threat stack cloud security security devops continuous monitoring continuous security threatstack secdevops security monitoring jen andre secops continuous integration devops security devops processes vulnerabilities configuration management shellshock compliance pete cheslock continuous deployment application security agile development process red hat redhat auditd sql injection security debt mark ellzey linux cyber future red hat auditd linux security linux audit linux audit subsystem kernel open source auditd security industry parsing black hat 2014 cloud behavioral detection threat monitoring integrate security behavioral models cloud sight system behavior development processes elastic security devops buzzword provision systems infrastructure as code operational security bottleneck corporate security policies security assessments attack vector replicate vulnerabilities data breaches code level security exploits security policy cyber security heartbleed attack surfaces mitigate risk security policies intrusion detection system intrusion detection continuous security monitoring host based intrusion detection network based intrusion detection network infrastructure software defined environments cloud workload cloud deployments cloud threat cloud breach network ids nids ids host ids hids security point solution security platform cloud environments sam bisbee software development upgrade software system upgrades cloud servers immutable infrastructure dan geer black hat security breaches internet privacy internet security security community security breach reporting reporting security breaches mandated security breach reporting verizon dbir breach reporting compromised data ops infosec developers gene kim tripwire infrastructure scalable infrastructure elastic infrastructure chef puppet continuous delivery cloud threats security threats customer data threats pragmatic security devops workflow database servers
See more