Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

5 Min Read
What is Cloud Workload Security?

Stephen Fitzgerald

December 14, 2018

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...

2 Min Read
Threat Stack Introduces Bulk Data Export Feature

Ivan Evsyukov

December 13, 2018

One of the biggest benefits of the Threat Stack Cloud Security Platform® is the deep level of visibility we bring to observing operator behaviors in ...

5 Min Read
9 Core & Specialty AWS Security Certifications

Alan Nakashian-Holsberg

December 11, 2018

For an updated discussion of these certifications and others, see Alan Nakashian-Holsberg's 9 AWS Security Certifications to Consider in ...

4 Min Read
Threat Stack Announces New and Enhanced CloudTrail Rules

Nathan Paulhus

December 10, 2018

As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps ...

6 Min Read
Detecting Unsafe Data Deserialization With Threat Stack

Aakash Prasad

December 6, 2018

UPDATED — January 22, 2019 The Threat Stack SOC is aware of the recent disclosure of a breach of the PHP Extension and Application Repository ...

4 Min Read
Aligning SecOps Teams With Compliance Roadmaps

Lindsey Ullian

December 4, 2018

Compliance is essential, and organizations need to get it right. Despite the importance of compliance, organizations often treat it as an ...

3 Min Read
AWS re:Invent 2018 Recap: Security, DevOps, ML, & Hybrid Cloud Take Center Stage

Steve Lowing

November 30, 2018

Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and ...

2 Min Read
Three Old-School Network Security Tips That (Still!) Work for Modern Infrastructure

Nathan Cooprider

November 20, 2018

The adage “Everything old is new again,” rings true in the cybersecurity industry as much as anywhere else. Some of the best practices from ...

23 Min Read
50 Useful Kubernetes Tutorials for IT Professionals

Mike Broberg

November 15, 2018

Technologies like Docker have made it easier to continuously deploy applications across any number of host servers. They eliminate the need for ...

4 Min Read
AWS EC2 Tagging — An Overview

Pan Chhum

November 1, 2018

Just this morning I received my weekly AWS announcements email, and as I usually do, took a peek to see if there was anything useful or interesting. ...

3 Min Read
How to Create a Threat Model for Cloud Infrastructure Security

Pat Cable

October 30, 2018

Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP The practice of creating a threat model can help teams ...

3 Min Read
3 Questions to Ask When You're Ready to Operationalize Your Security

Mark Moore

October 25, 2018

New global data from Checkmarx reveals that 92 percent of organizations struggle to implement security into DevOps — even though they say they want ...

3 Min Read
Security Budgeting Considerations for Containers

Dan Kirsch

October 23, 2018

When it comes to managing SecOps, you must consider all the risks at hand, as well as how you can address them. Many of today’s SecOps teams are ...

3 Min Read
How to Cope With the Security Talent Shortage in SecOps

Mark Moore

October 18, 2018

Security budgets are rising, but are they helping with challenges caused by the security talent shortage? This post offers insights from our recent ...

< 1 Min Read
Introducing AWS EC2 Tag Integration

Ivan Evsyukov

October 15, 2018

At Threat Stack, we are all about keeping you secure as you scale your business and your infrastructure. That's why we have added the ability to use ...

7 Min Read
A Deep Dive Into Secrets Management

Mike Broberg

October 9, 2018

There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices ...

5 Min Read
Container Security: Winter is Coming — Dress in Layers!

Hannah Klemme

October 4, 2018

Recently I had the pleasure of joining hundreds of DevOps pros, IT managers, and security engineers at the first ever Container Security event at ...

3 Min Read
5 SecOps Processes to Try Today

Mark Moore

October 3, 2018

DevOps has enabled businesses to bring products to market faster than ever before. But what about security? In our recent survey, Refocusing Security ...

2 Min Read
New SecOps eBook for Cloud Infrastructure – A Practitioner’s Guide for Security & Ops Teams

Steve Lowing

October 2, 2018

— Shifting From DevOps to SecOps — Organizations of all sizes have embraced DevOps as a way to deliver work quickly and reliably — but security ...

4 Min Read
Top 4 Questions to Ask About Compliance, Security, and Containers

Pan Chhum

September 27, 2018

Introducing containers into cloud infrastructure can lead to faster development cycles as well as more efficient use of infrastructure resources. ...

16 Min Read
50 Useful Docker Tutorials for IT Professionals (from Beginner to Advanced)

Hank Schless

September 26, 2018

Containers bring many benefits to DevOps teams along with a number of security concerns. This post brings you details about 50 Docker training ...