Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Modern Environment Security
File Integrity Monitoring
Intrusion Detection
Container & Kubernetes Security
ThreatML - with Supervised Learning
Cloud Compliance Overview
DevSecOps Security
Microservice Security
Insider Threat Detection
AWS Security
Fargate Security Monitoring
CloudTrail Monitoring
AWS Graviton2 / Arm Support
Integrations
Security Research Center
Customers
Case Studies & Testimonials
Video Overview
Reviews
View Resource Center
Blog
Cloud security tips, insights, and ideas.
Newsroom
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Please enable JavaScript in your browser for better use of the website, some features like forms and videos use Javascript in order to display the elements.
125 total posts.
Michal Ferguson
May 22, 2017
OneLogin’s Journey on AWS OneLogin, an identity and access management (IAM) company, is dedicated to superior security for their users, which ...
The Threat Stack Team
May 2, 2017
Welcome to Boston! Our city plays host to many tech conferences throught the year — and Threat Stack actively sponsors and particpates in many ...
Nathan Cooprider
April 28, 2017
A post based on the talk I just gave at SOURCE Boston 2017 If you answer Yes to one or more of the following questions, you probably have agent ...
Venkat Pothamsetty
January 17, 2017
Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to ...
Tom McLaughlin
January 13, 2017
Last night we got together with our good friends from PagerDuty to host an event at District Hall in the Seaport area of Boston. It was a fun ...
Kevin Eberman
January 9, 2017
Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked ...
Tim Armstrong
December 28, 2016
One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...
December 15, 2016
Over the last year, we have published a number of playbooks that, together, deliver strategic and tactical information to guide you from high-level ...
Craig Chamberlain
December 13, 2016
In our last post, we took a look at traditional security incident response vs. the possibility to dramatically increase security velocity (which I ...
Megan Rees Ahigian
November 30, 2016
In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security ...
November 16, 2016
At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based ...
November 1, 2016
I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...
Jim O'Neill
October 31, 2016
This series explores how good UI design plays a key role in keeping users secure by making them more inclined to trust and use their cloud security ...
October 24, 2016
The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...
Brian Ahern
October 20, 2016
With 2016 nearing an end, I can’t help reflecting on how fortunate I am in my personal and professional life. I am blessed with a beautiful, ...
September 28, 2016
In Part 1 of this series, I introduced the theme that good user experience (UX) design can actually promote better security overall, by fostering ...
Threat Stack Marketing Team
September 20, 2016
After the Threat Stack team attended last week’s PagerDuty Summit in San Francisco, it became clear why PagerDuty is the market leader in agile ...
Thom Kenney
September 7, 2016
Software bugs, like security vulnerabilities, can crop up in unexpected places, and the only way you can really be prepared for them is by testing ...
Adrian Caceres
August 11, 2016
Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With ...
August 10, 2016
How effective is a security tool if people don’t like using it? A fancy floor mop sits in my closet. It’s a Swiffer WetJet, and with one look ...
Threat Stack Engineering Team
August 2, 2016
They say timing is everything — and when you go from installing an agent to detecting and remediating a security breach in less than 5 minutes, it ...