Latest Blogs About "DevSecOps"

103 total posts.

4 Min Read
Ramping up on Finch: Avoiding Common Gotchas

Ryan Plessner

November 23, 2016

While we have been using Scala for awhile at Threat Stack, we haven’t been overly satisfied with the HTTP servers that we have used. So a few ...

4 Min Read
How to Conduct a Blameless Security Post-Mortem

Pete Cheslock

November 11, 2016

When someone in your company clicks on a bad link, it can spell bad news. But you know what’s worse? Them never telling you. When employees are ...

5 Min Read
Vulnerability Management: Navigating the Deep Dark Pit of Version Numbers

Tim Armstrong

November 8, 2016

One of the first things any security practitioner will tell you to do is keep your software up to date. It’s the number one way to protect against ...

5 Min Read
The 5 Ingredients of a Successful SecOps Implementation

Pete Cheslock

November 3, 2016

Ask three people what SecOps is and chances are you’ll get three different descriptions: It’s a team It’s a job title It’s a ...

6 Min Read
C++ in the Linux kernel

Nathan Cooprider

October 28, 2016

I've seen some crazy things. I've also done some crazy things. I’m going to tell you about one of them. A developer walks into a bar. He then ...

5 Min Read
Will SecOps Finally Close the Security and Operations Gap? A Q&A with Pete Cheslock

Pete Cheslock

October 27, 2016

At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...

5 Min Read
Five Lessons We Learned on Our Way to Centralized Authentication

Pat Cable

October 25, 2016

In many startups, centralized authentication is a "future us" problem. Setting up centralized auth is useful for managing your network, but requires ...

8 Min Read
Useful Scala Compiler Options, Part 3: Linting

Ryan Plessner

October 4, 2016

In my previous two posts on Scala Compiler options, we saw a number that can improve your experience developing Scala. In this post I want to focus ...

4 Min Read
How to Monitor Network Activity When Your Infrastructure Lacks an Edge

Pete Cheslock

September 29, 2016

It won’t be long before network perimeters are a thing of the past. As companies continue to adopt the cloud, either going all-in or operating in ...

4 Min Read
My Journey in Scala, Part 3: None is Better Than Undefined

Joe Baker

September 26, 2016

Here’s the situation: At Threat Stack we consume a torrent of security event data every day, and as many new customers come on board, the amount of ...

4 Min Read
How to Create a Security-Minded DevOps Organization: Three Best Practices

Pete Cheslock

September 22, 2016

You’re a week into your new job and a colleague shouts out across the room before a big deployment: “Hey John, you’ve got security covered, ...

8 Min Read
Scala @ Scale, Part 2: Compose Yourself!

Dave Hagman

September 12, 2016

Function composition is an extremely useful tool for creating modular, testable programs. One of the most natural applications of functional ...

6 Min Read
ShadowOps is Not Just Bad DevOps

Apollo Catlin

August 30, 2016

Some alarmists or buzzword-feeders like to say “DevOps is dead.” But this statement either betrays a grossly inaccurate understanding, or it’s ...

2 Min Read
Practical ReactJS and Redux (Optimistic Updates), Part 3

Cristiano Oliveira

August 29, 2016

Tips for Optimistic Updates This is the third in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app ...

5 Min Read
Useful Scala Compiler Options Part 2: Advanced Language Features

Ryan Plessner

August 26, 2016

Scala offers a number of advanced language features that are disabled by default. If you try to use any of them, the compiler will generate a warning ...

5 Min Read
SELECT This! Scala Data Access Library Review, Part 1

Lucas DuBois

August 24, 2016

At Threat Stack we love databases, and as we started to expand our Scala code base, we quickly realized we wanted to standardize on a way to talk to ...

4 Min Read
Real-World ReactJS and Redux, Part 2

Cristiano Oliveira

August 23, 2016

When this happens do that... or side effects! This is the second in a series of blog posts about real-world ReactJS usage and what we've ...

4 Min Read
How Your End Users Can Enable Their Mobile Phones to Act as 2FA Devices, Part 3

Tom McLaughlin

August 19, 2016

This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a ...

6 Min Read
Real-World ReactJS and Redux, Part 1

Cristiano Oliveira

August 17, 2016

This is the first in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app at Threat Stack. ...

6 Min Read
Useful Scala Compiler Options for Better Scala Development: Part 1

Ryan Plessner

August 9, 2016

At Threat Stack, we like to leverage our tools to the fullest. Since we use Scala, it only makes sense for us to always be looking into ways of ...

5 Min Read
How to Implement 2FA Security in Your Organization Using Duo Security, Part 2

Tom McLaughlin

August 5, 2016

In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the ...