Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
The heart of Threat Stack's innovation and product vision, Jen is passionate about designing the next generation of security tools for our modern infrastructure. Before co-founding Threat Stack, Jen worked on Mandiant's Research and Development team under Jamie Butler, developing innovative tools to analyze malware. At Symantec, she worked on the development team architecting a backend, that processed tens of terabytes of security data every day, as well as a security analyst, in Symantec's Managed Security Services division aimed at protecting the Fortune 500 against threats.
6 total posts.
September 16, 2015
Most enterprises do not build software or operate infrastructure the same way Netflix does. But there’s a lot to learn from the Silicon ...
February 24, 2015
This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations ...
December 24, 2014
(Note: The full version of this post is on the SysAdvent blog. Below is a summary.)
December 18, 2014
Recently, a security firm reported what they claimed to be a flaw with a major impact on organizations running Linux. (And apparently since all the ...
September 25, 2014
The internet is yet again feeling the aftereffects of another “net shattering” vulnerability: a bug in the shell ‘/bin/bash’ that widely ...
December 18, 2013
Too many times we hear and read about how insecure the cloud is or worse — that the cloud is already secure because IaaS providers have security ...