39 total resources.

eBook
Securing Serverless Compute

This 451 Pathfinder Paper discusses the state of container and serverless security and provides recommendations on how to secure cloud workloads ...

eBook
Security Challenges in a Changing Cloud Infrastructure

Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps ...

eBook
Forrester TEI Study of Threat Stack

View Resource

eBook
The SecOps Playbook Part II: A Practitioner’s Guide for Security and Operations Teams

View Resource

Report
Cloud Security Threat Briefing

An inside look at how Threat Stack investigated a sophisticated cloud attack that traverses public cloud ...

Webinar
Inside an Enterprise Breach on a Public Cloud Environment

Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and ...

Webinar
Draft and Develop: A Solution to the Cyber Security Skills Shortage

Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent ...

Video
#SecOpsThis: Log Management

Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret ...

Video
#SecOpsThis: Secret Management

Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret ...

Video
#SecOpsThis: AWS Keys

Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS ...

Video
#SecOpsThis: On Call Rotation Access

Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: On Call Rotation ...

Video
#SecOpsThis: SOC 2

Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: SOC ...

eBook
Refocusing Security Operations in the Cloud Era

This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and ...

Webinar
Visualizing Detection and Remediation in the Cloud

Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime ...

Webinar
How a Security Company Does Security

How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization ...

eBook
SecOps Playbook for Cloud Infrastructure

Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, ...

Webinar
Cyber Attack Simulation: A Crypto Crime in Action

See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly ...

Webinar
How Sigstr Wins Business through Security

Learn how Sigstr builds customer trust and wins business through security with AWS and Threat ...

Webinar
Pick Any Three: Good, Fast, or Safe. DevOps from Scratch

Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality ...

eBook
Security Practices Guide for SOC 2 Compliance

Looking to achieve SOC 2 Compliance? Check out this guide to learn about the essential security practices needed to meet its ...

Infographic
52% of Companies Sacrifice Cybersecurity for Speed

Read through this infographic to understand why the vision for SecOps hasn't become a reality at most organizations – and learn the stats behind ...