Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
179 total posts.
November 21, 2017
When you’re making a mental shift away from legacy, on-prem security thinking, you may be wondering what an effective, modern security solution ...
November 14, 2017
Your Guide to Intrusion Detection for Modern Infrastructure
Many organizations that need cloud security are laboring behind a cloud of myths — ...
October 30, 2017
It is very clear by now that the cloud has reached an inflection point. Public cloud investment continues its rapid expansion, driven in large part ...
October 27, 2017
Public cloud investment is expanding rapidly in 2017, with Gartner projecting 18% growth over the course of this year, including 36.8% growth for the ...
October 24, 2017
We recently conducted a survey with Enterprise Strategy Group (ESG) to gather data about the state of cloud security today. As they say, numbers ...
October 19, 2017
Security is a big concern for organizations of pretty much every size and shape. Once you have organization-wide agreement that security is a ...
October 11, 2017
Whether you’re in security, operations, or another related discipline, choosing the right cloud security products can be a complex process. With ...
October 6, 2017
Cloud technologies and traditional security processes are as bad a match as stripes and polka dots. They simply aren’t built to mix well together. ...
September 26, 2017
Post updated by:
Christian Lappin, Threat Stack Senior Security Engineer & David Weinstein, Threat Stack Senior Security Engineer
September 12, 2017
Good security takes effort. But it’s not impossible — far from it. The key to achieving better security is to focus on embedding the right types ...
August 31, 2017
The absence of a common framework for assessing Cloud Service Providers (CSPs), combined with the fact that no two CSPs are the same, complicates the ...
August 28, 2017
Oftentimes companies wait until they grow to a certain size or have a full technology stack before they begin thinking seriously about security. The ...
August 23, 2017
Security has always been about accepting and managing risk. It’s not about becoming the most secure company; its goal is to protect against likely ...
August 15, 2017
How would you know if your prevention methods failed to catch a critical threat? One of two ways: Either a customer, an auditor, or another third ...
August 7, 2017
Time-to-detection is everything these days. If you don’t find a breach yourself, chances are someone else will. A recent study points out that up ...
August 2, 2017
Gartner predicts that 95% of cloud security failures from now until 2020 will be the customer’s fault. That means when something goes wrong, it’s ...
July 25, 2017
If you are currently running an on-premise or hybrid environment with an eye to eventually making a complete transition to the cloud, you may be ...
July 7, 2017
Many companies today are turning to cloud security solutions — from security monitoring platforms to orchestration tools to alerting systems — in ...
June 23, 2017
Recently, headlines were hyping the largest ever exposure of voter information, involving some 9.5 billion data points related to 198 million U.S. ...
June 14, 2017
Update: For an interesting discussion of this post, take a listen to this Security Weekly podcast. The discussion starts at 8 minutes, 10 ...
June 13, 2017
Pop quiz: What’s the difference between vulnerable and exploitable?
As we’ve written before, a vulnerability is a weakness in a software ...