Threat Stack Logo
  • Offerings
      Platform

    • Cloud Security Platform

      A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.

    • Services

    • Threat Stack Oversight (SOC)

      Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.

    • Threat Stack Insight

      Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.

    • Capabilities

    • File Integrity Monitoring

    • Intrusion Detection

    • Container & Kubernetes Security

    • Vulnerability Assessment

    • Cloud Security Posture Management

    • Application Security Monitoring

  • Use Cases
      Compliance

    • Cloud Compliance Overview

      • SOC 2
      • PCI DSS
      • ISO 27001
      • HIPAA
    • Operations

    • DevSecOps Security

    • Microservice Security

    • Insider Threat Detection

    • AWS Security

    • AWS Security

    • Fargate Security Monitoring

    • CloudTrail Monitoring

  • Why Threat Stack
      The Tech

    • ThreatML - Cloud Machine Learning

    • Integrations

    • The Human Expertise

    • Security Research Center

      • Cloud Attack
      • Shellbot
      • Docker Cryptomining
    • The Proof

    • Customers

    • Case Studies & Testimonials

    • Video Overview

    • Reviews

  • Resources
      Resource Center

    • View Resource Center

      • Webinars
      • eBooks & Whitepapers
      • Customer Case Studies & Testimonials
      • Videos
      • Reports
      • Datasheets
      • Infographics
    • Learn More

    • Blog

      Cloud security tips, insights, and ideas.

    • Newsroom

      Stay up to date with the latest press releases, news, and events from Threat Stack.

    • Press Kit

    • Cyber Attack Simulation

      Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.

      Watch Now
Support Login
Demo
Blog
  • Categories
    • Application Security
    • Cloud Security
    • Compliance
    • Container Security & Orchestration
    • DevSecOps
    • General
    • Professional Development
    • SOC Threat Intel
    • Threat Stack
    • Uncategorized
Subscribe to Our Blog!
About Christopher Ford

Chris is the Vice President of Product at Threat Stack, where he is responsible for Product Management and User Experience. He brings more than twenty years of experience leading product teams and building innovative security solutions, including Data Loss Prevention, Enterprise Mobility Management, and Secure Cloud Collaboration. Prior to joining Threat Stack, Chris was Chief Product Officer at Blue Cedar Networks and Senior Vice President of Product Management at Intralinks, a secure cloud collaboration platform.

Christopher Ford's Latest Blogs

5 total posts.

6 Min Read
How to Achieve Full Stack, Multi-Cloud Security Observability

Christopher Ford

March 14, 2019

You probably know AWS as the leading cloud platform provider. These days, however, many companies are using additional cloud providers as well. ...

3 Min Read
Infrastructure in Transition: Securing Containers

Christopher Ford

May 30, 2018

Organizations are migrating from virtual server workloads to containers at a frenzied pace, buying into the increasingly popular technology and ...

4 Min Read
Profile of an Ideal Security Hire in 2018

Christopher Ford

May 8, 2018

It seems that organizations are finally understanding the importance of bridging the gap between security and operations. In a survey we conducted ...

4 Min Read
How Sigstr Built Customer Trust with Threat Stack and AWS Security

Christopher Ford

April 25, 2018

Recently, I had a great conversation with Sam Smith, the Chief Architect for Sigstr, a fast-growing SaaS platform for email signature marketing. ...

4 Min Read
How to Benchmark Your SecOps Maturity and Make Continuous Improvement

Christopher Ford

April 10, 2018

Over 50% of companies admit to cutting back on security measures to meet a business deadline or objective, according to our recent SecOps Report. In ...

Offerings
  • Cloud Security Platform
  • Threat Stack Oversight
  • Threat Stack Insight
  • Plans Overview
  • Trade Up Program
Resources
  • Resource Center
  • Blog
  • Newsroom
  • Press Kit
About
  • Company
  • Careers
  • Contact
  • Customers
  • Become a Partner
  • FAQ's
Application
  • Login
  • Support Docs
  • Submit a Support Ticket
View Status Page

Threat Stack logo

Copyright © 2012-2021 Threat Stack, Inc.

Privacy | Terms of Use | Security

This site uses cookies to provide better user experience. By using this site, you are accepting our use of cookies. View Privacy Policy.