Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Modern Environment Security
File Integrity Monitoring
Intrusion Detection
Container & Kubernetes Security
ThreatML - with Supervised Learning
Cloud Compliance Overview
DevSecOps Security
Microservice Security
Insider Threat Detection
AWS Security
Fargate Security Monitoring
CloudTrail Monitoring
AWS Graviton2 / Arm Support
Integrations
Security Research Center
Customers
Case Studies & Testimonials
Video Overview
Reviews
View Resource Center
Blog
Cloud security tips, insights, and ideas.
Newsroom
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Please enable JavaScript in your browser for better use of the website, some features like forms and videos use Javascript in order to display the elements.
125 total posts.
T.J. Maher
October 31, 2019
Threat Stack has numerous tests running daily, verifying that things are working as expected in our Threat Stack Cloud Security ...
Laura Haiduck
September 19, 2019
All software development projects, whether they’re large or small, can benefit from well-planned and well-executed testing. It’s your way to ...
Robin Stone
August 20, 2019
Stratasan provides web-based software and professional services that are designed to help healthcare organizations maximize strategic growth ...
Mike Broberg
July 23, 2019
— A special Thank You to Jose Bañez, Threat Stack Security Solution Engineer, for editing this blog post. If you’re like me, you grew up ...
Tim Buntel
June 18, 2019
Threat Stack’s Application Security Monitoring enables cloud security observability across the full stack & full lifecycle in a single ...
Kevin Flike
March 28, 2019
In February 2019, Threat Stack hosted a meetup with the Boston chapter of Operation Code. Operation Code is a 501(c)(3) non-profit intensely focused ...
Natalie Walsh
March 6, 2019
Cost Savings and Business Benefits Enabled by Threat Stack When investing in cloud security platforms and services, businesses naturally want to ...
Lindsey Ullian
February 20, 2019
For the second year in a row Threat Stack has achieved Type 2 SOC 2 Compliance in Security and Availability with zero exceptions. We’re justifiably ...
Stephen Fitzgerald
January 30, 2019
Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables ...
Brian Ahern
January 2, 2019
As we enter the first days of 2019, it’s a great time to look back at the tremendous momentum we built up at Threat Stack over the last year. We ...
Ivan Evsyukov
December 13, 2018
One of the biggest benefits of the Threat Stack Cloud Security Platform® is the deep level of visibility we bring to observing operator behaviors in ...
Nathan Paulhus
December 10, 2018
As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps ...
October 15, 2018
At Threat Stack, we are all about keeping you secure as you scale your business and your infrastructure. That's why we have added the ability to use ...
Hank Schless
September 25, 2018
Last month we announced that a containerized version of the Threat Stack Agent was coming soon for customers who are using containers to deploy cloud ...
Paul Ivanivsky
September 19, 2018
The Threat Stack CloudTrail Base Ruleset has several out-of-the-box rules that alert users on activity within some of AWS’s most popular services ...
August 23, 2018
Every day, malicious actors are taking more complex routes into cloud infrastructure and leveraging increasingly covert traits to persist for longer ...
Christian Lappin
July 20, 2018
We recently discussed some pretty sobering statistics in the world of cybersecurity, ranging from astronomical misconfiguration rates to the ...
Sarah Wills
June 25, 2018
If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. ...
June 15, 2018
Mean Time To Detect (MTTD) and Mean Time To Know (MTTK) are two of the most important metrics in security operations. Respectively, they measure the ...
Raymond Suarez
May 29, 2018
With the popularity of container environments on the rise, we’ve seen many Threat Stack customers undergoing infrastructure transitions of late. ...
Pete Cheslock
April 26, 2018
As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post ...