5 SecOps Processes to Try Today

DevOps has enabled businesses to bring products to market faster than ever before. But what about security? In our recent survey, Refocusing Security Operations in the Cloud Era, 36% of businesses said their top IT goal over the next year is to respond… Continue reading 5 SecOps Processes to Try Today

New SecOps eBook for Cloud Infrastructure – A Practitioner’s Guide for Security & Ops Teams

— Shifting From DevOps to SecOps — Organizations of all sizes have embraced DevOps as a way to deliver work quickly and reliably — but security has often fallen by the wayside in the quest for speed. In a recent survey, 85% of respond… Continue reading New SecOps eBook for Cloud Infrastructure – A Practitioner’s Guide for Security & Ops Teams

Top 4 Questions to Ask About Compliance, Security, and Containers

Introducing containers into cloud infrastructure can lead to faster development cycles as well as more efficient use of infrastructure resources. With these kinds of competitive advantages, it’s no wonder why container orchestration platforms lik… Continue reading Top 4 Questions to Ask About Compliance, Security, and Containers

50 Useful Docker Tutorials for IT Professionals (from Beginner to Advanced)

Containers bring many benefits to DevOps teams along with a number of security concerns. This post brings you details about 50 Docker training resources that are designed to train beginner, intermediate, and advanced practitioners on current knowledge … Continue reading 50 Useful Docker Tutorials for IT Professionals (from Beginner to Advanced)

Threat Stack Announces General Availability of Its Docker Containerized Agent

Last month we announced that a containerized version of the Threat Stack Agent was coming soon for customers who are using containers to deploy cloud workloads. Today, we are excited to announce that our Docker Containerized Agent is now generally avai… Continue reading Threat Stack Announces General Availability of Its Docker Containerized Agent

22 Most Under-Used AWS Security Metrics

22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users can take advantage of, but it’s easy for users of all experience levels to get lost in the sea of … Continue reading 22 Most Under-Used AWS Security Metrics

Creating Custom CloudTrail Rules in Threat Stack

The Threat Stack CloudTrail Base Ruleset has several out-of-the-box rules that alert users on activity within some of  AWS’s most popular services (also the ones most prone to attack), including S3, IAM, Glacier, and Lambda. We do this to su… Continue reading Creating Custom CloudTrail Rules in Threat Stack

50 Best Cloud Security Podcasts

Some of the earliest podcasters were influencers in the technology and online space. For well over a decade, programs that specifically discuss security news and topics have been keeping people up to date on data and systems safety. For many, it’… Continue reading 50 Best Cloud Security Podcasts

Security by Design or by Accident

Security has such a large number of subtopics that it’s sometimes difficult to define what the field looks like as a whole. It means something vastly different to a Security Engineer, a CISO, and a Developer. Realistically, at most companies, Sec… Continue reading Security by Design or by Accident

Create a Security Risk Assessment for Containers in 5 Steps

When adopting containers, organizations need to create a risk profile for the types of threats and vulnerabilities they expect to experience. This type of analysis is especially important with containers, since the attack surface increases significantl… Continue reading Create a Security Risk Assessment for Containers in 5 Steps