Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
179 total posts.
June 7, 2017
Many organizations have limited resources (time, personnel, and money) for IT, and oftentimes only a small portion of that is devoted to security. ...
May 25, 2017
Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security ...
May 23, 2017
We hear (and at Threat Stack, we write) a lot about the shared security responsibility model. This is the idea that, when it comes to the cloud, ...
Megan Rees Ahigian
May 9, 2017
Amazon Web Services, the ubiquitous cloud infrastructure provider, has made it increasingly easy for businesses to move to the cloud and take ...
May 8, 2017
Gone are the days when the majority of businesses could point to the cloud warily and say, “I think my data’s safer on-prem.” Organizations ...
April 25, 2017
We’ve written before about the importance of looking inward, rather than out, when it comes to evaluating what types of cyberattacks are the ...
April 18, 2017
Threat Stack Delivers Wake Up Call
Wide open SSH and infrequent software updates among top risks identified in the majority of cloud-based ...
April 13, 2017
Security teams are expected to do a lot these days. From properly configuring the cloud environment, to protecting the organization from today’s ...
April 10, 2017
In a time when security consciousness is high and stories about security breaches are all too frequently in the headlines, your security team needs ...
April 5, 2017
This post examines the total cost of ownership (TCO) of a cloud security system, not in terms of the actual dollars and cents cost of a system, but ...
April 4, 2017
Cloud security is a complex subject, and customers sometimes tell us that one of their biggest challenges is simply knowing where to start.
The Threat Stack Team
March 10, 2017
Yesterday, we hosted one of our most popular webinars to date: Steps for Establishing Your AWS Security Roadmap. Threat Stack’s VP of Engineering, ...
February 28, 2017
One way organizations can improve their security and operational ability is to collect logs in a central location. Centralized logging allows ...
February 26, 2017
In Part 1 of this post we explained how you can find all the secrets in your environment. In Part 2 we will discuss effective ways to store and ...
February 23, 2017
Security can be a huge sales and business enabler, as I've mentioned before. If your company and its prospective customers are in a regulated ...
February 10, 2017
The IRS recently issued a warning that W-2 phishing scams are on the rise. In fact, 29,000 victims have already been claimed in 2017 to date! The ...
February 7, 2017
As we stated in the introduction to this blog post series, our purpose is to give you insight into the issues you should address when you are at the ...
February 6, 2017
It’s easy to get distracted by splashy headlines about breaches at corporations with household names. And of course state-sponsored, targeted ...
February 3, 2017
More and more companies are migrating to the cloud — and for good reason considering the many benefits such as speed, flexibility, and reduced ...
January 31, 2017
Your incident management process is greatly impacted by the tools you have available to carry it out. Technology should be your friend when it comes ...
January 27, 2017
Automating security processes and workflows can help teams lower Mean Time To Resolution (MTTR), maintain or strengthen an organization’s security ...