Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
9 total posts.
May 19, 2020
In part one of this two-part series, I showed how Threat Stack captures detailed metadata about operating system behaviors as they happen. I used the ...
April 23, 2020
Kubernetes operators are getting better at protecting the clusters from external attacks. This is a success story for many companies that adopted ...
April 10, 2019
When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was ...
February 6, 2019
Containerized environments are increasingly popular, and Docker remains the most popular container solution for developers. But the process of moving ...
Megan Rees Ahigian
August 14, 2017
As you probably know by now, containers are a high-priority topic at companies of all sizes. But there are a lot of myths surrounding this technology ...
June 27, 2017
Docker and other container services are appealing for good reason. They are lightweight and flexible. For many organizations, they enable the next ...
Threat Stack Marketing Team
December 23, 2015
This post is part of a series in which we review key cloud security topics from our most-read blog posts from 2015.
December 15, 2015
It’s December, which in Boston means we’re stocking up on L.L. Bean boots and hunkering down for a cold, snowy winter. 2015 has been an ...
November 5, 2015
Docker. It’s a thing. A big thing. Actually, it’s a bunch of little things. Things called containers that like to pretend they’re running in ...