14 total resources.

eBook
Securing Serverless Compute

This 451 Pathfinder Paper discusses the state of container and serverless security and provides recommendations on how to secure cloud workloads ...

eBook
Cloud Security Requirements Analysis Worksheet

This worksheet will help you determine your cloud security needs and pick the right solution for your use ...

eBook
How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

Learn how OneLogin saves DevOps time, money, and resources with Threat Stack on AWS public ...

eBook
Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

Security Observability and outlines six principles that will help you create a roadmap for modernizing your monitoring and controls and proactively ...

eBook
Build-Time Security: Securing Your CI/CD Pipeline

Learn about the risks associated with build-servers and CI/CD processes across ephemeral ...

eBook
Security Challenges in a Changing Cloud Infrastructure

Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps ...

eBook
Forrester TEI Study of Threat Stack

View Resource

eBook
The SecOps Playbook Part II: A Practitioner’s Guide for Security and Operations Teams

View Resource

eBook
What Critical AWS Misconfigurations Look Like

With 73% of companies having critical AWS cloud security misconfigurations, how do you know whether yours put you at risk? And how do you identify ...

eBook
Refocusing Security Operations in the Cloud Era

This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and ...

eBook
SecOps Playbook for Cloud Infrastructure

Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, ...

eBook
Securing Your SaaS Business from the Ground Up

Learn how to create a comprehensive security strategy on AWS for your SaaS Organization – and how Threat Stack can help you figure it all ...

eBook
Security Practices Guide for SOC 2 Compliance

Looking to achieve SOC 2 Compliance? Check out this guide to learn about the essential security practices needed to meet its ...

Report
TS_SecOps_Report

View Resource