Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Modern Environment Security
File Integrity Monitoring
Intrusion Detection
Container & Kubernetes Security
ThreatML - with Supervised Learning
Cloud Compliance Overview
DevSecOps Security
Microservice Security
Insider Threat Detection
AWS Security
Fargate Security Monitoring
CloudTrail Monitoring
AWS Graviton2 / Arm Support
Integrations
Security Research Center
Customers
Case Studies & Testimonials
Video Overview
Reviews
View Resource Center
Blog
Cloud security tips, insights, and ideas.
Newsroom
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Please enable JavaScript in your browser for better use of the website, some features like forms and videos use Javascript in order to display the elements.
Cloud Security Insights, Thoughts, and Ideas
John Pinkham
July 5, 2022
Cyberattacks, especially crypto heists, are increasingly appearing in the news. While hackers are figuring out ways to steal hundreds of millions of ...
June 22, 2022
In cyber security, as customer data protection expectations and regulatory compliance mandates become more and more focused, organizations seek ways ...
Cyber security is known for adding resource burdens to DevSecOps teams. But those burdens can be significantly reduced by the right cloud security ...
June 21, 2022
Do you have those moments when suddenly the light goes on in your head, and you “get it”? Most of us do. Usually, it’s because I’m ...
June 7, 2022
Because Anomaly Detection Is No Longer Enough for Cloud-Native Security Until now, organizations securing cloud-native infrastructure had to rely ...
Nick Van Nuil
June 6, 2022
Threat Stack’s RVP of Engineering Chris Ford was a recent guest on a DataBreachToday.com webinar. This video and transcript focuses on the ...
May 3, 2022
Whether because of the pandemic, or to take advantage of the speed and agility of cloud-based systems and solutions, more organizations are moving to ...
We’ll state the obvious up front: The business world – the world – has shifted. And with it, there’s a new cybersecurity paradigm, as more ...
April 15, 2022
F5 Distributed Cloud WAAP's comprehensive protection and observability combined with Threat Stack’s threat monitoring and intelligence makes for a ...
April 14, 2022
Supervised Learning is a machine learning approach used for classification and prediction across data sets – and can be a huge boost in the world ...
April 1, 2022
A Twitter post showing a remote attack vulnerability through the popular Java Web application development framework Spring – dubbed Spring4Shell ...
February 23, 2022
Businesses are running everything via applications these days and are supporting this strategy by undergoing digital transformation and modernizing ...
December 21, 2021
The recent disclosure of the Log4shell exploit has impacted the operations of many organizations over the past few weeks. It has also been a ...
Amber Bennoui
August 11, 2021
As discussed in part one of this series, Threat Stack is committed to making meaningful changes to its user interface (UI) to further reduce key ...
July 28, 2021
This is a joint blog post written by Amber Bennoui, Senior Technical Product Manager for UI and Agent and Sabin Thomas, VP AppSec Engineering. What ...
July 21, 2021
Author’s note: This blog post is the first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases. The ...
Harrison Calato
June 29, 2021
Compliance has become increasingly ingrained in the day-to-day operations of organizations of all sizes. It has also emerged as a standard ...
June 24, 2021
This is a guest post collaboration between Squadcast & Threat Stack It’s common for security professionals to become inundated by alerts, ...
June 8, 2021
This is a guest blog written by IT Central Station In a recent report by Snyk, 99% of respondents recognized security as an important element in ...
May 12, 2021
Organizations have been forced to approach workplace technology initiatives with greater speed and agility, quickly shifting to the cloud and ...
April 21, 2021
This is a guest blog written by IT Central Station Many organizations view security operations as a cost center. There is some justification for ...