51 total resources.

Webinar
Webcast
ML, More than a Buzzword

Jacob Williams, SANS Analyst and Chris Ford, VP of Product at Threat Stack discuss pragmatic approaches to ML to solve real world security use ...

Webinar
Webinar
How to Make the Promise of Machine Learning a Reality

Machine learning is often discussed as a silver bullet solution to every cloud security challenge, but when push comes to shove it has fallen short ...

Webinar
SANS Webinar: How to Deliver on the Promise of Machine Learning

Watch this webinar to learn how you can use telemetry, rules, and human expertise to unlock the true power of machine ...

Webinar
Improving Cloud Security by Implementing Full Stack Security Observability

Learn about the benefits of implementing full stack security observability in the earliest stages of the cloud journey and the value of monitoring ...

Webinar
Cyber Attack Simulation: A Crypto Crime in Action

See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly ...

Webinar
An Inside Look at Security and Compliance at a Hypergrowth Startup

Learn how the the Omada Health security team passes SOC 2, HIPAA, HITRUST with less than a 5 person security ...

Webinar
Automated Activity or Insider Threat: Can you Tell the Difference?

Learn how to investigate incidents involving automation tools and how you can best prepare your security team for the increased usage of automation ...

Webinar
Attack Simulation: Docker Application

Watch now to learn about microservices application design and the unique security concerns associated with this abstracted ...

Webinar
Attack Simulation: Deconstructing an Attack in a Containerized Application

Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the cloud management ...

Webinar
Best Practices for Scaling Securely in AWS

Watch this on-demand webinar featuring AWS Solutions Architect to learn about AWS best practices and tips for scaling fast without sacrificing ...

Webinar
Inside a Docker Cryptojacking Exploit

This webinar dives into the details of how Threat Stack identified and mitigated a real-world Docker Cryptojacking ...

Webinar
SANS Webinar: Real World Challenges for PCI Compliant Containers

Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underlying dependencies all while maintaining ...

Webinar
How Cloud-Native has Changed Application Security

Organizations are rapidly shifting to cloud-native environments to capitalize on speed, agility, and scale – in fact, a recent ESG survey finds ...

Webinar
SANS Webinar: Securing Microservices in Containerized Environments

SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized ...

Webinar
Inside an Active Shellbot Cryptomining Malware Campaign

Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed ...

Webinar
How SailPoint Secures Containerized Infrastructure on AWS Cloud

Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS ...

Webinar
Architecting and Securing Cloud Infrastructure

451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ...

Webinar
Anatomy of a Build Server Attack

Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server ...

Webinar
How to Achieve SOC 2 Compliance in a Containerized Environment

Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker ...

Webinar
Securing Microservices in a Containerized Environment

Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized ...

Webinar
Deploying Compliant Kubernetes

Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS ...