Tag: Threat Stack

Anthony Moisant, Ciso of Glassdoor: Reflections and Predictions on Cloud Security...

In this webinar you will learn: How security organizations can pivot and adapt to new workplace trends and technologies Why building customer confidence through...

More than a Buzzword: How to Deliver on the Promise of...

In this webinar we will discuss how you can get actual value from machine learning in real world cloud security deployments. We will cover: ...

How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

As companies like yours scale their cloud environment, the question has evolved from “what do I need to protect” to “how do I control...

Navigating the Knowns and Unknowns of Cloud Security

Threat Stack actively monitors and collects telemetry related to OS user activity, container runtimes and services, network processes, file integrity monitoring (FIM), system access,...

Assessing Risk & Modeling Threats to Strengthen Cloud-Native Security

In this paper, we look at this “new way.” Specifically, we offer insights into the unique nature of cloud-native environments and the types of...

Securing Microservices in Containerized Environments

Cloud security requires an understanding of the movement of data into and out of the application from the internet, the movement of information between...

Deconstructing an Attack in a Docker Application

You’ve been hacked. A developer leveraged a 3rd party library with unsanitized input that a SCA tool can’t flag. This containerized application goes into...

Also Checkout