Latest Blogs About "DevSecOps"

113 total posts.

3 Min Read
HIPAA Compliance and HIDS For Healthcare IT: Case Study

Dave

September 13, 2022

Stratasan’s Security and Compliance Solution Healthcare IT Customer's Cybersecurity Problem Stratasan delivers web-based software and ...

2 Min Read
Webinar: Adopting Zero Trust for Secure Digital Experiences

Dave

September 13, 2022

Live final session of 3-part webinar series from F5, Thursday, September 15, 2022  10:00am PT | 1:00pm ET Zero trust is driven by a simple ...

4 Min Read
Cloud-Based Application Infrastructure Protection

Dave

August 22, 2022

Cloud-based cybersecurity requires application infrastructure protection as well as application and API protection. With the purchase of Threat Stack ...

5 Min Read
Cybersecurity That’s Not Fairy Dust: It’s Cloud Security Engineering and Science

John Pinkham

July 15, 2022

In the ever-evolving and increasingly competitive cybersecurity environment, Threat Stack and Lacework both aim to support customers in detecting ...

2 Min Read
Biz Owners Fret About Threats and Compliance: Survey Results

John Pinkham

May 3, 2022

Whether because of the pandemic, or to take advantage of the speed and agility of cloud-based systems and solutions, more organizations are moving to ...

2 Min Read
Threat detection for the Spring4Shell vulnerability

John Pinkham

April 1, 2022

A Twitter post showing remote attack vulnerabilities and exploits through the popular Java Web application development framework Spring – dubbed ...

3 Min Read
PART TWO: Threat Stack Releases New Alert Context for Reduced MTTK

Amber Bennoui

August 11, 2021

As discussed in part one of this series, Threat Stack is committed to making meaningful changes to its user interface (UI)--including alert ...

3 Min Read
Four Steps To Uplevel your Compliance Strategy

John Pinkham

June 29, 2021

Being cybersecurity compliant is increasingly ingrained in the day-to-day operations of organizations of all sizes. It has also emerged as a standard ...

3 Min Read
Bridging the Security Skills Gap in a Cloud-First World

Harrison Calato

May 12, 2021

Organizations have been forced to approach workplace technology initiatives with greater speed and agility, quickly shifting to the cloud and ...

5 Min Read
Optimizing Threat Stack’s Data Pipeline with Apache Spark and Amazon EMR

Mina Botros

August 11, 2020

Threat Stack collects tens of billions of events per day, which helps customers understand their environment, identify undesirable activity, and ...

21 Min Read
Tips on Choosing the Best Free DevOps Tools

Mike Broberg

July 30, 2020

Free and open source DevOps tools can help DevOps teams streamline their development processes and speed development cycles, when carefully selected ...

16 Min Read
50 Best Online DevOps Training Resources

Jackson Connell

June 10, 2020

Every company that uses applications in one way or another must operate in a service-oriented digital world where application development has to be ...

6 Min Read
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud

Pat Cable

June 9, 2020

Threat Stack has an event processing pipeline that processes millions of messages per second sent to us by customer agents, our internal services, ...

15 Min Read
50 Best Deployment Tools

Pan Chhum

June 3, 2020

Let's be honest: trying to deploy your apps alone is a bad idea. Trying to upgrade and configure hundreds of computers across an extensive ...

15 Min Read
50 Best Integration Testing Tools

Jackson Connell

May 21, 2020

Testing the applications you create is a necessary part of writing code. Finding the right tools to perform different testing functions can be ...

8 Min Read
How to Write an Automated Test Framework in a Million Little Steps

T.J. Maher

March 24, 2020

“Creating an automated regression test suite is not a simple matter. Crafting an automated test framework on which future tests can be built can be ...

4 Min Read
Why Threat Stack Automates Microservices Tests Using Containers

Andrew Warren

February 18, 2020

Microservices, even when designed correctly, can be challenging to test. But when the system architecture evolves to the point where tens or hundreds ...

3 Min Read
A Cybersecurity Risk Assessment Checklist for Infrastructures in Transition

Mark Moore

January 7, 2020

Dev and Ops teams constantly evolve their technology and procedures to increase speed and lower costs. Typically this leads to increasingly ...

4 Min Read
Omada Health’s HIPAA Compliance & Operational Efficiency

Robin Stone

December 12, 2019

“We like dealing with Threat Stack because they offer a complete solution. Threat Stack backs up its technology with security insights and ...

19 Min Read
20 DevSecOps Pros Reveal the Most Important Considerations in Building a DevSecOps Pipeline

Pan Chhum

October 10, 2019

In a recent Threat Stack report, 44 percent of DevOps professionals we surveyed said that when it comes to security-related issues, they'd have to ...

4 Min Read
The Top 3 Security Mistakes SaaS Companies are Making

Stephen Fitzgerald

October 1, 2019

The more data you store, the more attractive you become to cybercriminals, so SaaS companies need to recognize the importance of following security ...