Webinars

Listen in on one of our many Webinars, covering a variety of Security Topics and featuring top Cloud Experts.

  • Attack Simulation: Docker Application28:45

    Attack Simulation: Docker Application

    Watch now to learn about microservices application design and the unique security concerns associated with this abstracted infrastructure

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • Designing a Secure Microservices Architecture59:26

    Designing a Secure Microservices Architecture

    Watch now to learn about microservices application design and the unique security concerns associated with this abstracted infrastructure

    Watch Video
  • Attack Simulation: Deconstructing an Attack in a Containerized Application30:20

    Attack Simulation: Deconstructing an Attack in a Containerized Application

    Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the cloud management console.

    Watch Video
  • Inside a Docker Cryptojacking Exploit21:46

    Inside a Docker Cryptojacking Exploit

    Watch Video
  • SANS Webinar: Real World Challenges for PCI Compliant Containers59:07

    SANS Webinar: Real World Challenges for PCI Compliant Containers

    Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underlying dependencies all while maintaining PCI compliance.

    Watch Video
  • How Cloud-Native has Changed Application Security55:11

    How Cloud-Native has Changed Application Security

    <p>Organizations are rapidly shifting to cloud-native environments to capitalize on speed, agility, and scale – in fact, a recent ESG survey finds that 46% of organizations have more complex infrastru

    Watch Video
  • SANS Webinar: Securing Microservices in Containerized Environments1:02:20

    SANS Webinar: Securing Microservices in Containerized Environments

    SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized cloud environments

    Watch Video
  • How SailPoint Secures Containerized Infrastructure on AWS Cloud36:01

    How SailPoint Secures Containerized Infrastructure on AWS Cloud

    Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

    Watch Video
  • Inside an Active Shellbot Cryptomining Malware Campaign23:00

    Inside an Active Shellbot Cryptomining Malware Campaign

    Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

    Watch Video
  • Architecting and Securing Cloud Infrastructure52:35

    Architecting and Securing Cloud Infrastructure

    451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ownership of their own security responsibility

    Watch Video
  • Anatomy of a Build Server Attack38:47

    Anatomy of a Build Server Attack

    Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server to wage an insidious attack

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • How to Achieve SOC 2 Compliance in a Containerized  Environment58:50

    How to Achieve SOC 2 Compliance in a Containerized Environment

    Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers

    Watch Video
  • Securing Microservices in a Containerized Environment58:16

    Securing Microservices in a Containerized Environment

    Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.

    Watch Video
  • Deploying Compliant Kubernetes52:25

    Deploying Compliant Kubernetes

    Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.

    Watch Video
  • AWS Security: Visualizing Security Data in 201935:26

    AWS Security: Visualizing Security Data in 2019

    Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.

    Watch Video
  • Inside a Docker Cryptojacking Exploit22:57

    Inside a Docker Cryptojacking Exploit

    Threat Stack's Ethan Hansen will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection

    Watch Video
  • How to Spend Your Security Budget in a DevOps World22:06

    How to Spend Your Security Budget in a DevOps World

    Learn how to build a scalable, cloud-based security program that fits your organization's budget

    Watch Video
  • Container Security: Taking a Layered Approach to Infrastructure Security47:57

    Container Security: Taking a Layered Approach to Infrastructure Security

    Learn how to take a holistic approach to securing each layer of cloud infrastructure while discussing recent trends and container primitives

    Watch Video
  • Security and DevOps with Kubernetes1:00:49

    Security and DevOps with Kubernetes

    Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".

    Watch Video
  • Inside an Enterprise Breach on a Public Cloud Environment45:39

    Inside an Enterprise Breach on a Public Cloud Environment

    Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

    Watch Video
  • loading
    Loading More...