Hank Schless's Latest Blogs

9 total posts.

16 Min Read
50 Useful Docker Tutorials for IT Professionals (from Beginner to Advanced)

Hank Schless

September 26, 2018

Containers bring many benefits to DevOps teams along with a number of security concerns. This post brings you details about 50 Docker training ...

4 Min Read
Threat Stack Announces General Availability of Its Docker Containerized Agent

Hank Schless

September 25, 2018

Last month we announced that a containerized version of the Threat Stack Agent was coming soon for customers who are using containers to deploy cloud ...

15 Min Read
22 Most Under-Used AWS Security Metrics

Hank Schless

September 21, 2018

22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users ...

15 Min Read
45 Useful and Informative GDPR Presentations & Resources

Hank Schless

September 5, 2018

The months leading up to May 25, 2018 produced a steady barrage of articles urging organizations to get ready for the GDPR and warning about the ...

3 Min Read
Magic for DevOps Teams — Threat Stack Announces Containerized Agent

Hank Schless

August 23, 2018

Every day, malicious actors are taking more complex routes into cloud infrastructure and leveraging increasingly covert traits to persist for longer ...

11 Min Read
101 AWS Security Tips & Quotes, Part 2: Securing Your AWS Environment

Hank Schless

June 26, 2018

As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will ...

4 Min Read
5 Statistics That Prove Why Your Security Posture Can’t Be Purely Reactive

Hank Schless

June 19, 2018

While reacting to alerts and incidents after they occur will always be a reality of the security professional’s job, a purely reactive security ...

4 Min Read
How to Use Threat Stack to Reduce Mean Time To Know

Hank Schless

June 15, 2018

Mean Time To Detect (MTTD) and Mean Time To Know (MTTK) are two of the most important metrics in security operations. Respectively, they measure the ...

3 Min Read
How to Achieve Type 2 SOC 2 With Zero Exceptions — Webinar Recap

Hank Schless

March 19, 2018

SOC 2 compliance is one of the most common customer use cases we come across at Threat Stack. Developed by the American Institute of CPAs (AICPA), ...