Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
179 total posts.
March 7, 2019
In this post we’ll try to develop an understanding of a typical attacker’s mindset and then show you how companies like yours can use this ...
February 12, 2019
In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey indicated that ...
January 16, 2019
This AWS Security Readiness Checklist is intended to help organizations evaluate their applications and systems before deployment on AWS. This ...
January 4, 2019
For the latest info —
take a look at Sarah Wills’
Best Cloud Security Conferences to Attend in 2020.
Securing any cloud infrastructure is ...
December 19, 2018
AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to ...
December 14, 2018
A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...
November 20, 2018
The adage “Everything old is new again,” rings true in the cybersecurity industry as much as anywhere else. Some of the best practices from ...
November 1, 2018
Just this morning I received my weekly AWS announcements email, and as I usually do, took a peek to see if there was anything useful or interesting. ...
October 30, 2018
Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP
The practice of creating a threat model can help teams ...
October 9, 2018
There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices ...
September 21, 2018
22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics
AWS offers a variety of built-in security features that users ...
September 17, 2018
For an updated list, take a look at Mark Moore's 25 Best Cloud Security Podcasts to Visit in 2020.
Some of the earliest podcasters were ...
September 11, 2018
Security has such a large number of subtopics that it’s sometimes difficult to define what the field looks like as a whole. It means something ...
August 14, 2018
The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave ...
August 9, 2018
Many organizations have policies in place that restrict internal access to information, but are they truly optimized for security and efficiency? In ...
August 8, 2018
20 Security Pros Reveal the One Thing They'd Change About AWS Security
AWS is one of the most popular cloud platforms among enterprises and even ...
July 25, 2018
If the headlines are any indication, hackers continue to exploit vulnerabilities in cloud infrastructure platforms, with targeted AWS attacks ...
July 11, 2018
The fourth — and final — blog post in our series of AWS Security Tips and Quotes offers tips on AWS Security Best Practices. So far the series ...
July 10, 2018
Over the past couple of weeks, both Macy's and Timehop experienced breaches as a result of authentication weaknesses. On July 4, social media startup ...
July 3, 2018
Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your ...
June 26, 2018
As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will ...