Latest Blogs About "DevSecOps"

113 total posts.

8 Min Read
Scala @ Scale, Part 2: Compose Yourself!

Dave Hagman

September 12, 2016

Function composition is an extremely useful tool for creating modular, testable programs. One of the most natural applications of functional ...

6 Min Read
ShadowOps is Not Just Bad DevOps

Apollo Catlin

August 30, 2016

Some alarmists or buzzword-feeders like to say “DevOps is dead.” But this statement either betrays a grossly inaccurate understanding, or it’s ...

2 Min Read
Practical ReactJS and Redux (Optimistic Updates), Part 3

Cristiano Oliveira

August 29, 2016

Tips for Optimistic Updates This is the third in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app ...

5 Min Read
Useful Scala Compiler Options Part 2: Advanced Language Features

Ryan Plessner

August 26, 2016

Scala offers a number of advanced language features that are disabled by default. If you try to use any of them, the compiler will generate a warning ...

5 Min Read
SELECT This! Scala Data Access Library Review, Part 1

Lucas DuBois

August 24, 2016

At Threat Stack we love databases, and as we started to expand our Scala code base, we quickly realized we wanted to standardize on a way to talk to ...

4 Min Read
Real-World ReactJS and Redux, Part 2

Cristiano Oliveira

August 23, 2016

When this happens do that... or side effects! This is the second in a series of blog posts about real-world ReactJS usage and what we've ...

4 Min Read
How Your End Users Can Enable Their Mobile Phones to Act as 2FA Devices, Part 3

Tom McLaughlin

August 19, 2016

This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a ...

6 Min Read
Real-World ReactJS and Redux, Part 1

Cristiano Oliveira

August 17, 2016

This is the first in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app at Threat Stack. ...

6 Min Read
Useful Scala Compiler Options for Better Scala Development: Part 1

Ryan Plessner

August 9, 2016

At Threat Stack, we like to leverage our tools to the fullest. Since we use Scala, it only makes sense for us to always be looking into ways of ...

5 Min Read
How to Implement 2FA Security in Your Organization Using Duo Security, Part 2

Tom McLaughlin

August 5, 2016

In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the ...

5 Min Read
My Journey in Scala, Part 2: Tips for Using IntelliJ IDEA

Joe Baker

July 19, 2016

After spending significant time in dynamic languages, learning Scala can be challenging, so having the right tools (like IntelliJ) at your fingertips ...

5 Min Read
My Journey in Scala, Part 1: Awakenings

Joe Baker

July 12, 2016

When I started at Threat Stack over a year ago, I came in as a Platform Engineer expecting to work on JavaScript. I had no idea that Threat Stack ...

11 Min Read
Scala @ Scale, Part 1: Leaving Unhandled Errors Behind

Dave Hagman

July 5, 2016

The number of organizations investing in Scala is exploding, and for good reason. Scala combines Object Oriented and Functional capabilities as well ...

3 Min Read
Who is Responsible for a Security Breach?

Threat Stack Marketing Team

June 30, 2016

Before you can assign responsibility for a security breach, you need to go back to the scene of the crime and understand where it originated. No easy ...

3 Min Read
How to Apply DevOps Culture to Security & Why You Should Do It

Pete Cheslock

June 17, 2016

Unless you’ve been living under a rock (or don’t work in the tech industry), you’ve probably heard the term DevOps thrown around. A mashup of ...

3 Min Read
How to Ensure Simple and Efficient Security Deployments

Tom McLaughlin

June 10, 2016

On the heels of the recent announcement that Threat Stack has joined the Chef Partner Cookbook Program, it’s a good time to talk about some of the ...

4 Min Read
What to Do When You Can’t Fix a Security Vulnerability

Pete Cheslock

June 2, 2016

When you discover a security vulnerability affecting your environment, you want to fix it. Quick. ...

6 Min Read
Why Did We Need to Invent DevSecOps?

Tom McLaughlin

June 1, 2016

While the term "DevSecOps" has started to come up more often recently, we’re still wrapping our heads around “DevOps” to answer questions such ...

5 Min Read
Using webpack Build System in Existing Codebases

Vitaliy Zakharov

May 24, 2016

There are many tutorials, blog posts, and articles in the internets that deal with using cool and shiny new tools in cool and shiny new projects. As ...

2 Min Read
What’s on the Box!? An In-depth Look At OS Package Management

Lucas DuBois

March 29, 2016

Recently, I had the opportunity to help build out our vulnerability detection feature here at Threat Stack. I stepped into this project as I had many ...

3 Min Read
What All DevOps Teams Should Know About The AWS Shared Responsibility Model

Sam Bisbee

June 10, 2015

Keeping your cloud workloads secure, compliant, and protected while moving at the speed of DevOps is no easy task. Our team at Threat Stack knows ...