Latest Resources

Welcome to our Cloud Security Resource Center! We hope you find something interesting to read, watch, and share with your colleagues.

eBook
How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

Learn how OneLogin saves DevOps time, money, and resources with Threat Stack on AWS public ...

Webinar
SANS Webinar: Securing Microservices in Containerized Environments

SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized ...

Case Study
Stratasan Case Study

Learn how Stratasan worked with Threat Stack to streamline HIPAA compliance and increase security ...

Testimonial
Threat Stack Customer Stories

A collection of Threat Stack customers discussing how they use Threat Stack to increase security ...

Testimonial
Cloud Security Observability & Incident Response in an AWS Environment w/ Threat Stack & Red Canary

Learn how Threat Stack helped Red Canary gain a better understanding of how their environment was changing over ...

Webinar
Inside an Active Shellbot Cryptomining Malware Campaign

Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed ...

Webinar
How SailPoint Secures Containerized Infrastructure on AWS Cloud

Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS ...

Webinar
Architecting and Securing Cloud Infrastructure

451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ...

eBook
Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

Security Observability and outlines six principles that will help you create a roadmap for modernizing your monitoring and controls and proactively ...

Infographic
Anatomy of a Threat Stack Insight Report

View Resource

Report
Continuing Evolution of The Shellbot Malware

Threat Stack’s latest SOC report provides an in-depth analysis of this new variant of the ongoing, persistent Shellbot cyrptomining ...

Webinar
Anatomy of a Build Server Attack

Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server ...

Testimonial
Threat Stack Testimonial – SecOps Services

View Resource

Infographic
Identifying the Best Cloud Service Providers

How do you choose a public cloud provider — or if you’re planning to go multi-cloud — cloud ...

eBook
Overview of Threat Stack Security

View Resource

Webinar
How to Achieve SOC 2 Compliance in a Containerized Environment

Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker ...

Get Access to Threat Stack's Cloud Security Platform

Request Demo
eBook
Build-Time Security: Securing Your CI/CD Pipeline

Learn about the risks associated with build-servers and CI/CD processes across ephemeral ...