Security Research & Strategy
How to Create a Security Risk Assessment for Containers in 5 Steps
When adopting containers, organizations need to create a risk profile for the types of threats and vulnerabilities they expect to experience. This type of analysis is especially important with containers, since the ...
20 DevSecOps Pros Reveal the Most Important Considerations in Building a DevSecOps Pipeline
In a recent Threat Stack report, 44 percent of DevOps professionals we surveyed said that when it comes to security-related issues, they’d have to rely on someone else. Even if DevOps pros ...
Findings From the Threat Stack Q3, 2019 SOC Report
Going ahead, the Threat Stack Security Operations Center (SOC) will be publishing a quarterly report summarizing lessons we’ve learned, trends we’ve identified, and recommendations you can follow to strengthen your cloud security ...
The Top 3 Security Mistakes SaaS Companies are Making
The more data you store, the more attractive you become to cybercriminals, so SaaS companies need to recognize the importance of following security best practices. However, even those who understand this imperative ...
Industry Experts Provide Tips For Successful Cyber Diligence in M&A
Mergers and acquisitions can be successful growth strategies for many companies. They bring together customers, IP, and assets — but they also bring together liabilities and risk as well. Among these are ...
Protecting Infrastructure With TLS Client Authentication
Here at Threat Stack we really like Yubikeys — and they’re a critical part of our security program. Many folks know Yubikeys for their ability to generate one-time codes for use as ...
Trash Taxi: Taking Out the Garbage in Your Infrastructure
Trash Taxi: A Lifecycle Management Tool for Superuser Discovery & Cleanup One of the security challenges we had at Threat Stack was managing developer access to production infrastructure. We already have a ...
Black Hat 2019 Recap: Transformation & the New Cybersecurity Culture
As the security industry finally leaves Las Vegas after a full week of Black Hat, Defcon, and Bsides, we wanted to set aside some time to take stock and think about all ...
Join Threat Stack & 19,000 InfoSec Professionals at Black Hat USA 2019
Booth #2009 | August 7 – 8 | Las Vegas, NV Hope we see you at Black Hat next week for one of the world’s leading info security events. The show has ...
Stretch Right With Threat Stack Application Security Monitoring
In our last post, we explored how Threat Stack’s Application Security Monitoring embeds security in development processes — without negatively impacting agility or speed of application development and deployment. Empowering developers to ...