Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
104 total posts.
August 5, 2016
In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the ...
July 19, 2016
After spending significant time in dynamic languages, learning Scala can be challenging, so having the right tools (like IntelliJ) at your fingertips ...
July 12, 2016
July 5, 2016
The number of organizations investing in Scala is exploding, and for good reason. Scala combines Object Oriented and Functional capabilities as well ...
Threat Stack Marketing Team
June 30, 2016
Before you can assign responsibility for a security breach, you need to go back to the scene of the crime and understand where it originated. No easy ...
June 17, 2016
Unless you’ve been living under a rock (or don’t work in the tech industry), you’ve probably heard the term DevOps thrown around. A mashup of ...
June 10, 2016
On the heels of the recent announcement that Threat Stack has joined the Chef Partner Cookbook Program, it’s a good time to talk about some of the ...
June 2, 2016
When you discover a security vulnerability affecting your environment, you want to fix it. Quick.
June 1, 2016
While the term "DevSecOps" has started to come up more often recently, we’re still wrapping our heads around “DevOps” to answer questions such ...
May 24, 2016
There are many tutorials, blog posts, and articles in the internets that deal with using cool and shiny new tools in cool and shiny new projects. As ...
March 29, 2016
Recently, I had the opportunity to help build out our vulnerability detection feature here at Threat Stack. I stepped into this project as I had many ...
June 10, 2015
Keeping your cloud workloads secure, compliant, and protected while moving at the speed of DevOps is no easy task. Our team at Threat Stack knows ...
February 24, 2015
This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations ...
December 24, 2014
(Note: The full version of this post is on the SysAdvent blog. Below is a summary.)
December 18, 2014
Recently, a security firm reported what they claimed to be a flaw with a major impact on organizations running Linux. (And apparently since all the ...
November 24, 2014
I’ve spent most of my career in Operations, and the last 5 years at various organizations advocating and instilling DevOps principles in the teams ...
October 8, 2014
Last week, I had a call with Gene Kim, founding CTO of Tripwire and author of The Phoenix Project (see end of post for more details). I've known ...
August 6, 2014
Guest post by Chris Wysopal, CTO at Veracode
July 23, 2014
This is the third installment in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in ...
July 16, 2014
This is the second post in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in our ...