Latest Blogs About "Threat Stack"

125 total posts.

8 Min Read
Testing Tool Profile: Why Threat Stack Uses ThoughtWorks Gauge

T.J. Maher

October 31, 2019

 Threat Stack has numerous tests running daily, verifying that things are working as expected in our Threat Stack Cloud Security ...

9 Min Read
10 Automated Testing Tools That Threat Stack Uses — and Why

Laura Haiduck

September 19, 2019

All software development projects, whether they’re large or small, can benefit from well-planned and well-executed testing. It’s your way to ...

4 Min Read
How Stratasan Addresses Its Growing Security & Compliance Needs for Healthcare IT and Services Using Threat Stack

Robin Stone

August 20, 2019

Stratasan provides web-based software and professional services that are designed to help healthcare organizations maximize strategic growth ...

3 Min Read
Just Enough Windows Server

Mike Broberg

July 23, 2019

— A special Thank You to Jose Bañez, Threat Stack Security Solution Engineer, for editing this blog post. If you’re like me, you grew up ...

3 Min Read
Threat Stack Launches New Unified Application Security Monitoring Solution

Tim Buntel

June 18, 2019

Threat Stack’s Application Security Monitoring enables cloud security observability across the full stack & full lifecycle in a single ...

7 Min Read
Operation Code and Sam Bisbee Talk About Getting Started in Security

Kevin Flike

March 28, 2019

In February 2019, Threat Stack hosted a meetup with the Boston chapter of Operation Code. Operation Code is a 501(c)(3) non-profit intensely focused ...

2 Min Read
The Economic Impact of Threat Stack – A Forrester Research Study

Natalie Walsh

March 6, 2019

Cost Savings and Business Benefits Enabled by Threat Stack When investing in cloud security platforms and services, businesses naturally want to ...

3 Min Read
Threat Stack Successfully Completes Type 2 SOC 2 Examination With Zero Exceptions — Again!

Lindsey Ullian

February 20, 2019

For the second year in a row Threat Stack has achieved Type 2 SOC 2 Compliance in Security and Availability with zero exceptions. We’re justifiably ...

3 Min Read
Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts

Stephen Fitzgerald

January 30, 2019

Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables ...

3 Min Read
Threat Stack Continues 2018’s Momentum Into 2019

Brian Ahern

January 2, 2019

As we enter the first days of 2019, it’s a great time to look back at the tremendous momentum we built up at Threat Stack over the last year. We ...

2 Min Read
Threat Stack Introduces Bulk Data Export Feature

Ivan Evsyukov

December 13, 2018

One of the biggest benefits of the Threat Stack Cloud Security Platform® is the deep level of visibility we bring to observing operator behaviors in ...

4 Min Read
Threat Stack Announces New and Enhanced CloudTrail Rules

Nathan Paulhus

December 10, 2018

As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps ...

< 1 Min Read
Introducing AWS EC2 Tag Integration

Ivan Evsyukov

October 15, 2018

At Threat Stack, we are all about keeping you secure as you scale your business and your infrastructure. That's why we have added the ability to use ...

4 Min Read
Threat Stack Announces General Availability of Its Docker Containerized Agent

Hank Schless

September 25, 2018

Last month we announced that a containerized version of the Threat Stack Agent was coming soon for customers who are using containers to deploy cloud ...

9 Min Read
Creating Custom CloudTrail Rules in Threat Stack

Paul Ivanivsky

September 19, 2018

The Threat Stack CloudTrail Base Ruleset has several out-of-the-box rules that alert users on activity within some of  AWS’s most popular services ...

3 Min Read
Magic for DevOps Teams — Threat Stack Announces Containerized Agent

Hank Schless

August 23, 2018

Every day, malicious actors are taking more complex routes into cloud infrastructure and leveraging increasingly covert traits to persist for longer ...

3 Min Read
How to Use Threat Stack to Enable Proactive Security

Christian Lappin

July 20, 2018

We recently discussed some pretty sobering statistics in the world of cybersecurity, ranging from astronomical misconfiguration rates to the ...

3 Min Read
Visualizing Detection & Remediation in the Cloud With Graylog — Webinar Recap

Sarah Wills

June 25, 2018

If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. ...

4 Min Read
How to Use Threat Stack to Reduce Mean Time To Know

Hank Schless

June 15, 2018

Mean Time To Detect (MTTD) and Mean Time To Know (MTTK) are two of the most important metrics in security operations. Respectively, they measure the ...

4 Min Read
Q&A With Pat Cable: How Threat Stack Secures Evolving Infrastructure

Raymond Suarez

May 29, 2018

With the popularity of container environments on the rise, we’ve seen many Threat Stack customers undergoing infrastructure transitions of late. ...

3 Min Read
3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack

Pete Cheslock

April 26, 2018

As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post ...