Latest Resources

Welcome to our Cloud Security Resource Center! We hope you find something interesting to read, watch, and share with your colleagues.

Webinar
Visualizing Detection and Remediation in the Cloud

Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime ...

Webinar
How a Security Company Does Security

How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization ...

eBook
SecOps Playbook for Cloud Infrastructure

Learn how to automate security in your infrastructure in a way that aligns Security and Operations tasks to reduce risk, stabilize infrastructure, ...

Webinar
Cyber Attack Simulation: A Crypto Crime in Action

See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly ...

Datasheet
Security for Evolving Infrastructure

View Resource

Webinar
How Sigstr Wins Business through Security

Learn how Sigstr builds customer trust and wins business through security with AWS and Threat ...

eBook
Securing Your SaaS Business from the Ground Up

Learn how to create a comprehensive security strategy on AWS for your SaaS Organization – and how Threat Stack can help you figure it all ...

eBook
How to Build and Mature a SecOps Program in the Cloud

Scaling your business is hard, but scaling your business securely is even harder. While modern cloud infrastructure has fostered speed and innovation ...

Webinar
How to Build and Mature a SecOps Program in the Cloud

Watch this video for practical advice to help you build and mature a cloud secops program for your ...

Video
The Threat Stack Cloud SecOps Program℠

Learn about our three-part program to unify Security and Operations to make security a competitive ...

Video
Threat Stack Cloud SecOps Program Announcement

Introducing the Threat Stack Cloud SecOps ...

Webinar
Pick Any Three: Good, Fast, or Safe. DevOps from Scratch

Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality ...

Case Study
How Threat Stack Passed SOC 2 with Zero Exceptions

Learn how Threat Stack leveraged Threat Stack and refined SecOps practices to achieve SOC 2 with zero ...

Webinar
How to Achieve Type 2 SOC 2 with Zero Exceptions

Do you have the chops needed to pass Type 2 SOC 2 with zero exceptions? Watch this video for advice from our Head of Ops and Sr. Infrastructure ...

eBook
Security Practices Guide for SOC 2 Compliance

Looking to achieve SOC 2 Compliance? Check out this guide to learn about the essential security practices needed to meet its ...

Webinar
52% of Companies Sacrifice Cybersecurity for Speed

Recent Threat Stack survey finds that over 50% of companies cut back on security to meet a business objective. Watch this webinar to learn about the ...

Get Access to Threat Stack's Cloud Security Platform

Request Demo
Infographic
52% of Companies Sacrifice Cybersecurity for Speed

Read through this infographic to understand why the vision for SecOps hasn't become a reality at most organizations – and learn the stats behind ...