20 DevSecOps Pros Reveal the Most Important Considerations in Building a DevSecOps Pipeline

In a recent Threat Stack report, 44 percent of DevOps professionals we surveyed said that when it comes to security-related issues, they’d have to rely on someone else. Even if DevOps pros had the time to dedicate to security issues, many develop… Continue reading 20 DevSecOps Pros Reveal the Most Important Considerations in Building a DevSecOps Pipeline

Findings From the Threat Stack Q3, 2019 SOC Report

Going ahead, the Threat Stack Security Operations Center (SOC) will be publishing a quarterly report summarizing lessons we’ve learned, trends we’ve identified, and recommendations you can follow to strengthen your cloud security observabil… Continue reading Findings From the Threat Stack Q3, 2019 SOC Report

The Top 3 Security Mistakes SaaS Companies are Making

The more data you store, the more attractive you become to cybercriminals, so SaaS companies need to recognize the importance of following security best practices. However, even those who understand this imperative can find it difficult to know where t… Continue reading The Top 3 Security Mistakes SaaS Companies are Making

Industry Experts Provide Tips For Successful Cyber Diligence in M&A

Mergers and acquisitions can be successful growth strategies for many companies. They bring together customers, IP, and assets — but they also bring together liabilities and risk as well. Among these are cybersecurity risks. “Cyber diligenc… Continue reading Industry Experts Provide Tips For Successful Cyber Diligence in M&A

Black Hat 2019 Recap: Transformation & the New Cybersecurity Culture

As the security industry finally leaves Las Vegas after a full week of Black Hat, Defcon, and Bsides, we wanted to set aside some time to take stock and think about all the trainings, presentations, research, and conversations during our week in the de… Continue reading Black Hat 2019 Recap: Transformation & the New Cybersecurity Culture

Join Threat Stack & 19,000 InfoSec Professionals at Black Hat USA 2019

Booth #2009 | August 7 – 8 | Las Vegas, NV Hope we see you at Black Hat next week for one of the world’s leading info security events. The show has something for everyone — research, training, latest trends, networking oppor… Continue reading Join Threat Stack & 19,000 InfoSec Professionals at Black Hat USA 2019

Stretch Right With Threat Stack Application Security Monitoring

In our last post, we explored how Threat Stack’s Application Security Monitoring embeds security in development processes — without negatively impacting agility or speed of application development and deployment. Empowering developers to pr… Continue reading Stretch Right With Threat Stack Application Security Monitoring

16 Cloud Security Experts Share the Most Costly Security Technology Misconceptions When It Comes to Cloud Migration

More companies are migrating their infrastructure to the cloud to take advantage of benefits like reliability, scalability, and lower costs, but cloud migration remains a complex task requiring careful consideration and planning. (For tips on planning … Continue reading 16 Cloud Security Experts Share the Most Costly Security Technology Misconceptions When It Comes to Cloud Migration

Stretching Left With Threat Stack Application Security Monitoring

Developers have always been overworked. They face a constant flow of feature-focused work from the business and need to balance that with work involving performance, quality and reliability, and technical debt. While DevOps and highly automated CI/CD p… Continue reading Stretching Left With Threat Stack Application Security Monitoring

Tips for Choosing the Right CI/CD Tools

Building an effective CI/CD pipeline can be a complex process with countless decisions that require a great deal of planning. Whether it’s a massive DevOps team or a single developer working alone, the more you can draw on practical, real-world k… Continue reading Tips for Choosing the Right CI/CD Tools