Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
193 total posts.
January 12, 2021
Over the last six and a half years we have worked with thousands of companies of all sizes and maturities on implementing threat detection for their ...
January 7, 2021
The pandemic will have a lasting, long-term effect on IT, and one of the most important will be even faster migration to the cloud, according to ...
December 11, 2020
Disclaimer: This post discusses a breach that is reportedly under active investigation. I have not spoken with the FireEye team about this incident, ...
November 17, 2020
In early 2020, organizations were already moving quickly towards the cloud before the COVID-19 pandemic put their journey into fifth gear. How fast ...
July 9, 2020
As the rapid adoption of new ephemeral cloud deployment options, like containers and kubernetes, gives DevOps teams more flexibility, it is more ...
June 9, 2020
Threat Stack has an event processing pipeline that processes millions of messages per second sent to us by customer agents, our internal services, ...
April 10, 2019
When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was ...
February 13, 2019
Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying container ...
December 14, 2018
A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a ...
October 18, 2018
Security budgets are rising, but are they helping with challenges caused by the security talent shortage? This post offers insights from our recent ...
June 1, 2018
With revenue from the cloud computing sector expected to hit $411 billion by 2020, it's no wonder that more and more companies are shifting their ...
April 26, 2018
As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post ...
March 15, 2018
Congratulations to Evident.io on having your cloud story acquired by Palo Alto Networks. Your vision, passion, and commitment have been rightly ...
January 31, 2018
GDPR. Meltdown. Spectre. SOC 2. Coming at you like mosquitos on a hot summer night, these topics are of top concern for board members and security ...
Threat Stack Marketing Team
January 15, 2018
The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of ...
Threat Stack Product Team
January 3, 2018
Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support
Instead of the “predictions” that are ...
December 19, 2017
Every organization orchestrates their infrastructure in their own way, but more often than not, most cloud environments have a lot in common. Since ...
December 12, 2017
In today’s cloud-based environments, security threats can move faster and do more damage than ever before. To avoid a financial and technological ...
November 30, 2017
There’s a lot of talk in the business world — especially the software-driven side of it — about achieving and maintaining velocity. The ability ...
November 29, 2017
Trying to manage security with only one security tool (or, for example, having to use log files alone) can be a major headache. The right ...
November 21, 2017
When you’re making a mental shift away from legacy, on-prem security thinking, you may be wondering what an effective, modern security solution ...