#SecOpsThis: On Call Rotation Access
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: On Call Rotation Access
#SecOpsThis: SOC 2
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: SOC 2
Three Homegrown SecOps Tools Used by the Threat Stack Team
As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the most...
Refocusing Security Operations in the Cloud Era