Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
125 total posts.
May 22, 2017
OneLogin’s Journey on AWS
OneLogin, an identity and access management (IAM) company, is dedicated to superior security for their users, which ...
The Threat Stack Team
May 2, 2017
Welcome to Boston!
Our city plays host to many tech conferences throught the year — and Threat Stack actively sponsors and particpates in many ...
April 28, 2017
A post based on the talk I just gave at SOURCE Boston 2017
If you answer Yes to one or more of the following questions, you probably have agent ...
January 17, 2017
Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to ...
January 13, 2017
Last night we got together with our good friends from PagerDuty to host an event at District Hall in the Seaport area of Boston. It was a fun ...
January 9, 2017
Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked ...
December 28, 2016
One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...
December 15, 2016
Over the last year, we have published a number of playbooks that, together, deliver strategic and tactical information to guide you from high-level ...
December 13, 2016
In our last post, we took a look at traditional security incident response vs. the possibility to dramatically increase security velocity (which I ...
Megan Rees Ahigian
November 30, 2016
In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security ...
November 16, 2016
At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based ...
November 1, 2016
I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...
October 31, 2016
This series explores how good UI design plays a key role in keeping users secure by making them more inclined to trust and use their cloud security ...
October 24, 2016
The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...
October 20, 2016
With 2016 nearing an end, I can’t help reflecting on how fortunate I am in my personal and professional life. I am blessed with a beautiful, ...
September 28, 2016
In Part 1 of this series, I introduced the theme that good user experience (UX) design can actually promote better security overall, by fostering ...
Threat Stack Marketing Team
September 20, 2016
After the Threat Stack team attended last week’s PagerDuty Summit in San Francisco, it became clear why PagerDuty is the market leader in agile ...
September 7, 2016
Software bugs, like security vulnerabilities, can crop up in unexpected places, and the only way you can really be prepared for them is by testing ...
August 11, 2016
Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With ...
August 10, 2016
How effective is a security tool if people don’t like using it?
A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look ...
Threat Stack Engineering Team
August 2, 2016
They say timing is everything — and when you go from installing an agent to detecting and remediating a security breach in less than 5 minutes, it ...