New infosec products of the week: June 21, 2019

Scytale Enterprise version 1.0 to scale service-to-service authentication Scytale released Scytale Enterprise 1.0, a SaaS platform that enables security and infrastructure engineers to standardize, scale, and accelerate service-to-service authenticatio… Continue reading New infosec products of the week: June 21, 2019

Webinar: Inside a Docker cryptojacking exploit

In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injecti… Continue reading Webinar: Inside a Docker cryptojacking exploit

Threat Stack Embeds Application Security Monitoring Tool

Threat Stack announced it has added Threat Stack Application Security Monitoring, an application runtime protection and risk detection tool, to the Threat Stack Cloud Security platform at no additional cost to users. That capability is based on runtim… Continue reading Threat Stack Embeds Application Security Monitoring Tool

Threat Stack and JASK speeding incident response times, improving productivity

Threat Stack, the leader in cloud security and compliance for infrastructure and applications, and JASK, the provider of the industry’s first cloud-native SIEM platform, announced a partnership designed to help security operations teams reduce the time… Continue reading Threat Stack and JASK speeding incident response times, improving productivity

How to diminish the great threat of legacy apps

The Equifax breach underscored the risk posed by unpatched software applications. As a refresher, 146 million customer records were exposed after a known vulnerability in Apache Struts was exploited. The reality is enterprises are supporting an ever-gr… Continue reading How to diminish the great threat of legacy apps

Threat Stack Cloud Security Platform features improved visibility of Kubernetes environments

Threat Stack, the leader in cloud infrastructure security and compliance, announced enhancements to the Threat Stack Cloud Security Platform that provide customers with complete security observability of Kubernetes-managed containers. The improved visi… Continue reading Threat Stack Cloud Security Platform features improved visibility of Kubernetes environments

Build-time security: Block risk and security issues from production rings

Build-time security has become a standard part of any security program and continues to grow in popularity with the shift left movement. In its most popular form, it’s a series of checks that take place as code makes its way from a developer’s laptop i… Continue reading Build-time security: Block risk and security issues from production rings

Threat Stack provides full workload observability across all public cloud provider platforms

Threat Stack, the leader in cloud infrastructure security, announced the next stage of its multi-cloud support which extends security observability to containers. Leveraging full workload observability of all major public cloud platforms including Amaz… Continue reading Threat Stack provides full workload observability across all public cloud provider platforms

New infosec products of the week: January 25, 2019

Threat Stack announces new API for streamlined DevOps and security workflows The new API will allow for the suppression and dismissal of alerts from existing tools, streamlining incident response workflows and reducing the mean time to response (MTTR)…. Continue reading New infosec products of the week: January 25, 2019