Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
193 total posts.
Megan Rees Ahigian
November 30, 2016
In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security ...
As we hurtle into the future, it often seems that talk in the tech media revolves around cloud computing. But the reality for many companies, ...
November 18, 2016
Security is a shared responsibility when you run your business on Amazon Web Services (AWS). To hold up your end of the bargain, there are many best ...
At Threat Stack, we develop security software, so it’s important to us that people have the technology they need to manage security issues in ...
November 16, 2016
At Threat Stack, we have two high-level goals when it comes to product development. First, we want to continue to build a powerful, cloud-based ...
November 15, 2016
Compliance is a complex, ongoing process. Between deciphering requirements into relatable terms, allocating a budget, and assembling a team for ...
November 10, 2016
There’s no question that Amazon Web Services is an incredibly powerful and secure cloud services platform for delivering all sorts of software ...
November 3, 2016
Ask three people what SecOps is and chances are you’ll get three different descriptions:
It’s a team
It’s a job title
It’s a ...
November 1, 2016
I recently added a Starz subscription to my Amazon Prime and found a new supply of science fiction movies. One of these, Deja Vu, is a time travel ...
October 31, 2016
This series explores how good UI design plays a key role in keeping users secure by making them more inclined to trust and use their cloud security ...
October 27, 2016
At Threat Stack, we’ve been a SecOps-oriented team from day one. This means our developers, operations, and security practitioners all work ...
October 26, 2016
Last Friday, multiple massive distributed denial ofservice (DDoS) attacks hit Dyn, an internet performance management company headquartered in New ...
October 24, 2016
The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...
October 18, 2016
Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...
October 17, 2016
Last week, we released Part 1 of a two-part series on the low-hanging security best practices companies can implement to improve their security ...
October 14, 2016
I was sitting with my Sales Team last Friday, listening to their experiences with prospects. They had some great stories about wins and interesting ...
October 13, 2016
If you look at how and when different companies implement security, it’s clear the approach runs the gamut. Some go all in from day one while many ...
October 12, 2016
As a Product Manager, it's always your job to expand your understanding of the customer by finding out what they like and need, learning about ...
October 6, 2016
In the life of many organizations, developers and operations people need credentials that they can use in case of emergency — when, for example, ...
September 29, 2016
It won’t be long before network perimeters are a thing of the past. As companies continue to adopt the cloud, either going all-in or operating in ...
September 27, 2016
When’s the last time someone made an unauthorized change to your system files?
To answer this and other important security questions, as well as ...