51 total resources.

Video
Draft and Develop: A Solution to the Cyber Security Skills Shortage

Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent ...

eBook
Refocusing Security Operations in the Cloud Era

This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and ...

Webinar
Visualizing Detection and Remediation in the Cloud

Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime ...

Webinar
How a Security Company Does Security

How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization ...

eBook
SecOps Playbook for Cloud Infrastructure

Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, ...

Webinar
How Sigstr Wins Business through Security

Learn how Sigstr builds customer trust and wins business through security with AWS and Threat ...

Webinar
Pick Any Three: Good, Fast, or Safe. DevOps from Scratch

Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality ...

Webinar
How to Achieve Type 2 SOC 2 with Zero Exceptions

Do you have the chops needed to pass Type 2 SOC 2 with zero exceptions? Watch this video for advice from our Head of Ops and Sr. Infrastructure ...

eBook
Security Practices Guide for SOC 2 Compliance

Looking to achieve SOC 2 Compliance? Check out this guide to learn about the essential security practices needed to meet its ...

Webinar
52% of Companies Sacrifice Cybersecurity for Speed

Recent Threat Stack survey finds that over 50% of companies cut back on security to meet a business objective. Watch this webinar to learn about the ...

Report
SecOps Report: 52% of Companies Sacrifice Cybersecurity for Speed

Recent Threat Stack survey finds that 52% of companies sacrifice cybersecurity for speed. This report examines why the vision for SecOps hasn’t ...

Webinar
T-72 Hours to Report a Breach: Are you GDPR Ready?

GDPR deadlines are fast approaching and many US companies are behind the curve. Watch this video to learn how you can take a practical, manageable, ...

Webinar
Strategies for Monitoring and Measuring in the Cloud

Watch this video to learn how to evaluate and measure security in the cloud, and how you can work with service providers to improve ...

Webinar
5 Security Questions Your SaaS Business Should be Prepared to Answer in 2018

Watch this on-demand webinar to learn from Threat Stack's CSO, Sam Bisbee, about the top security concerns of 2018 and how you can create an ...

eBook
Understanding and Demonstrating Alignment with the GDPR

Read this guide to learn more about key GDPR provisions, breach handlings, and how to demonstrate alignment with ...

Webinar
Lean Cloud Security

Check out this video to learn how Allocadia's CISO utilizes a lean security strategy by automating processes and selecting the right tools for his ...

Webinar
Securing Your Non-Production Environments

Watch this video to learn more about the importance of securing non-production environments and how to get started ...

Webinar
Automating Cloud Security and Compliance

Watch this video to learn more about security and compliance in the cloud and how to get visibility and intrusion detection in your cloud ...

Report
Security Vendor Assessment Worksheet

Use this assessment worksheet to evaluate your organization's cloud security needs and then match the criteria with a best-fit ...

eBook
Cloud Security Assessment Worksheet

When did you last evaluate your cloud infrastructure security? If you just had to think about it, check out this handy and quick assessment to ...

Report
No Cost Cloud Security Practices Checklist

Security is hard, but not impossible. Use this checklist as a guide for securing your cloud environment, infrastructure, workloads, and users at no ...