Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
As a security engineer at Threat Stack, Stephen helps Threat Stack's customers with everything from deployment to fine tuning the Cloud Security Platform. After working with enterprise customers during his time at RSA Security, Stephen is now focused on helping organizations gain visibility into their cloud environments.
6 total posts.
November 19, 2019
Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and ...
October 1, 2019
The more data you store, the more attractive you become to cybercriminals, so SaaS companies need to recognize the importance of following security ...
June 4, 2019
In May 2018, the General Data Protection Regulation became enforceable. While it is largely a European Union regulation, you are still covered by it ...
January 30, 2019
Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables ...
December 14, 2018
A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...
August 14, 2018
The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave ...