55 total resources.

Webinar
Glassdoor: Reflections on 2020 cloud security trends and predictions for 2021

Tune into this webinar, during which Anthony Moisant, CISO of Glassdoor and Doug Cahill, Vice President and Group Director, Cybersecurity at ...

Webinar
Security stories from the field: a fireside chat with Barak Engel and Brian Ahern

As the security industry continues to be redefined by new business models, modern technologies, advanced threats, and persistent compliance and ...

Webinar
Cloud Security Year-in-Review: Lessons Learned Through the Lense of a CISO

This year brought unprecedented changes to how businesses function, employees work, and how security organizations enable and protect it all. Chaim ...

Webinar
Introducing ThreatML by Threat Stack: ML-based Anomaly Detection to Accelerate Cloud Security and Compliance

Come learn about the benefits of ThreatML - Threat Stack’s new machine learning (ML) capability to enhance our Cloud Security Platform and ...

Webinar
Webcast
ML, More than a Buzzword

Jacob Williams, SANS Analyst and Chris Ford, VP of Product at Threat Stack discuss pragmatic approaches to ML to solve real world security use ...

Webinar
Webinar
How to Make the Promise of Machine Learning a Reality

Machine learning is often discussed as a silver bullet solution to every cloud security challenge, but when push comes to shove it has fallen short ...

Webinar
SANS Webinar: How to Deliver on the Promise of Machine Learning

Watch this webinar to learn how you can use telemetry, rules, and human expertise to unlock the true power of machine ...

Webinar
Improving Cloud Security by Implementing Full Stack Security Observability

Learn about the benefits of implementing full stack security observability in the earliest stages of the cloud journey and the value of monitoring ...

Webinar
Cyber Attack Simulation: A Crypto Crime in Action

See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly ...

Webinar
An Inside Look at Security and Compliance at a Hypergrowth Startup

Learn how the the Omada Health security team passes SOC 2, HIPAA, HITRUST with less than a 5 person security ...

Webinar
Automated Activity or Insider Threat: Can you Tell the Difference?

Learn how to investigate incidents involving automation tools and how you can best prepare your security team for the increased usage of automation ...

Webinar
Attack Simulation: Docker Application

Watch now to learn about microservices application design and the unique security concerns associated with this abstracted ...

Webinar
Attack Simulation: Deconstructing an Attack in a Containerized Application

Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the cloud management ...

Webinar
Best Practices for Scaling Securely in AWS

Watch this on-demand webinar featuring AWS Solutions Architect to learn about AWS best practices and tips for scaling fast without sacrificing ...

Webinar
Inside a Docker Cryptojacking Exploit

This webinar dives into the details of how Threat Stack identified and mitigated a real-world Docker Cryptojacking ...

Webinar
SANS Webinar: Real World Challenges for PCI Compliant Containers

Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underlying dependencies all while maintaining ...

Webinar
How Cloud-Native has Changed Application Security

Organizations are rapidly shifting to cloud-native environments to capitalize on speed, agility, and scale – in fact, a recent ESG survey finds ...

Webinar
SANS Webinar: Securing Microservices in Containerized Environments

SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized ...

Webinar
Inside an Active Shellbot Cryptomining Malware Campaign

Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed ...

Webinar
How SailPoint Secures Containerized Infrastructure on AWS Cloud

Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS ...

Webinar
Architecting and Securing Cloud Infrastructure

451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ...