Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Modern Environment Security
File Integrity Monitoring
Container & Kubernetes Security
ThreatML - with Supervised Learning
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
32 total posts.
August 29, 2022
The benefits of working on the cloud far outweigh the risks, yet recent crypto-jacks and cyber-attacks on both the app/API and infrastructure levels ...
July 28, 2021
This is a joint blog post written by Amber Bennoui, Senior Technical Product Manager for UI and Agent and Sabin Thomas, VP AppSec Engineering.
May 12, 2021
Organizations have been forced to approach workplace technology initiatives with greater speed and agility, quickly shifting to the cloud and ...
March 16, 2021
What is Fargate?
Fargate was launched by AWS in 2017. It’s a serverless compute engine that deploys and runs containers without the need to ...
September 21, 2020
Amazon Web Services (AWS) Fargate is a compute engine for Amazon Elastic Container Service (ECS). With Fargate, you don’t need to provision and ...
August 4, 2020
As customers evaluate and design new forms of managed container architectures, Threat Stack will be there to provide a detailed view into running ...
May 19, 2020
In part one of this two-part series, I showed how Threat Stack captures detailed metadata about operating system behaviors as they happen. I used the ...
April 23, 2020
Kubernetes operators are getting better at protecting the clusters from external attacks. This is a success story for many companies that adopted ...
April 1, 2020
In this blog post, we’re going to build on what we discussed in our last post — Container Security: Understanding the Hierarchy of Runtimes — ...
March 17, 2020
So your organization uses containers, and you’ve got a basic handle on what that means and why they’re being utilized. Frequently, as security ...
March 12, 2020
Over the last few years, there’s been a surge in the adoption of containers given the operational agility and compute density they deliver. But ...
October 24, 2019
When adopting containers, organizations need to create a risk profile for the types of threats and vulnerabilities they expect to experience. This ...
September 24, 2019
Kubernetes is a popular DevOps tool thanks to its container-centric environment and portability across infrastructure providers. In 2018, Kubernetes ...
Miguel De Los Santos
March 19, 2019
Containers provide very important functionality: They package various software applications in “containers” to ensure that they are able to run ...
February 19, 2019
Now is a good time to review Threat Stack’s Docker integration in the wake of the recent runc CVE. The headline reporting gets a little hyperbolic, ...
February 13, 2019
Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying container ...
February 6, 2019
Containerized environments are increasingly popular, and Docker remains the most popular container solution for developers. But the process of moving ...
January 8, 2019
Recently, there has been a significant upswing in the adoption of containerized environments. In light of this, we’ve written a number of posts ...
January 3, 2019
Docker is a software platform that makes it easier to create, deploy, and run applications. Recently there has been a major surge in the adoption of ...
December 20, 2018
Making the transition from virtual machines to containers is a complex process that can take some time, particularly for larger, more complex ...
November 15, 2018
Technologies like Docker have made it easier to continuously deploy applications across any number of host servers. They eliminate the need for ...