Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
103 total posts.
November 23, 2016
While we have been using Scala for awhile at Threat Stack, we haven’t been overly satisfied with the HTTP servers that we have used. So a few ...
November 11, 2016
When someone in your company clicks on a bad link, it can spell bad news. But you know what’s worse? Them never telling you.
When employees are ...
November 8, 2016
One of the first things any security practitioner will tell you to do is keep your software up to date. It’s the number one way to protect against ...
November 3, 2016
Ask three people what SecOps is and chances are you’ll get three different descriptions:
It’s a team
It’s a job title
It’s a ...
October 28, 2016
I've seen some crazy things. I've also done some crazy things. I’m going to tell you about one of them.
A developer walks into a bar. He then ...
October 27, 2016
At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...
October 25, 2016
In many startups, centralized authentication is a "future us" problem. Setting up centralized auth is useful for managing your network, but requires ...
October 4, 2016
In my previous two posts on Scala Compiler options, we saw a number that can improve your experience developing Scala. In this post I want to focus ...
September 29, 2016
It won’t be long before network perimeters are a thing of the past. As companies continue to adopt the cloud, either going all-in or operating in ...
September 26, 2016
Here’s the situation: At Threat Stack we consume a torrent of security event data every day, and as many new customers come on board, the amount of ...
September 22, 2016
You’re a week into your new job and a colleague shouts out across the room before a big deployment: “Hey John, you’ve got security covered, ...
September 12, 2016
Function composition is an extremely useful tool for creating modular, testable programs. One of the most natural applications of functional ...
August 30, 2016
Some alarmists or buzzword-feeders like to say “DevOps is dead.” But this statement either betrays a grossly inaccurate understanding, or it’s ...
August 29, 2016
Tips for Optimistic Updates
This is the third in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app ...
August 26, 2016
Scala offers a number of advanced language features that are disabled by default. If you try to use any of them, the compiler will generate a warning ...
August 24, 2016
At Threat Stack we love databases, and as we started to expand our Scala code base, we quickly realized we wanted to standardize on a way to talk to ...
August 23, 2016
When this happens do that... or side effects!
This is the second in a series of blog posts about real-world ReactJS usage and what we've ...
August 19, 2016
This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a ...
August 17, 2016
This is the first in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app at Threat Stack.
August 9, 2016
At Threat Stack, we like to leverage our tools to the fullest. Since we use Scala, it only makes sense for us to always be looking into ways of ...
August 5, 2016
In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the ...