Latest Blogs About "DevSecOps"

113 total posts.

3 Min Read
How to Make SecOps Work in the Real World

Threat Stack Marketing Team

March 29, 2018

Smart organizations already know that running securely is key to success in today’s competitive landscape. So why isn’t security table stakes in ...

4 Min Read
How Threat Stack Does DevOps — Series Overview

Bob Allin

March 23, 2018

Pete Cheslock, Threat Stack’s Senior Director of Operations, has just published a four-part blog series that gives deep insights into his ...

5 Min Read
How Threat Stack Does DevOps (Part IV): Making Engineers Accountable

Pete Cheslock

March 21, 2018

Early on at Threat Stack, we focused on giving engineers the tools and ownership over their applications that would empower them to deploy and manage ...

6 Min Read
How to Integrate Security Into a DevOps World

Franklin Mosley

March 20, 2018

DevOps Security Introduction by Pete Cheslock, Senior Director Operations, Threat Stack Today we’re pleased to have Franklin Mosley, Senior ...

4 Min Read
How Threat Stack Does DevOps (Part III): Measuring and Optimizing System Health

Pete Cheslock

March 19, 2018

One of the most important things that any company can do to benefit from DevOps is define and implement useful, actionable metrics for visibility ...

4 Min Read
How Threat Stack Does DevOps (Part II): Engineering for Rapid Change

Pete Cheslock

March 16, 2018

Many organizations struggle with how and when to deploy software. I’ve worked at some companies where we had a “deploy week.” This was at least ...

4 Min Read
How Threat Stack Does DevOps (Part I): Best Practices in the Wild

Pete Cheslock

March 14, 2018

As Senior Director of Operations at Threat Stack, I am repeatedly asked one question by our customers: “How does Threat Stack 'do’ ...

5 Min Read
How We Integrated Rust Into Threat Stack’s Operations Workflow

John Baublitz

February 12, 2018

Note: The following post is related to Sensu, a monitoring tool for internal infrastructure health and alerting. If you use Sensu ...

3 Min Read
Velocity and Security: 5 Posts to Help You Get Security Up to Speed

Pat Cable

November 30, 2017

There’s a lot of talk in the business world — especially the software-driven side of it — about achieving and maintaining velocity. The ability ...

4 Min Read
7 Ways Business Processes Have Changed the Need for Security

Travis Wilkins

October 5, 2017

Considering how fast every facet of business is changing today, the job for Security teams has become much more complex — and critical. Not only ...

4 Min Read
Shifting to High-Velocity Cloud Security Operations

Venkat Pothamsetty

September 15, 2017

How to compress Mean Time To Resolution (MTTR) and drive operational efficiency Slashing MTTR is one way of shifting into a high-velocity security ...

2 Min Read
VPNNotify: A VPN Notification bot for Slack

Pat Cable

September 5, 2017

In an earlier post, we talked about how we implemented centralized authentication at Threat Stack. This project initially allowed us to create ...

5 Min Read
How to Use Automation to Decrease Mean Time To Know

Anthony Alves

July 13, 2017

Mean Time To Know (or MTTK for short) is one of the most important metrics in security operations. It measures how efficient the security team is at ...

4 Min Read
5 Pieces of Advice for Navigating the Security Culture Shift

Natalie Walsh

June 19, 2017

As security threats become a bigger part of the day-to-day concerns at all types of organizations, it has become vital to inculcate and promote a ...

5 Min Read
How to Leverage Automation to Make Your Organization Secure by Design

Bob Allin

May 24, 2017

Yesterday, we co-hosted a webinar with Amazon’s security strategist, Tim Sandage, and SessionM’s director of technical solutions and operations, ...

2 Min Read
Authkeys: Making Key-Based LDAP Authentication Faster

Pat Cable

April 21, 2017

Authkeys, Threat Stack’s new open source tool, performs LDAP lookups of SSH keys without the need for using scripts or other interpreted code. You ...

2 Min Read
Balancing Security and Your On-Call Rotation Using Deputize

Pat Cable

April 14, 2017

Threat Stack, like many other Software-as-a-Service providers, has an on-call rotation. During any week, two members of our engineering organization ...

4 Min Read
Resources for DevOps Pros to Learn About Security

Tom McLaughlin

April 6, 2017

These days, security should be part of everyone’s job. This is especially true for DevOps teams, which are responsible for developing, delivering, ...

8 Min Read
Ask Us Anything: Recap on How to Get Started With DevOpsSec

The Threat Stack Team

March 15, 2017

You’re probably familiar with DevOps by now. It’s the collaboration between Development and Operations teams by leveraging the same tools and ...

3 Min Read
DevOpsing at Home

Vitaliy Zakharov

March 13, 2017

I remember the days when SysAdmins bragged about server uptimes that were sometimes measured in years. I have been out of the SysAdmin world for ...

3 Min Read
How to Use Ops Tools for Security and Security Tools for Ops

Tim Armstrong

February 17, 2017

Investing in SecOps doesn’t just mean hiring folks who know how to blend together software development, IT operations, and security skillsets. It ...