In this webinar, the Director of Global InfoSec at ActiveCampaign walks through his approach to achieving SOC 2 Type 2 compliance in their highly containerized environment. Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers.
Get Access to Threat Stack's Cloud Security Platform
Start TrialMost Recent Videos

SANS Webinar: Real World Challenges for PCI Compliant Containers
Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underlying dependencies all while maintaining PCI compliance.

How Cloud-Native has Changed Application Security
<p>Organizations are rapidly shifting to cloud-native environments to capitalize on speed, agility, and scale – in fact, a recent ESG survey finds that 46% of organizations have more complex infrastru

SANS Webinar: Securing Microservices in Containerized Environments
SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized cloud environments

How SailPoint Secures Containerized Infrastructure on AWS Cloud
Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

Inside an Active Shellbot Cryptomining Malware Campaign
Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

Architecting and Securing Cloud Infrastructure
451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ownership of their own security responsibility

Anatomy of a Build Server Attack
Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server to wage an insidious attack

Securing Microservices in a Containerized Environment
Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.

Deploying Compliant Kubernetes
Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.

AWS Security: Visualizing Security Data in 2019
Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.

Inside a Docker Cryptojacking Exploit
Threat Stack's Ethan Hansen will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection

How to Spend Your Security Budget in a DevOps World
Learn how to build a scalable, cloud-based security program that fits your organization's budget

Container Security: Taking a Layered Approach to Infrastructure Security
Learn how to take a holistic approach to securing each layer of cloud infrastructure while discussing recent trends and container primitives

Security and DevOps with Kubernetes
Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".

Inside an Enterprise Breach on a Public Cloud Environment
Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

Visualizing Detection and Remediation in the Cloud
Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog

How a Security Company Does Security