Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

3 Min Read
How to Cope With the Security Talent Shortage in SecOps

Mark Moore

October 18, 2018

Security budgets are rising, but are they helping with challenges caused by the security talent shortage? This post offers insights from our recent ...

< 1 Min Read
Introducing AWS EC2 Tag Integration

Ivan Evsyukov

October 15, 2018

At Threat Stack, we are all about keeping you secure as you scale your business and your infrastructure. That's why we have added the ability to use ...

7 Min Read
A Deep Dive Into Secrets Management

Mike Broberg

October 9, 2018

There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices ...

5 Min Read
Container Security: Winter is Coming — Dress in Layers!

Hannah Klemme

October 4, 2018

Recently I had the pleasure of joining hundreds of DevOps pros, IT managers, and security engineers at the first ever Container Security event at ...

3 Min Read
5 SecOps Processes to Try Today

Mark Moore

October 3, 2018

DevOps has enabled businesses to bring products to market faster than ever before. But what about security? In our recent survey, Refocusing Security ...

2 Min Read
New SecOps eBook for Cloud Infrastructure – A Practitioner’s Guide for Security & Ops Teams

Steve Lowing

October 2, 2018

— Shifting From DevOps to SecOps — Organizations of all sizes have embraced DevOps as a way to deliver work quickly and reliably — but security ...

4 Min Read
Top 4 Questions to Ask About Compliance, Security, and Containers

Pan Chhum

September 27, 2018

Introducing containers into cloud infrastructure can lead to faster development cycles as well as more efficient use of infrastructure resources. ...

16 Min Read
50 Useful Docker Tutorials for IT Professionals (from Beginner to Advanced)

Hank Schless

September 26, 2018

Containers bring many benefits to DevOps teams along with a number of security concerns. This post brings you details about 50 Docker training ...

4 Min Read
Threat Stack Announces General Availability of Its Docker Containerized Agent

Hank Schless

September 25, 2018

Last month we announced that a containerized version of the Threat Stack Agent was coming soon for customers who are using containers to deploy cloud ...

15 Min Read
22 Most Under-Used AWS Security Metrics

Hank Schless

September 21, 2018

22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users ...

9 Min Read
Creating Custom CloudTrail Rules in Threat Stack

Paul Ivanivsky

September 19, 2018

The Threat Stack CloudTrail Base Ruleset has several out-of-the-box rules that alert users on activity within some of  AWS’s most popular services ...

21 Min Read
50 Best Cloud Security Podcasts

Mark Moore

September 17, 2018

For an updated list, take a look at Mark Moore's 25 Best Cloud Security Podcasts to Visit in 2020. Some of the earliest podcasters were ...

2 Min Read
Security by Design or by Accident

Matt Getty

September 11, 2018

Security has such a large number of subtopics that it’s sometimes difficult to define what the field looks like as a whole. It means something ...

15 Min Read
45 Useful and Informative GDPR Presentations & Resources

Hank Schless

September 5, 2018

The months leading up to May 25, 2018 produced a steady barrage of articles urging organizations to get ready for the GDPR and warning about the ...

4 Min Read
Top Compliance Pain Points by Industry

Lindsey Ullian

August 30, 2018

Whether you are adhering to mandatory regulations or voluntary cybersecurity frameworks, taking compliance seriously can be a huge boon to your ...

5 Min Read
How a DevOps Recruiter Hires for Containers and Serverless

Shaun Kelly

August 28, 2018

A Q&A With Michael Race, Head of DevOps, Salt Digital Recruitment When it comes to hiring for DevOps, there’s much to consider, especially if ...

3 Min Read
Magic for DevOps Teams — Threat Stack Announces Containerized Agent

Hank Schless

August 23, 2018

Every day, malicious actors are taking more complex routes into cloud infrastructure and leveraging increasingly covert traits to persist for longer ...

3 Min Read
Security Observability: Operationalizing Data in Complex, Distributed Systems

Hannah Klemme

August 16, 2018

It’s 2018 — companies are using multiple cloud providers, shifting to microservices, moving monoliths into containers, or maybe even moving to a ...

3 Min Read
What's In Our SecOps Stack: 6 Top Integrations

Mark Moore

August 15, 2018

When it comes to creating a solid SecOps program, an organization must consider people, processes, and technology. It’s not one area that makes a ...

3 Min Read
How to Find and Remediate Open Infrastructure Ports

Stephen Fitzgerald

August 14, 2018

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave ...

4 Min Read
Best Practices for User Access Management

Christian Lappin

August 9, 2018

Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In ...