Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
174 total posts.
October 19, 2017
Security is a big concern for organizations of pretty much every size and shape. Once you have organization-wide agreement that security is a ...
October 11, 2017
Whether you’re in security, operations, or another related discipline, choosing the right cloud security products can be a complex process. With ...
October 6, 2017
Cloud technologies and traditional security processes are as bad a match as stripes and polka dots. They simply aren’t built to mix well together. ...
September 26, 2017
Post updated by:
Christian Lappin, Threat Stack Senior Security Engineer & David Weinstein, Threat Stack Senior Security Engineer
September 12, 2017
Good security takes effort. But it’s not impossible — far from it. The key to achieving better security is to focus on embedding the right types ...
August 31, 2017
The absence of a common framework for assessing Cloud Service Providers (CSPs), combined with the fact that no two CSPs are the same, complicates the ...
August 28, 2017
Oftentimes companies wait until they grow to a certain size or have a full technology stack before they begin thinking seriously about security. The ...
August 23, 2017
Security has always been about accepting and managing risk. It’s not about becoming the most secure company; its goal is to protect against likely ...
August 15, 2017
How would you know if your prevention methods failed to catch a critical threat? One of two ways: Either a customer, an auditor, or another third ...
August 7, 2017
Time-to-detection is everything these days. If you don’t find a breach yourself, chances are someone else will. A recent study points out that up ...
August 2, 2017
Gartner predicts that 95% of cloud security failures from now until 2020 will be the customer’s fault. That means when something goes wrong, it’s ...
July 25, 2017
If you are currently running an on-premise or hybrid environment with an eye to eventually making a complete transition to the cloud, you may be ...
July 7, 2017
Many companies today are turning to cloud security solutions — from security monitoring platforms to orchestration tools to alerting systems — in ...
June 23, 2017
Recently, headlines were hyping the largest ever exposure of voter information, involving some 9.5 billion data points related to 198 million U.S. ...
June 14, 2017
Update: For an interesting discussion of this post, take a listen to this Security Weekly podcast. The discussion starts at 8 minutes, 10 ...
June 13, 2017
Pop quiz: What’s the difference between vulnerable and exploitable?
As we’ve written before, a vulnerability is a weakness in a software ...
June 7, 2017
Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. ...
May 25, 2017
Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security ...
May 23, 2017
We hear (and at Threat Stack, we write) a lot about the shared security responsibility model. This is the idea that, when it comes to the cloud, ...
Megan Rees Ahigian
May 9, 2017
Amazon Web Services, the ubiquitous cloud infrastructure provider, has made it increasingly easy for businesses to move to the cloud and take ...
May 8, 2017
Gone are the days when the majority of businesses could point to the cloud warily and say, “I think my data’s safer on-prem.” Organizations ...