Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Tim Buntel is VP of Application Security Products at Threat Stack. Prior to this role, Tim has built globally recognized software businesses for 20 years at startups, mid-sized companies in transition, and the largest global brands, including Atlassian, Adobe, Microsoft, and XebiaLabs with an emphasis on developer tools and platforms; helping developers build better software. He is also a founding mentor and board member at Smarter in the City, a non-profit high-tech accelerator with a mission to diversify Boston’s startup sector by providing support and resources for local minority-run ventures.
12 total posts.
January 21, 2020
Protection From More Types of Application Attacks
Threat Stack Application Security Monitoring detects vulnerabilities in code and blocks live ...
December 3, 2019
Lola.com initially became PCI compliant about a year ago, and this fall completed a successful PCI audit. Recently Katie Paugh, Lola’s Senior ...
September 26, 2019
Mergers and acquisitions can be successful growth strategies for many companies. They bring together customers, IP, and assets — but they also ...
September 10, 2019
A few months ago I gave a talk about securing microservices at the Boston Cloud Native Computing Meetup. After the presentation, a young developer (a ...
September 4, 2019
The current version of the PCI DSS is 3.2.1, published in May 2018. Requirement 6 states that you must “Develop and maintain secure systems and ...
August 23, 2019
The Payment Card Industry Data Security Standards (PCI DSS) provides a rigorous security framework and best practices for businesses that store, ...
July 18, 2019
In our last post, we explored how Threat Stack’s Application Security Monitoring embeds security in development processes — without negatively ...
July 9, 2019
Developers have always been overworked. They face a constant flow of feature-focused work from the business and need to balance that with work ...
June 18, 2019
Threat Stack’s Application Security Monitoring
enables cloud security observability across the full stack & full lifecycle in a single ...
May 23, 2019
Here at Threat Stack, we’ve been talking a lot about security observability recently (check out this article and whitepaper). When you design and ...
May 2, 2019
Modern healthcare is a full participant in the digital economy, and personal health information (PHI) is at its center. But today’s digital ...
March 5, 2019
This post explains how the PCI Security Standards Council has introduced its new PCI Software Security Framework to align PCI with modern software ...