Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
103 total posts.
September 15, 2017
How to compress Mean Time To Resolution (MTTR) and drive operational efficiency
Slashing MTTR is one way of shifting into a high-velocity security ...
September 5, 2017
In an earlier post, we talked about how we implemented centralized authentication at Threat Stack. This project initially allowed us to create ...
July 13, 2017
Mean Time To Know (or MTTK for short) is one of the most important metrics in security operations. It measures how efficient the security team is at ...
June 19, 2017
As security threats become a bigger part of the day-to-day concerns at all types of organizations, it has become vital to inculcate and promote a ...
May 24, 2017
Yesterday, we co-hosted a webinar with Amazon’s security strategist, Tim Sandage, and SessionM’s director of technical solutions and operations, ...
April 21, 2017
Authkeys, Threat Stack’s new open source tool, performs LDAP lookups of SSH keys without the need for using scripts or other interpreted code.
April 14, 2017
Threat Stack, like many other Software-as-a-Service providers, has an on-call rotation. During any week, two members of our engineering organization ...
April 6, 2017
These days, security should be part of everyone’s job. This is especially true for DevOps teams, which are responsible for developing, delivering, ...
The Threat Stack Team
March 15, 2017
You’re probably familiar with DevOps by now. It’s the collaboration between Development and Operations teams by leveraging the same tools and ...
March 13, 2017
I remember the days when SysAdmins bragged about server uptimes that were sometimes measured in years. I have been out of the SysAdmin world for ...
February 17, 2017
Investing in SecOps doesn’t just mean hiring folks who know how to blend together software development, IT operations, and security skillsets. It ...
January 25, 2017
parboiled2 is a Macro-Based PEG Parser Generator written in Scala. It has become our preferred tool for creating parsers for simple grammars. It ...
January 11, 2017
Organizations wait to implement security solutions for a variety of reasons. One that we often hear is that they’re looking to land that cloud ...
January 5, 2017
I watched a Twilight Zone marathon over the New Year’s weekend, and it got me wondering about today’s Internet of Things (IoT). Are “Things” ...
December 22, 2016
Test systems are the guts of your overall system design. Test systems embody an incredible amount of the history of how your team’s code and ...
December 20, 2016
I’m a big fan of the YubiKey 4.
The YubiKey is a security device that originally outputted a 44-character “one time password” that could be ...
December 19, 2016
After moving our build infrastructure to webpack, one of the hurdles we had to overcome was finding a good way to run unit tests. Quite a few ...
December 12, 2016
Exploits feed on vulnerabilities. Vulnerabilities, in turn, pave the way for exploits. These closely related security concepts are often confused, ...
December 6, 2016
The cursor blinks steadily as you stare at a line of code that seemingly serves no purpose. You’re trying to fix a bug that is clearly manifested ...
December 2, 2016
Over the past couple of years, a discussion has been brewing in the Security community about the future of its work. On one hand, the need for a ...
November 28, 2016
We’ve all been there. You start your pretty new [insert language here] project, with a vow to do things right. You carefully discuss the project ...