Latest Blogs

Cloud Security Insights, Thoughts, and Ideas

2 Min Read
Threat Stack SOC Analysis: Investigating Incidents Involving Automation Tools

Mike Broberg

February 20, 2020

As part of their 24/7 work supporting customers through the Cloud SecOps Program℠, the security analysts in the Threat Stack Security Operations ...

4 Min Read
Why Threat Stack Automates Microservices Tests Using Containers

Andrew Warren

February 18, 2020

Microservices, even when designed correctly, can be challenging to test. But when the system architecture evolves to the point where tens or hundreds ...

6 Min Read
Optimizing Detection of Breached Passwords

Mark Moore

February 13, 2020

In the increasingly difficult times of protecting our own digital life or helping others protect theirs, we must be ever vigilant about ensuring that ...

3 Min Read
Additions to the Threat Stack AWS CloudTrail Ruleset

Mike Broberg

February 11, 2020

Net-new rules for Amazon ECR and AWS Systems Manager API activity At Threat Stack, we process tens of billions of events for customers each day. ...

6 Min Read
9 AWS Security Certifications to Consider in 2020

Alan Nakashian-Holsberg

February 6, 2020

As cloud computing continues to grow in importance for almost all businesses, there’s an ever-increasing need to develop, deploy, and manage secure ...

9 Min Read
25 Best Cloud Security Podcasts to Visit in 2020

Mark Moore

February 4, 2020

It’s safe to say that everyone is impacted — directly or indirectly — by cybersecurity issues these days, and given that fact, security ...

2 Min Read
A Year in Review From Threat Stack’s Product Team

Aditya Joshi

January 29, 2020

2019 was a banner year for the Threat Stack Cloud Security Platform® and Cloud SecOps Program℠.  As we stated at the outset of 2019, our mission ...

3 Min Read
Cloud Native Security Requires a 3D Mindset

Rebecca Meyrick

January 23, 2020

We’re in the midst of an ideological shift. As companies continue to move towards cloud-native software development and complex cloud ...

3 Min Read
Threat Stack Introduces Additional Runtime Attack Detection

Tim Buntel

January 21, 2020

Protection From More Types of Application Attacks Threat Stack Application Security Monitoring detects vulnerabilities in code and blocks live ...

21 Min Read
The Best Cloud Security Conferences to Attend in 2020

Sarah Wills

January 16, 2020

Securing your cloud infrastructure is a big job. You always need to be up to date on skills, tools, and technology. To help you keep up with the ...

2 Min Read
Threat Stack Named One of Top 10 Best Places to Work in Boston

Zach Bonfante

January 15, 2020

At Threat Stack, we believe that one of the most important ways to drive a successful DevSecOps program is through an organizational culture based on ...

5 Min Read
An Inside Look at the Evolution of Threat Stack’s SOC 2 Processes

Lindsey Ullian

January 9, 2020

For the Third Straight Year, the Threat Stack Cloud Security Platform Meets Security and Availability Standards Set by the American Institute of ...

3 Min Read
A Cybersecurity Risk Assessment Checklist for Infrastructures in Transition

Mark Moore

January 7, 2020

Dev and Ops teams constantly evolve their technology and procedures to increase speed and lower costs. Typically this leads to increasingly ...

6 Min Read
What Our Readers Liked in 2019

Bob Allin

December 18, 2019

2019 is almost over, and it’s time for our year-end wrap-up.  We’re committed to helping you strengthen your cloud security and compliance so ...

4 Min Read
Threat Stack Supports Omada Health’s HIPAA Compliance, Hyper Growth, & Operational Efficiency

Robin Stone

December 12, 2019

“We like dealing with Threat Stack because they offer a complete solution. Threat Stack backs up its technology with security insights and ...

4 Min Read
Tips on How to Stay Secure at Conferences

Pat Cable

December 10, 2019

At Threat Stack, we attend a lot of conferences: They can be a powerful way to connect with like-minded professionals and educate yourself on ...

6 Min Read
How to Transform Alert Fatigue Into Proactive Security Management — 5 Must-Read Blog Posts

Ivan Evsyukov

December 5, 2019

The global cybersecurity talent shortage is real, and with 72 percent of CISOs claiming that their teams are facing alert fatigue, there’s not a ...

4 Min Read
Lessons Learned From Lola: Demonstrating PCI Compliance in a Cloud-Native, Containerized Environment

Tim Buntel

December 3, 2019 initially became PCI compliant about a year ago, and this fall completed a successful PCI audit. Recently Katie Paugh, Lola’s Senior ...

5 Min Read
8 Best Practices for Strengthening Security in Cloud-Native Environments

Stephen Fitzgerald

November 19, 2019

Cloud-native companies and larger companies migrating to cloud environments continue to see the cloud as a way to gain speed, reliability, and ...

3 Min Read
Cut Time & Costs: 7 Best Practices to Follow When Choosing a Cloud Security Solution

Mark Moore

November 14, 2019

In a SaaS world, everyone wants to move fast! Rapid development can slash time to market and put you in a strong competitive position, and of ...

5 Min Read
HIPAA Compliance Tips & Best Practices — Training Considerations

Bob Allin

November 12, 2019

What kind of training does your organization need to support HIPAA compliance? A good way to start answering this question is to reference the ...