Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Modern Environment Security
File Integrity Monitoring
Container & Kubernetes Security
ThreatML - with Supervised Learning
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
113 total posts.
January 25, 2017
parboiled2 is a Macro-Based PEG Parser Generator written in Scala. It has become our preferred tool for creating parsers for simple grammars. It ...
January 11, 2017
Organizations wait to implement security solutions for a variety of reasons. One that we often hear is that they’re looking to land that cloud ...
January 5, 2017
I watched a Twilight Zone marathon over the New Year’s weekend, and it got me wondering about today’s Internet of Things (IoT). Are “Things” ...
December 22, 2016
Test systems are the guts of your overall system design. Test systems embody an incredible amount of the history of how your team’s code and ...
December 20, 2016
I’m a big fan of the YubiKey 4.
The YubiKey is a security device that originally outputted a 44-character “one time password” that could be ...
December 19, 2016
After moving our build infrastructure to webpack, one of the hurdles we had to overcome was finding a good way to run unit tests. Quite a few ...
December 12, 2016
Exploits feed on vulnerabilities. Vulnerabilities, in turn, pave the way for exploits. These closely related security concepts are often confused, ...
December 6, 2016
The cursor blinks steadily as you stare at a line of code that seemingly serves no purpose. You’re trying to fix a bug that is clearly manifested ...
December 2, 2016
Over the past couple of years, a discussion has been brewing in the Security community about the future of its work. On one hand, the need for a ...
November 28, 2016
We’ve all been there. You start your pretty new [insert language here] project, with a vow to do things right. You carefully discuss the project ...
November 23, 2016
While we have been using Scala for awhile at Threat Stack, we haven’t been overly satisfied with the HTTP servers that we have used. So a few ...
November 11, 2016
When someone in your company clicks on a bad link, it can spell bad news. But you know what’s worse? Them never telling you.
When employees are ...
November 8, 2016
One of the first things any security practitioner will tell you to do is keep your software up to date. It’s the number one way to protect against ...
November 3, 2016
Ask three people what SecOps is and chances are you’ll get three different descriptions:
It’s a team
It’s a job title
It’s a ...
October 28, 2016
I've seen some crazy things. I've also done some crazy things. I’m going to tell you about one of them.
A developer walks into a bar. He then ...
October 27, 2016
At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...
October 25, 2016
In many startups, centralized authentication is a "future us" problem. Setting up centralized auth is useful for managing your network, but requires ...
October 4, 2016
In my previous two posts on Scala Compiler options, we saw a number that can improve your experience developing Scala. In this post I want to focus ...
September 29, 2016
It won’t be long before network perimeters are a thing of the past. As companies continue to adopt the cloud, either going all-in or operating in ...
September 26, 2016
Here’s the situation: At Threat Stack we consume a torrent of security event data every day, and as many new customers come on board, the amount of ...
September 22, 2016
You’re a week into your new job and a colleague shouts out across the room before a big deployment: “Hey John, you’ve got security covered, ...