Latest Resources

Welcome to our Cloud Security Resource Center! We hope you find something interesting to read, watch, and share with your colleagues.

Video
Attack Simulation Overview

View Resource

Video
See How: Public Cloud Attack

View Resource

eBook
What Critical AWS Misconfigurations Look Like

With 73% of companies having critical AWS cloud security misconfigurations, how do you know whether yours put you at risk? And how do you identify ...

Video
Draft and Develop: A Solution to the Cyber Security Skills Shortage

Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent ...

Webinar
Draft and Develop: A Solution to the Cyber Security Skills Shortage

Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent ...

Webinar
Manage Decades of Technical Debt More Effectively

View Resource

Video
#SecOpsThis: Log Management

Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret ...

Video
#SecOpsThis: Secret Management

Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: Secret ...

Video
#SecOpsThis: AWS Keys

Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: AWS ...

Video
#SecOpsThis: On Call Rotation Access

Learn how Threat Stack's Pat Cable improved security and operations workflows at the same time in this video segment #SecOpsThis: On Call Rotation ...

Video
#SecOpsThis: SOC 2

Learn how Threat Stack's John Baublitz improved security and operations workflows at the same time in this video segment #SecOpsThis: SOC ...

eBook
Refocusing Security Operations in the Cloud Era

This report provides specific and actionable guidance for IT, DevOps, and security teams as they adapt to the increased adoption of public cloud and ...

Webinar
Visualizing Detection and Remediation in the Cloud

Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime ...

Webinar
How a Security Company Does Security

How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization ...

eBook
SecOps Playbook for Cloud Infrastructure

Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, ...

Webinar
Cyber Attack Simulation: A Crypto Crime in Action

See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly ...

Get Access to Threat Stack's Cloud Security Platform

Request Demo
Datasheet
Security for Evolving Infrastructure

View Resource