Skip to content
  • Login
  • Support
  • Status
  • Demo
  • Platform
    • Book Your DemoSee the Threat Stack Cloud Security Platform in action.
    • Cloud Security PlatformOur integrated platform offers unmatched visibility, compliance, and data safety.
    • Integration FrameworkOur integrations provide better insights, security, and user experience.
    • PlansPackages ranging from small to large will support every stage of your cloud journey.
    • Threat Stack APIPull security-related information into your organization’s existing solutions.
  • Services
  • Use Cases
    • Featured PostHow to Make SecOps Work in the Real World
    • Insider Threat DetectionGet notified in real time when activity deviates from your established norm.
    • Continuous Cloud ComplianceSimplify meeting compliance and customer requirements.
    • DevSecOpsThreat Stack is purpose-built for Ops and Security teams running in the cloud.
    • AWS CloudTrail MonitoringGet a view inside your entire AWS-based infrastructure with security insights.
    • SOC 2 ComplianceOut-of-the-box rulesets and daily reports will help you simplify SOC 2.
    • Cloud Configuration AuditingBuild a secure cloud infrastructure by configuring your AWS environment.
    • GDPR ComplianceAddress GDPR compliance obligations across the biggest and operational changes.
  • Resources
    • Featured PostThe Best Cloud Security Conferences to Attend in 2018 and Beyond
    • Resource LibraryFind something interesting to read, watch, and share with your colleagues.
    • BlogContent that will let you keep up with the latest on cloud security and more.
    • Press ReleasesRead up on Threat Stack’s latest company updates & accomplishments.
    • Press KitFind Threat Stack logos, company information, and more.
  • About
    • Job OpportunityMarketing Programs Manager position in Boston, MA
    • CustomersMany of today’s fastest growing companies trust Threat Stack.
    • CompanyOur mission is to provide the highest quality insights to operate securely in the cloud.
    • CareersWe’re looking for dynamic, self-starting individuals to help drive growth.
    • ContactReach us by phone, email, or contact form for all questions and concerns.
  • Demo

Tag: DevOs

The Weekly Security and DevOps News Brief

by The Threat Stack Team   •   April 15, 2016
posted in Op-Ed

A lot happened in the world of security and DevOps this week. Here are top posts we saw:

Read more “The Weekly Security and DevOps News Brief”

Search Blog

Categories

  • Company News
  • Threat Stack Product
  • Customer Viewpoints
  • Business Insights
  • Cloud Security Planning
  • How To Strengthen Security
  • Compliance & Customer Requirements
  • Development
  • Op-Ed
  • Award

Tags

  • -Xlint
  • 2-Factor Authentication
  • 2015
  • 23 NYCRR 500
  • 2FA
  • 4 Rs Risk Management Methodology
  • 406 Ventures
  • Advisors
  • Agent
  • Agent Fatigue
  • Agile
  • Alert Fatigue
  • Alert Intelligence
  • Alert Management
  • Alert Trends
  • Alerts
  • Alternate Reality Games
  • Amazon RDS
  • Amazon Web Services (AWS)
  • Announcements
  • Anomaly Detection
  • Apache Struts Vulnerability
  • API
  • AppArmor
  • apps
  • APT
  • APT1
  • Aptly
  • architecture
  • ARG
  • Arlette Hart
  • Atlas Ventures
  • Attack Vector
  • Attribution
  • AuditD
  • Auditing
  • Authentication
  • Authkeys
  • Automated Monitoring and Alerting
  • Automated Security Threats
  • Automating AWS Security
  • Automation
  • Automobile Security
  • AWS
  • AWS Configuration
  • AWS Configuration Auditing
  • AWS Configuration Auditing Rulesets
  • AWS Configuration Auditing Single View
  • AWS Integration
  • AWS Lambda
  • AWS re:Invent 2017
  • AWS ReInvent
  • AWS Security
  • AWS Security Best Practices
  • AWS Security Roadmap
  • AWS Services
  • AWS Shared Responsibility Model
  • AWS Summit
  • AWS Summit Chicago 2015
  • AWS Summit New York 2015
  • AWS Summit NYC
  • AWS Summit San Francisco
  • AWS Tags
  • Azazel Rootkit
  • Azure
  • Azure Shared Responsibility Model
  • Banking Industry
  • Banks
  • Bash Exploit
  • Behavior
  • Benchmark SecOps Maturity
  • Best Practices
  • Black Hat 2014
  • Blog Post Series
  • Boston
  • Boston Business Journal CFO of the Year Award
  • Boston Conventions
  • Boston Visitors Map
  • botnet
  • brain m. ahern
  • Breaches
  • Bridging the Gap Between SecOps Intent and Reality
  • BSides Boston
  • Budget
  • Build vs Buy
  • Business Development Representatives
  • C++
  • Carbon Black
  • Career Development
  • CASB
  • Cassandra
  • Centralized Authentication
  • CEO
  • CEO Update
  • CFO
  • CFO of the Year Award
  • ChatOps
  • Chef
  • Chef InSpec
  • ChefConf 2017
  • Chris Wysopal
  • CIA
  • Cicada 3301
  • CIO
  • CIO Network conference
  • Circe
  • CISO
  • Cloud
  • cloud adoption
  • Cloud Compliance
  • Cloud Compliance eBook
  • Cloud Context
  • Cloud Defense
  • Cloud Environments
  • Cloud Forensics
  • Cloud IDS
  • Cloud Infrastructure
  • Cloud Knowledge
  • Cloud Migration
  • Cloud Migration eBook
  • Cloud Migration Planning
  • Cloud Operating Systems
  • Cloud Risk Management
  • Cloud SecOps Maturity Assessment
  • Cloud SecOps Program
  • Cloud Security
  • Cloud Security Alerting System
  • Cloud Security Awareness and Training
  • Cloud Security Awareness Program
  • Cloud Security Baseline
  • Cloud Security Best Practices
  • Cloud Security Buyer’s Guide
  • Cloud Security Conferences
  • Cloud Security Culture
  • Cloud Security Goals
  • Cloud Security Maturity
  • Cloud Security Maturity Model
  • Cloud Security Maturity Strategy
  • Cloud Security Paradigm
  • Cloud Security Planning
  • Cloud Security Planning Resources
  • Cloud Security Platform
  • Cloud Security Platform Alert Trends
  • Cloud Security Playbook
  • Cloud Security Predictions
  • Cloud Security Priorities
  • Cloud Security Solution
  • Cloud Security Strategy
  • Cloud Security Technologies
  • Cloud Security Use Cases
  • Cloud Security Use Cases Playbook
  • Cloud Security Vendor Selection
  • Cloud Security's Future
  • Cloud Service Providers
  • Cloud Sight
  • cloud threats
  • Cloud Workload Protection Platform
  • Cloud Workload Protection Platform (CWPP)
  • Cloud Workload Security
  • Cloud-Based Detection
  • Cloud-Native
  • Cloud-Native Security Platform
  • CloudSecurity
  • CloudTrail
  • CloudTrail Alerting
  • CloudTrail Events
  • Company
  • Compliance
  • Compliance Audit
  • Compliance for SaaS Companies
  • Compliance in the Cloud
  • Compliance Playbook
  • Compliance Reporting
  • Compliance Rule Sets
  • Compliance Strategy
  • confidence at scale
  • Configuration Auditing
  • Configuration Management
  • container security
  • Containers
  • Continuous Cloud Security
  • continuous monitoring
  • Continuous Security Improvement
  • Continuous Security Monitoring
  • corporate security
  • Cost Containment
  • Credentials
  • crypto war
  • Cryptocurrency
  • Cryptojacking
  • Cryptoming
  • Cryptomining
  • CSM
  • CSP
  • Culture
  • Customer Experience
  • Customer requirements
  • Customer Success
  • Customer Success Management
  • customer win
  • Customers
  • CVE-2016–3714
  • CWPP
  • Cyber Kill Chain
  • Cyber Security
  • Cyber Security Awareness
  • Cyber Security Awareness Month
  • Cyber Security Summit: Boston
  • Cyber Threats
  • cybersecurity
  • Cybersecurity Awareness
  • Cybersecurity Excellence Awards
  • Cybersecurity Excellence Awards 2018
  • Cybersecurity Growth and Development Center
  • Cybersecurity Requirements for Financial Service Companies
  • Dark Reading
  • data breach
  • data center
  • Data Encryption
  • data loss
  • data security
  • data-privacy
  • DDoS
  • Deferring Graduation
  • Degree Deferrment
  • Deployment
  • Deputize
  • Design
  • Dev
  • DevOps
  • DevOps at Home
  • DevOps Tools
  • DevOpsDays
  • DevOpsDays Austin 2017
  • DevOpsDays Austin 2018
  • DevOpsSec
  • DevOs
  • DevSecOps
  • digital security
  • Docker
  • DoD
  • Doobie
  • Duo Security
  • ebook
  • EBS Encryption
  • EC2
  • EC2 Integration
  • EC2 Security
  • Encryption
  • Endpoint Behavioral Profiling
  • Enterprise Security
  • Equifax
  • Error Handling
  • Establishing Security
  • Event
  • EVENTS
  • Exacom
  • Exception Handling
  • Exploits
  • FBI,
  • February Update
  • Federal Financial Institutions Examination Council
  • federal security
  • FERPA
  • FFIEC
  • File Integrity Monitoring
  • FIM
  • Finch
  • FinTech
  • Firewall
  • Flask
  • Framework
  • fraud
  • free
  • Function Composition
  • Functional Programming
  • Funding
  • Gartner
  • Gartner Inc.
  • Gartner’s Cloud Security Survey
  • GDPR
  • GDPR Compliance
  • GDPR for SaaS
  • Google Cloud
  • Government
  • Government IT
  • Government Security
  • Graylog
  • Grinch
  • Guided Rules Editor
  • Habitat
  • Hack Back
  • Hackathon
  • Hackers
  • Hacking
  • hadoop
  • HCI
  • healthcare
  • healthcare security
  • HelloSign
  • HIDS
  • High Velocity Sales
  • High-Velocity Cloud Security
  • High-Velocity-Security-Incident-Detection
  • hijack
  • HIPAA
  • Host Intrusion Detection System
  • HTTP Endpoint
  • HTTP request builder
  • Hybrid Cloud
  • Hybrid Environments
  • IAM
  • IAM Users and Groups
  • Identity Access and Management
  • Identity Management
  • IDS
  • immutable infrastructure
  • Implementing Cloud Security
  • Improving Cloud Security Maturity
  • Inc.
  • Incident Investigation
  • Incident Management
  • Incident Management & Reporting
  • Incident Management Tools
  • Incident Response
  • Incident Response Management
  • Indicators
  • Industry Best Practices
  • Information Security Requirements
  • InformationWeek Top Vendors to Watch in 2018
  • InfoSec
  • Infrastructure
  • Insider Threats
  • Inspector
  • Insurance
  • Insurance Companies
  • Integrations
  • IntelliJ
  • Internal Access Control
  • Internet of Things
  • Internship
  • Internships
  • Intrusion Detection
  • Intrusion Detection Platform
  • Intrusion Detection Platform (IDP)
  • Intrusion Detection Platform Alert Trends
  • Intrusion Detection Platforms
  • Intrusion Detection System (IDS)
  • Intrusion Detection Systems
  • IoT
  • IoT Devices
  • IoT Security
  • Jadon Montero
  • javascript
  • Jump Starting Cloud Security Playbook
  • Kevin Durkin
  • Kevin Durkin, CFO
  • LCCA
  • LDAP
  • LDAP Authentication
  • Lean Cloud Security
  • Lean Cloud Security Webinar
  • Lean Security Principles
  • legal
  • Linting
  • Linux
  • Linux kernel
  • Linux kernel Development
  • Linux Security
  • LISA16 Conference
  • LISA16 Conference, Boston
  • Log Collection
  • Logging
  • Logs
  • Low-Cost Cloud Security Best Practices
  • Managing Secrets
  • Managing Tech Debt
  • Mandiant
  • Mean Time To Know
  • Mean Time to Resolution
  • Meldown
  • Meltdown
  • Meltdown & Sceptre
  • Metrics
  • microservices
  • Mirai
  • mobility
  • mocha
  • Models
  • Monitorama
  • Monitorama 2017
  • Monitoring
  • Monitoring and Measuring Cloud Security
  • MTTK
  • MTTR
  • Nagios
  • nathan cooprider
  • National Cyber Security Awareness month
  • National Cybersecurity Awareness Month
  • Network Connection Monitoring
  • network security
  • Network security monitoring
  • new features
  • News Brief
  • NIDS
  • Nissan
  • NSM
  • O’Reilly OSCON Open Source Convention
  • Obstacles to SecOps Success
  • on-premise
  • OneLogin
  • Ongoing Education
  • Open Source
  • Open Source Security Tools
  • Operating Systems
  • Operational Efficiency
  • Operations
  • OPM
  • OpSec
  • OpSec Best Practices
  • Optimistic Updates
  • Optimizing Security Operations
  • Optimizing Security Teams
  • Orchestration
  • OS Updates
  • Oversight
  • PagerDuty
  • PagerDuty Summit
  • parboiled
  • parboiled2
  • parser generator
  • Passwords
  • Patch Management
  • Patterns
  • PCI
  • PCI Compliance
  • PCI DSS
  • PEG
  • Perkins School for the Blind
  • Pete Cheslock
  • PGP
  • PGP Tutorial
  • PHI
  • Phishing Scams
  • Pigsty
  • PII
  • Pokemon
  • Policy
  • Populi
  • Post-Mortems
  • Preventive Security Controls
  • privacy shield
  • Process Automation
  • Product
  • Product Enhancements
  • Product Management
  • product update
  • Production
  • Professional Development
  • Python
  • Python Flask Exception Handling
  • Python Flask Web Service
  • Quantified Self
  • Quill
  • Rails
  • Rapid Baselining
  • re:Invent 2017
  • ReactJS
  • Recruiting
  • Redux
  • Refactoring
  • Regulatory Compliance
  • Regulatory Compliance Strategy
  • Reporting
  • Resources
  • Response Velocity
  • Risk Acceptance
  • Risk Acceptance & Management
  • Risk Assessment and Management
  • Risk Management
  • Risk Management Strategy
  • RNC Data Exposure
  • Rogue One
  • root
  • root cause analysis
  • RSA
  • RSA Conference
  • RSA Conference 2018
  • Rules
  • Rulesets
  • Rust
  • S3
  • SaaS Security Playbook
  • Safe Harbor
  • Scala
  • Scala Advanced Language Features
  • Scala at Scale
  • Scala Best Practices
  • Scala Compiler
  • Scala Functional Programming
  • scalability
  • Scalability and Performance
  • Scalac
  • ScalikeJDBC
  • Scaling Securely
  • Sceptre
  • SDN
  • SecDevOps
  • SecOp
  • SecOps
  • SecOps Efficiency in the Cloud
  • SecOps Maturity
  • SecOps Maturity Assessment
  • SecOps Maturity Framework
  • SecOps Playbook
  • SecOps Tools
  • SecOps Webinar
  • SecOpsPlaybook
  • SecureWorld
  • Securing Mobile Devices
  • Securing Non-Production Environments
  • Security
  • Security Agents
  • Security Alert Management
  • Security Alerts
  • Security and Compliance Requirements
  • Security and Incident Management
  • Security at Speed & Scale
  • Security Awareness
  • Security Awareness Program
  • Security Baseline
  • Security Best Practices
  • Security Budget
  • Security by Design
  • Security Culture
  • Security Education
  • Security for SaaS
  • Security in Multi-Cloud Environments
  • Security in the cloud
  • Security Maturity
  • Security Monitoring
  • Security Response Velocity
  • security risk
  • Security Strategy
  • Security Technology
  • Security Tools
  • Security-Enabled DevOps
  • Selecting a Cybersecurity Vendor
  • Selecting Cloud Security Solution Providers
  • Selecting Cloud Security Solutions
  • Series C Funding
  • Server Management
  • services
  • Setting up a Cloud Security Council
  • Shadow IT
  • ShadowOps
  • Shared Responsibility Model
  • Shellshock
  • shush
  • SIEM
  • Slack
  • SMBs
  • Snorby
  • SOC 2
  • SOC 2 Compliance
  • SOC 2 compliance checking bot
  • Social Media
  • Social Media Security
  • Software Libraries
  • Software Performance
  • Software Project Management
  • Software Testing
  • Software Vulnerability Assessment & Management
  • Software-defined networking
  • Spectre
  • Sprout Social
  • St. Baldrick's Foundation
  • Star Wars
  • Startup
  • State of Cloud Security
  • STS
  • success story
  • sudoer
  • Supression
  • System Upgrades
  • Systems Thinking
  • TCO
  • Team
  • Team Building
  • Tech Debt
  • Tech Gives Back Day
  • Tech Tackles Cancer
  • TechJam 2017
  • Technology Underwriting Greater Good
  • Terraform
  • Test
  • Test System Security
  • Test Systems
  • Test-Driven Security
  • The Vasa: Redux
  • Threat Cloud Security Report 2017
  • Threat Detection
  • Threat Intel
  • Threat Intelligence
  • threat stack
  • Threat Stack 2018 Resolutions
  • Threat Stack Agent
  • Threat Stack API
  • Threat Stack Audit
  • Threat Stack Audit Trial
  • Threat Stack Cloud SecOps Maturity Framework
  • Threat Stack Cloud SecOps Program
  • Threat Stack Cloud Security Platform
  • Threat Stack Cloud Security Report 2017
  • Threat Stack Cloud Security Study
  • Threat Stack Compliance Alert Reports
  • Threat Stack Compliance Rule Sets
  • Threat Stack Customer Advisory Board
  • Threat Stack Cybersecurity Quiz
  • Threat Stack Funding
  • Threat Stack Intrusion Detection Platform
  • Threat Stack Investigate
  • Threat Stack Meltdown & Sceptre
  • Threat Stack Monitor
  • Threat Stack Pro
  • Threats
  • Threshold
  • Top Blog Posts
  • Total Cost of Ownership
  • TUGGs Guppy Tank
  • UI
  • Unit Testing
  • University of Hawaii
  • Updates
  • Usability
  • Use Cases
  • USENIX
  • User Experience
  • User Experience Design
  • UX
  • Velocity Conference 2017
  • Vendor Selection
  • Venture Capital
  • Veracode
  • verizon
  • Veronica Checksfiled
  • Visibility
  • VPN Access Notification
  • VPNNotify
  • Vulnerabilities
  • Vulnerability Detection
  • Vulnerability Management
  • Vulnerability Monitoring
  • Vulnerability Scan
  • W-2 Phishing Scams
  • Web Services
  • webhook
  • webhook API
  • Webinar
  • webpack
  • webpack build system
  • Whitelisting
  • Whitepaper
  • Windows
  • Windows Agent
  • Windows Security
  • Workflow Enhancements
  • workforce
  • workload
  • Workshop
  • Xconomy Tech Agenda
  • YubiKey

55 Summer St.

Boston, MA 02110

Copyright © 2018 Threat Stack, Inc.

  • Platform
    • Services
    • Cloud Security Platform
    • Integration Framework
    • Threat Stack API
    • Plans
  • Use Cases
    • Insider Threat Detection
    • AWS CloudTrail Monitoring
    • Continuous Cloud Compliance
    • GDPR Compliance
    • SOC 2 Compliance
    • Cloud Configuration Auditing
    • DevSecOps
  • Resources
    • Resource Library
    • Blog
    • Press Releases
    • Press Kit
  • About
    • Customers
    • Company
    • Careers
    • Contact
  • Demo
  • Add 1
    • Login
    • Support
    • Status
  • Add 2
    • Terms of Use
    • Privacy Policy
    • Security
×

Tell us about yourself and we'll be in touch right away.

Privacy Policy
×

Tell us about yourself and we'll be in touch right away.

Privacy Policy