Threat Stack Logo
  • Offerings
      Platform

    • Cloud Security Platform

      A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.

    • Services

    • Threat Stack Oversight (SOC)

      Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.

    • Threat Stack Insight

      Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.

    • Capabilities

    • File Integrity Monitoring

    • Intrusion Detection

    • Container & Kubernetes Security

    • Vulnerability Assessment

    • Cloud Security Posture Management

    • Application Security Monitoring

  • Use Cases
      Compliance

    • Cloud Compliance Overview

      • SOC 2
      • PCI DSS
      • ISO 27001
      • HIPAA
    • Operations

    • DevSecOps Security

    • Microservice Security

    • Insider Threat Detection

    • AWS Security

    • AWS Security

    • Fargate Security Monitoring

    • CloudTrail Monitoring

  • Why Threat Stack
      The Tech

    • ThreatML - Cloud Machine Learning

    • Integrations

    • XDR Solutions

    • The Human Expertise

    • Security Research Center

      • Cloud Attack
      • Shellbot
      • Docker Cryptomining
    • The Proof

    • Customers

    • Case Studies & Testimonials

    • Video Overview

    • Reviews

  • Resources
      Resource Center

    • View Resource Center

      • Webinars
      • eBooks & Whitepapers
      • Customer Case Studies & Testimonials
      • Videos
      • Reports
      • Datasheets
      • Infographics
    • Learn More

    • Blog

      Cloud security tips, insights, and ideas.

    • Newsroom

      Stay up to date with the latest press releases, news, and events from Threat Stack.

    • Press Kit

    • Cyber Attack Simulation

      Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.

      Watch Now
Support Login
Demo
Blog
  • Categories
    • Application Security
    • Cloud Security
    • Compliance
    • Container Security & Orchestration
    • DevSecOps
    • General
    • Professional Development
    • SOC Threat Intel
    • Threat Stack
    • Uncategorized
Subscribe to Our Blog!
About Nathan Paulhus

Nathan Paulhus is a Security Product Specialist at Threat Stack. With over 15 years' of experience, Nathan's expertise covers a wide range of skills including network administration, incident response, reverse engineering, and forensics.

Nathan Paulhus's Latest Blogs

4 total posts.

6 Min Read
Investigating Kubernetes Attack Scenarios in Threat Stack (part 2)

Nathan Paulhus

May 19, 2020

In part one of this two-part series, I showed how Threat Stack captures detailed metadata about operating system behaviors as they happen. I used the ...

6 Min Read
Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)

Nathan Paulhus

April 23, 2020

Kubernetes operators are getting better at protecting the clusters from external attacks. This is a success story for many companies that adopted ...

2 Min Read
How to Defend Against the runC Container Vulnerability

Nathan Paulhus

February 13, 2019

Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published detailsĀ on a vulnerability in runC, the underlying container ...

4 Min Read
Threat Stack Announces New and Enhanced CloudTrail Rules

Nathan Paulhus

December 10, 2018

As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps ...

Offerings
  • Cloud Security Platform
  • Threat Stack Oversight
  • Threat Stack Insight
  • Plans Overview
  • Trade Up Program
Resources
  • Resource Center
  • Blog
  • Newsroom
  • Press Kit
About
  • Company
  • Careers
  • Contact
  • Customers
  • Become a Partner
  • FAQ's
Application
  • Login
  • Support Docs
  • Submit a Support Ticket
View Status Page

Threat Stack logo

Copyright © 2012-2021 Threat Stack, Inc.

Privacy | Terms of Use | Security

This site uses cookies to provide better user experience. By using this site, you are accepting our use of cookies. View Privacy Policy.