×

Access All Security Content

First Name
Last Name
Company
Job Title
Country
I'm interested in a demo of Threat Stack's cloud security solution
Yes, I'd like to opt-in to Threat Stack communications
Yes, I'd like to opt-in to Threat Stack communications
*We value your privacy - link to Privacy Page
Thank you!
Error - something went wrong!

Anatomy of a Build Server Attack

Build servers are typically not top-of-the-list for environments that security teams choose to monitor and secure. The perception is that they do not actually hold sensitive data like a production environment would. However, in reality, they have unique access and functionality that makes them a common target for attackers

Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach. This example will highlight how the attacker leveraged a build server to wage an insidious attack that has a larger blast radius than a similar attack targeting a production environment directly.

 
Previous Video
Architecting and Securing Cloud Infrastructure
Architecting and Securing Cloud Infrastructure

451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from...

Next Video
How to Achieve SOC 2 Compliance in a Containerized  Environment
How to Achieve SOC 2 Compliance in a Containerized Environment

Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker conta...