Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
October 7, 2020
Any cybersecurity team that has had to respond to a compliance audit knows that it’s a lot easier to monitor for specific risks as they occur, ...
Introducing Threat Stack support for AWS Fargate
Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud
Cloud Security Insights, Thoughts, and Ideas
December 20, 2018
Making the transition from virtual machines to containers is a complex process that can take some time, particularly for larger, more complex ...
December 19, 2018
AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to ...
December 14, 2018
A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...
December 13, 2018
One of the biggest benefits of the Threat Stack Cloud Security Platform® is the deep level of visibility we bring to observing operator behaviors in ...
December 11, 2018
For an updated discussion of these certifications and others, see Alan Nakashian-Holsberg's 9 AWS Security Certifications to Consider in ...
December 10, 2018
As AWS continues to expand its services landscape, Threat Stack has made a commitment to keeping in step by crafting additional coverage that keeps ...
December 6, 2018
UPDATED — January 22, 2019
The Threat Stack SOC is aware of the recent disclosure of a breach of the PHP Extension and Application Repository ...
December 4, 2018
Compliance is essential, and organizations need to get it right. Despite the importance of compliance, organizations often treat it as an ...
November 30, 2018
Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and ...
November 20, 2018
The adage “Everything old is new again,” rings true in the cybersecurity industry as much as anywhere else. Some of the best practices from ...
November 15, 2018
Technologies like Docker have made it easier to continuously deploy applications across any number of host servers. They eliminate the need for ...
November 1, 2018
Just this morning I received my weekly AWS announcements email, and as I usually do, took a peek to see if there was anything useful or interesting. ...
October 30, 2018
Our Motto is: Threat Modeling: The sooner the better, but never too late. — OWASP
The practice of creating a threat model can help teams ...
October 25, 2018
New global data from Checkmarx reveals that 92 percent of organizations struggle to implement security into DevOps — even though they say they want ...
October 23, 2018
When it comes to managing SecOps, you must consider all the risks at hand, as well as how you can address them. Many of today’s SecOps teams are ...
October 18, 2018
Security budgets are rising, but are they helping with challenges caused by the security talent shortage? This post offers insights from our recent ...
October 15, 2018
At Threat Stack, we are all about keeping you secure as you scale your business and your infrastructure. That's why we have added the ability to use ...
October 9, 2018
There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices ...
October 4, 2018
Recently I had the pleasure of joining hundreds of DevOps pros, IT managers, and security engineers at the first ever Container Security event at ...
October 3, 2018
DevOps has enabled businesses to bring products to market faster than ever before. But what about security?
In our recent survey, Refocusing ...
October 2, 2018
— Shifting From DevOps to SecOps —
Organizations of all sizes have embraced DevOps as a way to deliver work quickly and reliably — but ...