Threat Stack, Inc

@threatstack

The leader in cloud security and compliance for infrastructure and applications.

Vrijeme pridruživanja: kolovoz 2012.

Tweetovi

Blokirali ste korisnika/cu @threatstack

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @threatstack

  1. Check out a great deep dive into Babel F# pipeline operator and some hands on experience from .

    Poništi
  2. 4. velj

    In our latest blog, we gathered the top 25 cloud security podcasts you should be listening to in 2020. Check them out and stay updated:

    Poništi
  3. 4. velj

    You ever wonder how to get started with microservices and cloud-native applications? Hop on board with Arsalan Farooq, as he shares two ways to get there in :

    Poništi
  4. 3. velj

    From hardware to software and workflow, a great look at how built his Linux desktop specifically for cloud-native development:

    Poništi
  5. 3. velj

    Learn how to successfully embrace mobile DevOps practices from Nóra Bézi in

    Poništi
  6. 1. velj

    Myth vs. Reality debunks 3 big DevOps and Cloud myths in his latest article:

    Poništi
  7. 31. sij

    “The coronavirus, which is being widely discussed as a major news story, has already been used as bait by cybercriminals.” Be aware of malicious emails from public health centers. Get more details from in .

    Poništi
  8. 29. sij

    "There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives." Find out how to maximize the value of security metrics in :

    Poništi
  9. 29. sij

    As we close out the first month of 2020, we took some time to reflect on all the work that was put into the Threat Stack Cloud Security and Platform and Cloud SecOps Program throughout 2019. Stay tuned for a-lot more to come in 2020:

    Poništi
  10. 28. sij

    In case you wonder how to cope with cybersecurity skills shortage, describes 5 ways of dealing with it that don’t involve hiring. Get more details in .

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    It is incredibly important to architect for visibility in microservices from the ground up. While visibility is always important, it is hard to add visibility to microservices after the initial build, because they are often ephemeral.

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    Microservice applications don't remove the need for a risk assessment, but the attack surfaces are multiplied across the application. Microservices also frequently extend the perimeter, making threat modeling more difficult. &

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    Starting now - I'm covering security architecture for microservices with from . Your developers are using microservices already. If you're thinking "they implemented them securely" then I have uncomfortable news for you...

    Poništi
  14. 28. sij

    Less than two hours until and go live for their latest webinar divining into the details of secure microservices architecture design. Register now:

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    AT 3:30pm ET, I'll be delivering a webcast with from on secure microservices architectures. If you just got buzzword bingo from this tweet, but don't really know what it all means, tune in for this FREE webcast and get your learn on!

    Poništi
  16. 28. sij

    We're very excited to announce a partnership with ! The combination of full stack security observability, pre-built compliance rulesets, and Tevora's specialized consultancy will help customers streamline cloud security and compliance initiatives:

    Poništi
  17. 28. sij

    Don't miss out on a great opportunity to learn how you can design a secure microservices architecture. Register now for tomorrow's (1/28 at 3pm ET) webinar featuring and :

    Poništi
  18. 26. sij

    Find out how to implement node and pod affinity/anti-affinity in Kubernetes using a practical example from in .

    Poništi
  19. 25. sij

    Dive deep into some of the best software development practices you can use to mitigate the risk of buffer overflow exploits in this great article from in .

    Poništi
  20. 25. sij

    Emotet is back with a giant email-spamming campaign. Stay aware and get more details from in .

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·