Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

5 Min Read
6 Ways to Prevent Crypto Mining and Other Cyber Attacks

John Pinkham

July 5, 2022

Cyberattacks, especially crypto heists, are increasingly appearing in the news. While hackers are figuring out ways to steal hundreds of millions of ...

< 1 Min Read
How ActiveCampaign Creates Compliance Framework Templates with Threat Stack

John Pinkham

June 22, 2022

In cyber security, as customer data protection expectations and regulatory compliance mandates become more and more focused, organizations seek ways ...

2 Min Read
How ThreatML Reduces the Burden on Teams

John Pinkham

June 22, 2022

Cyber security is known for adding resource burdens to DevSecOps teams. But those burdens can be significantly reduced by the right cloud security ...

6 Min Read
Making Supervised Learning Work: Threat Stack’s Unique Data Labeling Experience For Security

John Pinkham

June 21, 2022

Do you have those moments when suddenly the light goes on in your head, and you “get it”? Most of us do. Usually, it’s because I’m ...

4 Min Read
Threat Stack Adds Advanced Supervised Learning to ThreatML™ for Detection-In-Depth

John Pinkham

June 7, 2022

Because Anomaly Detection Is No Longer Enough for Cloud-Native Security Until now, organizations securing cloud-native infrastructure had to rely ...

2 Min Read
How Threat Stack’s Cyber Security Achieves Compliance – Video + Transcript

Nick Van Nuil

June 6, 2022

Threat Stack’s RVP of Engineering Chris Ford was a recent guest on a DataBreachToday.com webinar. This video and transcript focuses on the ...

2 Min Read
Biz Owners Fret About Threats and Compliance: Survey Results

John Pinkham

May 3, 2022

Whether because of the pandemic, or to take advantage of the speed and agility of cloud-based systems and solutions, more organizations are moving to ...

8 Min Read
Cloud Security Summarized: The What-Why-How of the Cyber-Security Paradigm Shift

John Pinkham

May 3, 2022

We’ll state the obvious up front: The business world – the world – has shifted. And with it, there’s a new cybersecurity paradigm, as more ...

4 Min Read
Mobilizing Forces to Help Organizations Protect Apps and Fight Cybercrime

John Pinkham

April 15, 2022

F5 Distributed Cloud WAAP's comprehensive protection and observability combined with Threat Stack’s threat monitoring and intelligence makes for a ...

2 Min Read
Supervised Learning: Securing App Infrastructure with High-Efficacy Alerts

John Pinkham

April 14, 2022

Supervised Learning is a machine learning approach used for classification and prediction across data sets – and can be a huge boost in the world ...

2 Min Read
Threat detection for the Spring4Shell vulnerability

John Pinkham

April 1, 2022

A Twitter post showing a remote attack vulnerability through the popular Java Web application development framework Spring – dubbed Spring4Shell ...

2 Min Read
Running Modern Applications Requires Comprehensive Security, Even At Your Cloud Infrastructure Level

John Pinkham

February 23, 2022

Businesses are running everything via applications these days and are supporting this strategy by undergoing digital transformation and modernizing ...

2 Min Read
High-precision threat detection for the Log4j vulnerability

John Pinkham

December 21, 2021

The recent disclosure of the Log4shell exploit has impacted the operations of many organizations over the past few weeks.  It has also been a ...

3 Min Read
PART TWO: Threat Stack Releases New Alert Context for Reduced MTTK

Amber Bennoui

August 11, 2021

As discussed in part one of this series, Threat Stack is committed to making meaningful changes to its user interface (UI) to further reduce key ...

4 Min Read
How Threat Stack Makes it Easy to Monitor Amazon EKS on AWS Fargate

Amber Bennoui

July 28, 2021

This is a joint blog post written by Amber Bennoui, Senior Technical Product Manager for UI and Agent and Sabin Thomas, VP AppSec Engineering. What ...

4 Min Read
PART ONE: How Threat Stack Reduces MTTK through Smart UI Design

Amber Bennoui

July 21, 2021

Author’s note: This blog post is the first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases. The ...

3 Min Read
Four Steps To Uplevel your Compliance Strategy

Harrison Calato

June 29, 2021

Compliance has become increasingly ingrained in the day-to-day operations of organizations of all sizes. It has also emerged as a standard ...

5 Min Read
Partner Spotlight: Threat Stack and Squadcast Integration Streamlines Alerts with Greater Context

Harrison Calato

June 24, 2021

This is a guest post collaboration between Squadcast & Threat Stack It’s common for security professionals to become inundated by alerts, ...

4 Min Read
Securely Leveraging the Business Benefits of the Cloud

Harrison Calato

June 8, 2021

This is a guest blog written by IT Central Station In a recent report by Snyk, 99% of respondents recognized security as an important element in ...

3 Min Read
Bridging the Security Skills Gap in a Cloud-First World

Harrison Calato

May 12, 2021

Organizations have been forced to approach workplace technology initiatives with greater speed and agility, quickly shifting to the cloud and ...

4 Min Read
Realizing ROI in Risk Detection and Compliance with Threat Stack

Harrison Calato

April 21, 2021

This is a guest blog written by IT Central Station Many organizations view security operations as a cost center. There is some justification for ...