Latest Resources

Welcome to our Cloud Security Resource Center! We hope you find something interesting to read, watch, and share with your colleagues.

Webinar
Inside an Active Shellbot Cryptomining Malware Campaign

Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed ...

Webinar
How SailPoint Secures Containerized Infrastructure on AWS Cloud

Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS ...

Webinar
Architecting and Securing Cloud Infrastructure

451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ...

eBook
Cloud Security Observability: A Guide to Reducing Your Cloud Native Infrastructure Risk

Security Observability and outlines six principles that will help you create a roadmap for modernizing your monitoring and controls and proactively ...

Infographic
Anatomy of a Threat Stack Insight Report

View Resource

Report
Continuing Evolution of The Shellbot Malware

Threat Stack’s latest SOC report provides an in-depth analysis of this new variant of the ongoing, persistent Shellbot cyrptomining ...

Webinar
Anatomy of a Build Server Attack

Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server ...

Testimonial
Threat Stack Testimonial – SecOps Services

View Resource

Infographic
Identifying the Best Cloud Service Providers

How do you choose a public cloud provider — or if you’re planning to go multi-cloud — cloud ...

eBook
Overview of Threat Stack Security

View Resource

Webinar
How to Achieve SOC 2 Compliance in a Containerized Environment

Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker ...

eBook
Build-Time Security: Securing Your CI/CD Pipeline

Learn about the risks associated with build-servers and CI/CD processes across ephemeral ...

Infographic
Anatomy of a Threat Stack Oversight Notification

View Resource

Testimonial
Threat Stack Testimonial – Darran Rolls, SailPoint

View Resource

Webinar
Securing Microservices in a Containerized Environment

Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized ...

Datasheet
Data Portability

Threat Stack gives you full stack security observability across your cloud workloads, with the flexibility to consume your data where you want ...

Get Access to Threat Stack's Cloud Security Platform

Request Demo
Webinar
Deploying Compliant Kubernetes

Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS ...