Skip to content
  • Login
  • Support
  • Status
  • Demo
  • Platform
    • Book Your DemoSee the Threat Stack Cloud Security Platform in action.
    • Cloud Security PlatformOur integrated platform offers unmatched visibility, compliance, and data safety.
    • Integration FrameworkOur integrations provide better insights, security, and user experience.
    • PlansPackages ranging from small to large will support every stage of your cloud journey.
    • Threat Stack APIPull security-related information into your organization’s existing solutions.
  • Services
  • Use Cases
    • Featured PostHow to Make SecOps Work in the Real World
    • Insider Threat DetectionGet notified in real time when activity deviates from your established norm.
    • Continuous Cloud ComplianceSimplify meeting compliance and customer requirements.
    • DevSecOpsThreat Stack is purpose-built for Ops and Security teams running in the cloud.
    • AWS CloudTrail MonitoringGet a view inside your entire AWS-based infrastructure with security insights.
    • SOC 2 ComplianceOut-of-the-box rulesets and daily reports will help you simplify SOC 2.
    • Cloud Configuration AuditingBuild a secure cloud infrastructure by configuring your AWS environment.
    • GDPR ComplianceAddress GDPR compliance obligations across the biggest and operational changes.
  • Resources
    • Featured PostThe Best Cloud Security Conferences to Attend in 2018 and Beyond
    • Resource LibraryFind something interesting to read, watch, and share with your colleagues.
    • BlogContent that will let you keep up with the latest on cloud security and more.
    • Press ReleasesRead up on Threat Stack’s latest company updates & accomplishments.
    • Press KitFind Threat Stack logos, company information, and more.
  • About
    • Job OpportunityMarketing Programs Manager position in Boston, MA
    • CustomersMany of today’s fastest growing companies trust Threat Stack.
    • CompanyOur mission is to provide the highest quality insights to operate securely in the cloud.
    • CareersWe’re looking for dynamic, self-starting individuals to help drive growth.
    • ContactReach us by phone, email, or contact form for all questions and concerns.
  • Demo

Tag: O’Reilly OSCON Open Source Convention

Join Threat Stack at DevOpsDays Austin & ChefConf 2017

by The Threat Stack Team   •   April 27, 2017
posted in Company News

DevOpsDays Austin 2017, ChefConf 2017, and OSCON are just around the corner, and anyone who follows Threat Stack knows we’re big supporters. Read more “Join Threat Stack at DevOpsDays Austin & ChefConf 2017”

Search Blog

Categories

  • Company News
  • Threat Stack Product
  • Customer Viewpoints
  • Business Insights
  • Cloud Security Planning
  • How To Strengthen Security
  • Compliance & Customer Requirements
  • Development
  • Op-Ed
  • Award

Tags

  • -Xlint
  • 2-Factor Authentication
  • 2015
  • 23 NYCRR 500
  • 2FA
  • 4 Rs Risk Management Methodology
  • 406 Ventures
  • Advisors
  • Agent
  • Agent Fatigue
  • Agile
  • Alert Fatigue
  • Alert Intelligence
  • Alert Management
  • Alert Trends
  • Alerts
  • Alternate Reality Games
  • Amazon RDS
  • Amazon Web Services (AWS)
  • Announcements
  • Anomaly Detection
  • Apache Struts Vulnerability
  • API
  • AppArmor
  • apps
  • APT
  • APT1
  • Aptly
  • architecture
  • ARG
  • Arlette Hart
  • Atlas Ventures
  • Attack Vector
  • Attribution
  • AuditD
  • Auditing
  • Authentication
  • Authkeys
  • Automated Monitoring and Alerting
  • Automated Security Threats
  • Automating AWS Security
  • Automation
  • Automobile Security
  • AWS
  • AWS Configuration
  • AWS Configuration Auditing
  • AWS Configuration Auditing Rulesets
  • AWS Configuration Auditing Single View
  • AWS Integration
  • AWS Lambda
  • AWS re:Invent 2017
  • AWS ReInvent
  • AWS Security
  • AWS Security Best Practices
  • AWS Security Roadmap
  • AWS Services
  • AWS Shared Responsibility Model
  • AWS Summit
  • AWS Summit Chicago 2015
  • AWS Summit New York 2015
  • AWS Summit NYC
  • AWS Summit San Francisco
  • AWS Tags
  • Azazel Rootkit
  • Azure
  • Azure Shared Responsibility Model
  • Banking Industry
  • Banks
  • Bash Exploit
  • Behavior
  • Benchmark SecOps Maturity
  • Best Practices
  • Black Hat 2014
  • Blog Post Series
  • Boston
  • Boston Business Journal CFO of the Year Award
  • Boston Conventions
  • Boston Visitors Map
  • botnet
  • brain m. ahern
  • Breaches
  • Bridging the Gap Between SecOps Intent and Reality
  • BSides Boston
  • Budget
  • Build vs Buy
  • Business Development Representatives
  • C++
  • Carbon Black
  • Career Development
  • CASB
  • Cassandra
  • Centralized Authentication
  • CEO
  • CEO Update
  • CFO
  • CFO of the Year Award
  • ChatOps
  • Chef
  • Chef InSpec
  • ChefConf 2017
  • Chris Wysopal
  • CIA
  • Cicada 3301
  • CIO
  • CIO Network conference
  • Circe
  • CISO
  • Cloud
  • cloud adoption
  • Cloud Compliance
  • Cloud Compliance eBook
  • Cloud Context
  • Cloud Defense
  • Cloud Environments
  • Cloud Forensics
  • Cloud IDS
  • Cloud Infrastructure
  • Cloud Knowledge
  • Cloud Migration
  • Cloud Migration eBook
  • Cloud Migration Planning
  • Cloud Operating Systems
  • Cloud Risk Management
  • Cloud SecOps Maturity Assessment
  • Cloud SecOps Program
  • Cloud Security
  • Cloud Security Alerting System
  • Cloud Security Awareness and Training
  • Cloud Security Awareness Program
  • Cloud Security Baseline
  • Cloud Security Best Practices
  • Cloud Security Buyer’s Guide
  • Cloud Security Conferences
  • Cloud Security Culture
  • Cloud Security Goals
  • Cloud Security Maturity
  • Cloud Security Maturity Model
  • Cloud Security Maturity Strategy
  • Cloud Security Paradigm
  • Cloud Security Planning
  • Cloud Security Planning Resources
  • Cloud Security Platform
  • Cloud Security Platform Alert Trends
  • Cloud Security Playbook
  • Cloud Security Predictions
  • Cloud Security Priorities
  • Cloud Security Solution
  • Cloud Security Strategy
  • Cloud Security Technologies
  • Cloud Security Use Cases
  • Cloud Security Use Cases Playbook
  • Cloud Security Vendor Selection
  • Cloud Security's Future
  • Cloud Service Providers
  • Cloud Sight
  • cloud threats
  • Cloud Workload Protection Platform
  • Cloud Workload Protection Platform (CWPP)
  • Cloud Workload Security
  • Cloud-Based Detection
  • Cloud-Native
  • Cloud-Native Security Platform
  • CloudSecurity
  • CloudTrail
  • CloudTrail Alerting
  • CloudTrail Events
  • Company
  • Compliance
  • Compliance Audit
  • Compliance for SaaS Companies
  • Compliance in the Cloud
  • Compliance Playbook
  • Compliance Reporting
  • Compliance Rule Sets
  • Compliance Strategy
  • confidence at scale
  • Configuration Auditing
  • Configuration Management
  • container security
  • Containers
  • Continuous Cloud Security
  • continuous monitoring
  • Continuous Security Improvement
  • Continuous Security Monitoring
  • corporate security
  • Cost Containment
  • Credentials
  • crypto war
  • Cryptocurrency
  • Cryptojacking
  • Cryptoming
  • Cryptomining
  • CSM
  • CSP
  • Culture
  • Customer Experience
  • Customer requirements
  • Customer Success
  • Customer Success Management
  • customer win
  • Customers
  • CVE-2016–3714
  • CWPP
  • Cyber Kill Chain
  • Cyber Security
  • Cyber Security Awareness
  • Cyber Security Awareness Month
  • Cyber Security Summit: Boston
  • Cyber Threats
  • cybersecurity
  • Cybersecurity Awareness
  • Cybersecurity Excellence Awards
  • Cybersecurity Excellence Awards 2018
  • Cybersecurity Growth and Development Center
  • Cybersecurity Requirements for Financial Service Companies
  • Dark Reading
  • data breach
  • data center
  • Data Encryption
  • data loss
  • data security
  • data-privacy
  • DDoS
  • Deferring Graduation
  • Degree Deferrment
  • Deployment
  • Deputize
  • Design
  • Dev
  • DevOps
  • DevOps at Home
  • DevOps Tools
  • DevOpsDays
  • DevOpsDays Austin 2017
  • DevOpsSec
  • DevOs
  • DevSecOps
  • digital security
  • Docker
  • DoD
  • Doobie
  • Duo Security
  • ebook
  • EBS Encryption
  • EC2
  • EC2 Integration
  • EC2 Security
  • Encryption
  • Endpoint Behavioral Profiling
  • Enterprise Security
  • Equifax
  • Error Handling
  • Establishing Security
  • Event
  • EVENTS
  • Exacom
  • Exception Handling
  • Exploits
  • FBI,
  • February Update
  • Federal Financial Institutions Examination Council
  • federal security
  • FERPA
  • FFIEC
  • File Integrity Monitoring
  • FIM
  • Finch
  • FinTech
  • Firewall
  • Flask
  • Framework
  • fraud
  • free
  • Function Composition
  • Functional Programming
  • Funding
  • Gartner
  • Gartner Inc.
  • Gartner’s Cloud Security Survey
  • GDPR
  • GDPR Compliance
  • GDPR for SaaS
  • Google Cloud
  • Government
  • Government IT
  • Government Security
  • Graylog
  • Grinch
  • Guided Rules Editor
  • Habitat
  • Hack Back
  • Hackathon
  • Hackers
  • Hacking
  • hadoop
  • HCI
  • healthcare
  • healthcare security
  • HelloSign
  • HIDS
  • High Velocity Sales
  • High-Velocity Cloud Security
  • High-Velocity-Security-Incident-Detection
  • hijack
  • HIPAA
  • Host Intrusion Detection System
  • HTTP Endpoint
  • HTTP request builder
  • Hybrid Cloud
  • Hybrid Environments
  • IAM
  • IAM Users and Groups
  • Identity Access and Management
  • Identity Management
  • IDS
  • immutable infrastructure
  • Implementing Cloud Security
  • Improving Cloud Security Maturity
  • Inc.
  • Incident Investigation
  • Incident Management
  • Incident Management & Reporting
  • Incident Management Tools
  • Incident Response
  • Incident Response Management
  • Indicators
  • Industry Best Practices
  • Information Security Requirements
  • InformationWeek Top Vendors to Watch in 2018
  • InfoSec
  • Infrastructure
  • Insider Threats
  • Inspector
  • Insurance
  • Insurance Companies
  • Integrations
  • IntelliJ
  • Internal Access Control
  • Internet of Things
  • Internship
  • Internships
  • Intrusion Detection
  • Intrusion Detection Platform
  • Intrusion Detection Platform (IDP)
  • Intrusion Detection Platform Alert Trends
  • Intrusion Detection Platforms
  • Intrusion Detection System (IDS)
  • Intrusion Detection Systems
  • IoT
  • IoT Devices
  • IoT Security
  • Jadon Montero
  • javascript
  • Jump Starting Cloud Security Playbook
  • Kevin Durkin
  • Kevin Durkin, CFO
  • LCCA
  • LDAP
  • LDAP Authentication
  • Lean Cloud Security
  • Lean Cloud Security Webinar
  • Lean Security Principles
  • legal
  • Linting
  • Linux
  • Linux kernel
  • Linux kernel Development
  • Linux Security
  • LISA16 Conference
  • LISA16 Conference, Boston
  • Log Collection
  • Logging
  • Logs
  • Low-Cost Cloud Security Best Practices
  • Managing Secrets
  • Managing Tech Debt
  • Mandiant
  • Mean Time To Know
  • Mean Time to Resolution
  • Meldown
  • Meltdown
  • Meltdown & Sceptre
  • Metrics
  • microservices
  • Mirai
  • mobility
  • mocha
  • Models
  • Monitorama
  • Monitorama 2017
  • Monitoring
  • Monitoring and Measuring Cloud Security
  • MTTK
  • MTTR
  • Nagios
  • nathan cooprider
  • National Cyber Security Awareness month
  • National Cybersecurity Awareness Month
  • Network Connection Monitoring
  • network security
  • Network security monitoring
  • new features
  • News Brief
  • NIDS
  • Nissan
  • NSM
  • O’Reilly OSCON Open Source Convention
  • Obstacles to SecOps Success
  • on-premise
  • OneLogin
  • Ongoing Education
  • Open Source
  • Open Source Security Tools
  • Operating Systems
  • Operational Efficiency
  • Operations
  • OPM
  • OpSec
  • OpSec Best Practices
  • Optimistic Updates
  • Optimizing Security Operations
  • Optimizing Security Teams
  • Orchestration
  • OS Updates
  • Oversight
  • PagerDuty
  • PagerDuty Summit
  • parboiled
  • parboiled2
  • parser generator
  • Passwords
  • Patch Management
  • Patterns
  • PCI
  • PCI Compliance
  • PCI DSS
  • PEG
  • Perkins School for the Blind
  • Pete Cheslock
  • PGP
  • PGP Tutorial
  • PHI
  • Phishing Scams
  • Pigsty
  • PII
  • Pokemon
  • Policy
  • Populi
  • Post-Mortems
  • Preventive Security Controls
  • privacy shield
  • Process Automation
  • Product
  • Product Enhancements
  • Product Management
  • product update
  • Production
  • Professional Development
  • Python
  • Python Flask Exception Handling
  • Python Flask Web Service
  • Quantified Self
  • Quill
  • Rails
  • Rapid Baselining
  • re:Invent 2017
  • ReactJS
  • Recruiting
  • Redux
  • Refactoring
  • Regulatory Compliance
  • Regulatory Compliance Strategy
  • Reporting
  • Resources
  • Response Velocity
  • Risk Acceptance
  • Risk Acceptance & Management
  • Risk Assessment and Management
  • Risk Management
  • Risk Management Strategy
  • RNC Data Exposure
  • Rogue One
  • root
  • root cause analysis
  • RSA
  • RSA Conference
  • Rules
  • Rulesets
  • Rust
  • S3
  • SaaS Security Playbook
  • Safe Harbor
  • Scala
  • Scala Advanced Language Features
  • Scala at Scale
  • Scala Best Practices
  • Scala Compiler
  • Scala Functional Programming
  • scalability
  • Scalability and Performance
  • Scalac
  • ScalikeJDBC
  • Scaling Securely
  • Sceptre
  • SDN
  • SecDevOps
  • SecOp
  • SecOps
  • SecOps Efficiency in the Cloud
  • SecOps Maturity
  • SecOps Maturity Assessment
  • SecOps Maturity Framework
  • SecOps Playbook
  • SecOps Tools
  • SecOps Webinar
  • SecOpsPlaybook
  • SecureWorld
  • Securing Mobile Devices
  • Securing Non-Production Environments
  • Security
  • Security Agents
  • Security Alert Management
  • Security Alerts
  • Security and Compliance Requirements
  • Security and Incident Management
  • Security at Speed & Scale
  • Security Awareness
  • Security Awareness Program
  • Security Baseline
  • Security Best Practices
  • Security Budget
  • Security by Design
  • Security Culture
  • Security Education
  • Security for SaaS
  • Security in Multi-Cloud Environments
  • Security in the cloud
  • Security Maturity
  • Security Monitoring
  • Security Response Velocity
  • security risk
  • Security Strategy
  • Security Technology
  • Security Tools
  • Security-Enabled DevOps
  • Selecting a Cybersecurity Vendor
  • Selecting Cloud Security Solution Providers
  • Selecting Cloud Security Solutions
  • Series C Funding
  • Server Management
  • services
  • Setting up a Cloud Security Council
  • Shadow IT
  • ShadowOps
  • Shared Responsibility Model
  • Shellshock
  • shush
  • SIEM
  • Slack
  • SMBs
  • Snorby
  • SOC 2
  • SOC 2 Compliance
  • SOC 2 compliance checking bot
  • Social Media
  • Social Media Security
  • Software Libraries
  • Software Performance
  • Software Project Management
  • Software Testing
  • Software Vulnerability Assessment & Management
  • Software-defined networking
  • Spectre
  • Sprout Social
  • St. Baldrick's Foundation
  • Star Wars
  • Startup
  • State of Cloud Security
  • STS
  • success story
  • sudoer
  • Supression
  • System Upgrades
  • Systems Thinking
  • TCO
  • Team
  • Team Building
  • Tech Debt
  • Tech Gives Back Day
  • Tech Tackles Cancer
  • TechJam 2017
  • Technology Underwriting Greater Good
  • Terraform
  • Test
  • Test System Security
  • Test Systems
  • Test-Driven Security
  • The Vasa: Redux
  • Threat Cloud Security Report 2017
  • Threat Detection
  • Threat Intel
  • Threat Intelligence
  • threat stack
  • Threat Stack 2018 Resolutions
  • Threat Stack Agent
  • Threat Stack API
  • Threat Stack Audit
  • Threat Stack Audit Trial
  • Threat Stack Cloud SecOps Program
  • Threat Stack Cloud Security Platform
  • Threat Stack Cloud Security Report 2017
  • Threat Stack Cloud Security Study
  • Threat Stack Compliance Alert Reports
  • Threat Stack Compliance Rule Sets
  • Threat Stack Customer Advisory Board
  • Threat Stack Cybersecurity Quiz
  • Threat Stack Funding
  • Threat Stack Intrusion Detection Platform
  • Threat Stack Investigate
  • Threat Stack Meltdown & Sceptre
  • Threat Stack Monitor
  • Threat Stack Pro
  • Threats
  • Threshold
  • Top Blog Posts
  • Total Cost of Ownership
  • TUGGs Guppy Tank
  • UI
  • Unit Testing
  • University of Hawaii
  • Updates
  • Usability
  • Use Cases
  • USENIX
  • User Experience
  • User Experience Design
  • UX
  • Velocity Conference 2017
  • Vendor Selection
  • Venture Capital
  • Veracode
  • verizon
  • Veronica Checksfiled
  • Visibility
  • VPN Access Notification
  • VPNNotify
  • Vulnerabilities
  • Vulnerability Detection
  • Vulnerability Management
  • Vulnerability Monitoring
  • Vulnerability Scan
  • W-2 Phishing Scams
  • Web Services
  • webhook
  • webhook API
  • Webinar
  • webpack
  • webpack build system
  • Whitelisting
  • Whitepaper
  • Windows
  • Windows Agent
  • Windows Security
  • Workflow Enhancements
  • workforce
  • workload
  • Workshop
  • Xconomy Tech Agenda
  • YubiKey

55 Summer St.

Boston, MA 02110

Copyright © 2018 Threat Stack, Inc.

  • Platform
    • Services
    • Cloud Security Platform
    • Integration Framework
    • Threat Stack API
    • Plans
  • Use Cases
    • Insider Threat Detection
    • AWS CloudTrail Monitoring
    • Continuous Cloud Compliance
    • GDPR Compliance
    • SOC 2 Compliance
    • Cloud Configuration Auditing
    • DevSecOps
  • Resources
    • Resource Library
    • Blog
    • Press Releases
    • Press Kit
  • About
    • Customers
    • Company
    • Careers
    • Contact
  • Demo
  • Add 1
    • Login
    • Support
    • Status
  • Add 2
    • Terms of Use
    • Privacy Policy
    • Security
×

Tell us about yourself and we'll be in touch right away.

Privacy Policy
×

Tell us about yourself and we'll be in touch right away.

Privacy Policy