Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
99 total posts.
April 19, 2017
A message from Cicada was discovered on Pastebin at the end of April 2017. It read "Beware false paths. Always verify PGP signature from ...
March 8, 2017
At Threat Stack we have developed best practices around cloud security — when it should be introduced, what it should cover at each stage of the ...
February 27, 2017
If you’re already on the Slack bandwagon, then you have probably experienced first-hand how it can make communications between teams far simpler ...
February 24, 2017
We’ve written before about what it means to meet compliance standards without going completely overboard. Today, we want to talk about how that ...
January 6, 2017
When you think of alternate reality games (ARGs), things such as Ingress or Pokemon GO probably come to mind. While thinking about ways ...
December 16, 2016
Recently the Galactic Empire's Death Star plans were leaked due to a security breach on the planet Scarif. A threat actor known as ROGUE ONE ...
The USENIX LISA 2016 Conference wrapped up a week ago after a tremendous five-day program of workshops, training sessions, presentations, talks, and ...
December 7, 2016
It’s no secret that there’s a huge talent shortage in the security space today. With a low supply and high demand, salaries have surged, ...
December 5, 2016
Interested in attending AWS re:Invent 2017? Take a look at what we'll be up to.
AWS re:Invent 2016 has come and gone and what an event it was! ...
The Threat Stack Team
November 7, 2016
If you’re heading to this year’s upcoming USENIX LISA Conference — welcome to Boston!
Threat Stack is a proud sponsor of the conference, ...
November 2, 2016
A lot of organizations focus their efforts on identifying external actors, distinguishing between different groups that may be attempting malicious ...
October 18, 2016
Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...
October 17, 2016
Last week, we released Part 1 of a two-part series on the low-hanging security best practices companies can implement to improve their security ...
October 13, 2016
If you look at how and when different companies implement security, it’s clear the approach runs the gamut. Some go all in from day one while many ...
September 6, 2016
From my first day at Threat Stack, I’ve encountered one critical issue time after time: prospects who have had their sales cycle slow to a crawl or ...
July 21, 2016
On-demand, subscription-based services have taken over the technology world; a “one-and-done” contract is almost unheard of in today’s software ...
July 12, 2016
Just in case you were wondering, the @nytimes building is a Pokegym.
— Runa A. Sandvik (@runasand) ...
June 28, 2016
Customer Success Management (CSM) is becoming one of the most important practices for driving customer success throughout the SaaS B2B sector.
Threat Stack Marketing Team
June 9, 2016
Not even a decade ago, security was much simpler. Companies were defined by the perimeter of their corporate network and protected by a firewall and ...
June 6, 2016
About a week ago I started a fantastic new role as Director of Sales Prospecting & Business Development at the Boston-based Cloud Security ...
May 25, 2016
After my third year as a Harvard computer science major, I decided to defer my degree to start working as a full-time software engineer at Threat ...