Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

14 Min Read
50 Best Integration Testing Tools

Jackson Connell

May 21, 2020

Testing the applications you create is a necessary part of writing code. Finding the right tools to perform different testing functions can be ...

6 Min Read
Investigating Kubernetes Attack Scenarios in Threat Stack (part 2)

Nathan Paulhus

May 19, 2020

In part one of this two-part series, I showed how Threat Stack captures detailed metadata about operating system behaviors as they happen. I used the ...

10 Min Read
18 Compliance Experts & AppSec Professionals Reveal the Biggest AppSec Compliance Mistakes

Jackson Connell

April 29, 2020

According to Verizon’s 2019 Data Breach Investigations Report, web applications are the source of about one in four data breaches, and in 60 ...

6 Min Read
Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)

Nathan Paulhus

April 23, 2020

Kubernetes operators are getting better at protecting the clusters from external attacks. This is a success story for many companies that adopted ...

2 Min Read
Threat Stack SOC Report, Q1 2020: Security Teams Adjust to Remote Work

Jackson Connell

April 9, 2020

This morning the Threat Stack Security Operations Center (SOC) released its Q1 report of key findings and trends among Threat Stack customers. This ...

7 Min Read
10 Tips for Keeping Companies and Remote Workers Secure & Productive

Mark Moore

April 7, 2020

Telecommuting — also known as working from home (WFH), remote working, and a number of other names — has been around for about 50 years, having ...

4 Min Read
Hear & See Us Now — A Selection of Threat Stack’s Audiovisual Resources

Sarah Wills

April 2, 2020

Recently we published a roundup of Threat Stack audio resources to give you quick and easy access to information on cloud security and compliance ...

5 Min Read
Diving Deeper Into Runtimes: Kubernetes, CRI, and Shims

Tim West

April 1, 2020

In this blog post, we’re going to build on what we discussed in our last post — Container Security: Understanding the Hierarchy of Runtimes — ...

3 Min Read
Hear Us Now — Sharing a Few of Threat Stack’s Audio Resources

Sarah Wills

March 26, 2020

We want to help you make decisions that will strengthen and protect your organization while increasing its competitive edge. That’s why it’s ...

8 Min Read
How to Write an Automated Test Framework in a Million Little Steps

T.J. Maher

March 24, 2020

“Creating an automated regression test suite is not a simple matter. Crafting an automated test framework on which future tests can be built can be ...

3 Min Read
Ping Identity Achieves Cloud Security Observability in Rapidly Scaling Environment

Robin Stone

March 19, 2020

Recently I had an opportunity to speak with Ryan Ivis, Manager of Security Architecture at Ping Identity. Over the course of our discussion, Ryan ...

3 Min Read
Container Security: Understanding the Hierarchy of Runtimes

Tim West

March 17, 2020

So your organization uses containers, and you’ve got a basic handle on what that means and why they’re being utilized. Frequently, as security ...

4 Min Read
Container Security 101: The Basics You Need to Know

Mike Broberg

March 12, 2020

Over the last few years, there’s been a surge in the adoption of containers given the  operational agility and compute density they deliver. But ...

9 Min Read
15 Cloud & Cloud Security Certifications for 2020

Alan Nakashian-Holsberg

March 10, 2020

Cloud technology is continuing to evolve rapidly, making it a challenge for individuals and organizations to keep their knowledge, skills, and ...

6 Min Read
4 Cloud Security Tips for Emerging Tech Companies

Mark Moore

March 3, 2020

Young tech companies running in the cloud often deal with the same cloud security issues as larger organizations that are moving to the cloud from ...

4 Min Read
Enabling EMR Self-Service With ChatOps

Pat Cable

February 27, 2020

The Threat Stack Security Operations Center loves data. And Threat Stack has a lot of data! Our SOC analysts leverage Amazon Elastic MapReduce and ...

7 Min Read
Exporting Data From Threat Stack for Custom Analytics

Blaine Connaughton

February 25, 2020

Has this host been compromised? Did this host always do this? Everyone who has worked in operations/engineering/security has at some time had a ...

2 Min Read
Threat Stack SOC Analysis: Investigating Incidents Involving Automation Tools

Mike Broberg

February 20, 2020

As part of their 24/7 work supporting customers through the Cloud SecOps Program℠, the security analysts in the Threat Stack Security Operations ...

4 Min Read
Why Threat Stack Automates Microservices Tests Using Containers

Andrew Warren

February 18, 2020

Microservices, even when designed correctly, can be challenging to test. But when the system architecture evolves to the point where tens or hundreds ...

6 Min Read
Optimizing Detection of Breached Passwords

Mark Moore

February 13, 2020

In the increasingly difficult times of protecting our own digital life or helping others protect theirs, we must be ever vigilant about ensuring that ...

3 Min Read
Additions to the Threat Stack AWS CloudTrail Ruleset

Mike Broberg

February 11, 2020

Net-new rules for Amazon ECR and AWS Systems Manager API activity At Threat Stack, we process tens of billions of events for customers each day. ...