Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
October 7, 2020
Any cybersecurity team that has had to respond to a compliance audit knows that it’s a lot easier to monitor for specific risks as they occur, ...
Introducing Threat Stack support for AWS Fargate
Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud
Cloud Security Insights, Thoughts, and Ideas
May 20, 2015
I like the ideas behind quantified self. This has not driven me to purchase an Apple Watch, but I am now on my second fitbit. I also ...
Threat Stack Marketing Team
April 21, 2015
We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the following case study that ...
March 26, 2015
This week our product team, led by Chris Gervais, Threat Stack’s VP of Engineering, and Aaron Botsis, Threat Stack’s Product Manager, hosted a ...
March 11, 2015
Whether you’re a current Threat Stack customer or not, there is a lot you’ll be interested to learn in regards to proactively protecting your ...
February 24, 2015
This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations ...
February 13, 2015
On Wednesday, Threat Stack was featured in an important GigaOM webinar panel, Iron Clad DevOps Security for Your EC2 Environments. The panel included ...
February 5, 2015
To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push ...
December 24, 2014
(Note: The full version of this post is on the SysAdvent blog. Below is a summary.)
December 22, 2014
For companies using AWS for their cloud infrastructure, one of the biggest challenges faced by infrastructure teams is the ability to get a complete ...
December 18, 2014
Recently, a security firm reported what they claimed to be a flaw with a major impact on organizations running Linux. (And apparently since all the ...
December 11, 2014
Yesterday, our Co-Founder and Chief Scientist, Jen Andre, and CEO, Doug Cahill, hosted a live webinar, “Preparing for the Next Shellshock.” ...
December 10, 2014
We’re thrilled to announce today that we have raised an additional $5M in funding from Atlas Venture and .406 Ventures. The funding will be used to ...
November 24, 2014
I’ve spent most of my career in Operations, and the last 5 years at various organizations advocating and instilling DevOps principles in the teams ...
November 20, 2014
We just returned from a great week in Las Vegas, NV for the AWS re:Invent Conference. The conference brought together over 13,500 developers, ...
October 8, 2014
Last week, I had a call with Gene Kim, founding CTO of Tripwire and author of The Phoenix Project (see end of post for more details). I've known ...
September 25, 2014
The internet is yet again feeling the aftereffects of another “net shattering” vulnerability: a bug in the shell ‘/bin/bash’ that widely ...
August 6, 2014
Guest post by Chris Wysopal, CTO at Veracode
July 23, 2014
This is the third installment in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in ...
July 16, 2014
This is the second post in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in our ...
December 18, 2013
Too many times we hear and read about how insecure the cloud is or worse — that the cloud is already secure because IaaS providers have security ...