Latest Resources

Welcome to our Cloud Security Resource Center! We hope you find something interesting to read, watch, and share with your colleagues.

Infographic
Anatomy of a Threat Stack Oversight Notification

View Resource

Testimonial
Threat Stack Testimonial – Darran Rolls, SailPoint

View Resource

Webinar
Securing Microservices in a Containerized Environment

Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized ...

Datasheet
Data Portability

Threat Stack gives you full stack security observability across your cloud workloads, with the flexibility to consume your data where you want ...

Webinar
Deploying Compliant Kubernetes

Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS ...

Webinar
AWS Security: Visualizing Security Data in 2019

Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get ...

eBook
Security Challenges in a Changing Cloud Infrastructure

Learn how changes to infrastructure affect security and introduce opportunities to work faster within existing DevOps ...

Testimonial
Cloud Security Observability and Incident Response with Threat Stack and Red Canary

View Resource

Testimonial
Threat Stack Testimonial – Chris Murdock, Conga

View Resource

Case Study
Highfive Case Study

View Resource

Testimonial
Threat Stack Testimonial – Eric Cohen, Genesys

View Resource

Case Study
Threat Stack Secures Lola’s Kubernetes-Based Infrastructure

Learn how Lola.com built a highly elastic and scalable containerized infrastructure while maintaining PCI compliance and security confidence in their ...

Report
Cloud Security Threat Briefing: Docker Cryptojacking Exploit

Cloud Security Threat Briefing: Inside an Actual Docker Cryptojacking ...

eBook
Forrester TEI Study of Threat Stack

View Resource

Webinar
Inside a Docker Cryptojacking Exploit

Threat Stack's Ethan Hansen will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications ...

Webinar
How to Spend Your Security Budget in a DevOps World

Learn how to build a scalable, cloud-based security program that fits your organization's ...

Get Access to Threat Stack's Cloud Security Platform

Request Demo
Testimonial
Container Security: Taking a Layered Approach to Infrastructure Security

View Resource