Welcome to our Cloud Security Resource Center! We hope you find something interesting to read, watch, and share with your colleagues.
How SailPoint Secures Containerized Infrastructure on AWS Cloud
Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS ...
Architecting and Securing Cloud Infrastructure
451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ...
Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk
Security Observability and outlines six principles that will help you create a roadmap for modernizing your monitoring and controls and proactively ...
Anatomy of a Threat Stack Insight Report
Continuing Evolution of The Shellbot Malware
Threat Stack’s latest SOC report provides an in-depth analysis of this new variant of the ongoing, persistent Shellbot cyrptomining ...
Anatomy of a Build Server Attack
Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server ...
Threat Stack Testimonial – SecOps Services
Identifying the Best Cloud Service Providers
How do you choose a public cloud provider — or if you’re planning to go multi-cloud — cloud ...
Overview of Threat Stack Security
How to Achieve SOC 2 Compliance in a Containerized Environment
Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker ...
Build-Time Security: Securing Your CI/CD Pipeline
Learn about the risks associated with build-servers and CI/CD processes across ephemeral ...
Anatomy of a Threat Stack Oversight Notification
Threat Stack Testimonial – Darran Rolls, SailPoint
Securing Microservices in a Containerized Environment
Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized ...
Threat Stack gives you full stack security observability across your cloud workloads, with the flexibility to consume your data where you want ...
Deploying Compliant Kubernetes
Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS ...
Get Access to Threat Stack's Cloud Security Platform
AWS Security: Visualizing Security Data in 2019
Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get ...