Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Modern Environment Security
File Integrity Monitoring
Container & Kubernetes Security
ThreatML - with Supervised Learning
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
113 total posts.
September 12, 2016
Function composition is an extremely useful tool for creating modular, testable programs. One of the most natural applications of functional ...
August 30, 2016
Some alarmists or buzzword-feeders like to say “DevOps is dead.” But this statement either betrays a grossly inaccurate understanding, or it’s ...
August 29, 2016
Tips for Optimistic Updates
This is the third in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app ...
August 26, 2016
Scala offers a number of advanced language features that are disabled by default. If you try to use any of them, the compiler will generate a warning ...
August 24, 2016
At Threat Stack we love databases, and as we started to expand our Scala code base, we quickly realized we wanted to standardize on a way to talk to ...
August 23, 2016
When this happens do that... or side effects!
This is the second in a series of blog posts about real-world ReactJS usage and what we've ...
August 19, 2016
This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a ...
August 17, 2016
This is the first in a series of blog posts about real-world ReactJS usage and what we've learned scaling our app at Threat Stack.
August 9, 2016
At Threat Stack, we like to leverage our tools to the fullest. Since we use Scala, it only makes sense for us to always be looking into ways of ...
August 5, 2016
In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the ...
July 19, 2016
After spending significant time in dynamic languages, learning Scala can be challenging, so having the right tools (like IntelliJ) at your fingertips ...
July 12, 2016
July 5, 2016
The number of organizations investing in Scala is exploding, and for good reason. Scala combines Object Oriented and Functional capabilities as well ...
Threat Stack Marketing Team
June 30, 2016
Before you can assign responsibility for a security breach, you need to go back to the scene of the crime and understand where it originated. No easy ...
June 17, 2016
Unless you’ve been living under a rock (or don’t work in the tech industry), you’ve probably heard the term DevOps thrown around. A mashup of ...
June 10, 2016
On the heels of the recent announcement that Threat Stack has joined the Chef Partner Cookbook Program, it’s a good time to talk about some of the ...
June 2, 2016
When you discover a security vulnerability affecting your environment, you want to fix it. Quick.
June 1, 2016
While the term "DevSecOps" has started to come up more often recently, we’re still wrapping our heads around “DevOps” to answer questions such ...
May 24, 2016
There are many tutorials, blog posts, and articles in the internets that deal with using cool and shiny new tools in cool and shiny new projects. As ...
March 29, 2016
Recently, I had the opportunity to help build out our vulnerability detection feature here at Threat Stack. I stepped into this project as I had many ...
June 10, 2015
Keeping your cloud workloads secure, compliant, and protected while moving at the speed of DevOps is no easy task. Our team at Threat Stack knows ...