Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

3 Min Read
Just Enough Windows Server

Mike Broberg

July 23, 2019

— A special Thank You to Jose Bañez, Threat Stack Security Solution Engineer, for editing this blog post. If you’re like me, you grew up ...

4 Min Read
Stretch Right With Threat Stack Application Security Monitoring

Tim Buntel

July 18, 2019

In our last post, we explored how Threat Stack’s Application Security Monitoring embeds security in development processes — without negatively ...

16 Min Read
16 Cloud Security Experts Share the Most Costly Security Technology Misconceptions When It Comes to Cloud Migration

Pan Chhum

July 16, 2019

More companies are migrating their infrastructure to the cloud to take advantage of benefits like reliability, scalability, and lower costs, but ...

4 Min Read
Stretching Left With Threat Stack Application Security Monitoring

Tim Buntel

July 9, 2019

Developers have always been overworked. They face a constant flow of feature-focused work from the business and need to balance that with work ...

26 Min Read
Tips for Choosing the Right CI/CD Tools

Pan Chhum

July 2, 2019

Building an effective CI/CD pipeline can be a complex process with countless decisions that require a great deal of planning. Whether it’s a ...

4 Min Read
AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show

Jackson Connell

June 27, 2019

The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them ...

4 Min Read
AWS re:Inforce 2019 — Day 1 Recap

Jackson Connell

June 26, 2019

Note: For a recap of Day 2,  please take a look at AWS re:Inforce Recap: A Look Back at the First AWS Security Show. Day 1 of AWS re:Inforce ...

21 Min Read
50 of the Best DevOps Podcasts

Becky Scott

June 20, 2019

DevOps is a challenging and complex field, requiring professionals to constantly seek knowledge and acquire new skills and techniques to improve ...

3 Min Read
Threat Stack Launches New Unified Application Security Monitoring Solution

Tim Buntel

June 18, 2019

Threat Stack’s Application Security Monitoring enables cloud security observability across the full stack & full lifecycle in a single ...

6 Min Read
Tips on Recruiting Top Talent in the Current DevOps and Cloud Security Markets

Shaun Kelly

June 6, 2019

Q&A With Michael Race, Senior Consultant in Cloud/Infrastructure Security and DevSecOps at Stott and May Hiring and retaining talent in ...

4 Min Read
AWS GDPR: What You Need to Know

Stephen Fitzgerald

June 4, 2019

In May 2018, the General Data Protection Regulation became enforceable. While it is largely a European Union regulation, you are still covered by it ...

10 Min Read
Current Trends in Automated Software Testing

Laura Haiduck

May 30, 2019

10 Testing Pros Share Insights Into the Most Interesting Current Trends in Automated Software Testing Whether you're just getting started in ...

4 Min Read
Defining the “Full Stack” in Full Stack Security Observability

Tim Buntel

May 23, 2019

Here at Threat Stack, we’ve been talking a lot about security observability recently (check out this article and whitepaper). When you design and ...

8 Min Read
20 Best Continuous Integration Tools: A Guide to Optimizing Your CI/CD Processes

Ben Patterson

May 22, 2019

Continuous integration (CI) tools are the engine that drives today's SaaS software development strategy across all business, corporate, consumer, and ...

6 Min Read
Data Privacy is in the Spotlight as Colorado Enacts Landmark Consumer Data Privacy Bill (PCDP)

Kevin Kish

May 21, 2019

Introduction — by Lindsey Ullian, Threat Stack Compliance Manager Colorado has rightfully gained a reputation as one of the most socially ...

3 Min Read
How to Defend Against ZombieLoad

Mike Broberg

May 17, 2019

Earlier this week a group of security researchers from Graz University of Technology, imec-DistriNet, KU Leuven, Worcester Polytechnic Institute, and ...

2 Min Read
A Threat Stack SOC Analysis: The Continuing Evolution of the Shellbot Cryptomining Malware

Ethan Hansen

May 15, 2019

Update: Threat Stack Presents Threat Briefing On New Cryptomining Shellbot Malware Variant Available: On demand About This Threat ...

5 Min Read
Cloud Security Observability: How to Reduce Risk in Your Cloud-Native Infrastructure

Natalie Walsh

May 7, 2019

Security Observability has become an important concept recently as companies have started building software with a cloud-native mindset, embracing ...

4 Min Read
Beyond Checkboxes: 6 Cloud Security Measures All Healthcare Organizations Should Take

Tim Buntel

May 2, 2019

Modern healthcare is a full participant in the digital economy, and personal health information (PHI) is at its center. But today’s digital ...

4 Min Read
AWS HIPAA Compliance Best Practices Checklist

Mark Moore

April 25, 2019

The Health Insurance Portability and Accountability Act, or HIPAA, is a United States law that seeks to protect the privacy of patients’ medical ...

17 Min Read
50 Best Kubernetes Architecture Tutorials

Natalie Walsh

April 18, 2019

Kubernetes is a multi-functional, container-centric platform for managing workloads and services. Given the fact that containers and container ...