What's your cloud SecOps story? Take our assessment to baseline your maturity! https://go.threatstack.com/cloud-secops-maturity-assessment
#SecOpsThis: On Call Rotation Access
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this vide...
Other content in this Stream
Inside an Enterprise Breach on a Public Cloud Environment
Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.
Security Observability: Operationalizing Data in Complex, Distributed Systems
It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a serverless-style architecture. And while these are...
How to Find and Remediate Open Infrastructure Ports
The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches....
Best Practices for User Access Management
Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In an age of sophisticated, ever-evolving...
50 Best Cloud Security Training Resources
The bad news is there’s a global shortage of trained cybersecurity professionals: According to PWC, there will be 1.5 million cybersecurity job openings by 2019, and the talent market is not...
Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally
Why DevOps Needs Security During an Infrastructure Transition
The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of...
#SecOpsThis: Log Management
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: Secret Management
Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret Management
#SecOpsThis: AWS Keys
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS Keys
#SecOpsThis: On Call Rotation Access
Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: On Call Rotation Access
Three Homegrown SecOps Tools Used by the Threat Stack Team
As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the most...
Refocusing Security Operations in the Cloud Era
This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and DevOps practices.
Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap
If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. That was certainly the case with Threat Stack’s use...
Visualizing Detection and Remediation in the Cloud
Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog
3 Things to Know About Kubernetes Security
Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. The operational benefits of containers, including optimized build times...
Who Watches the Watchers: How a Security Company Does Security
How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization simultaneously more secure and efficient.
SecOps Playbook for Cloud Infrastructure
Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, and improve operational efficiency
Cyber Attack Simulation: A Crypto Crime in Action
See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly identify the attack before it becomes a breach.
How to Transform Alert Fatigue Into Proactive Security Management — 4 Must-Read Blog Posts