Read how the Threat Stack DevSecOps team increased the stability and improved operational efficiency of the Threat Stack Data Platform by leveraging Apache Spark and Amazon EMR.
Need compliance help? This video explains how supervised machine learning / deep learning for cloud security gives high-efficacy alerts and intrusion detection for compliance audits while avoiding false negatives/positives. No alert fatigue for DevSecOps teams.
How Threat Stack's User Interface and alert context changes can reduce key security metrics like mean-time-to-know (MTTK)
The first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases.
Combining the power of Threat Stack and Squadcast will help you quickly detect and respond to security and compliance risk across your cloud workloads, making an enormous contribution to drive down KPIs such as MTTK and MTTR.
Case studies how cloud-native security + compliance improves ROI: Save time plus increase revenue and productivity
Learn how Threat Stack’s new Fargate support can augment your existing AWS security controls.
In this post, Blaine Connaughton uses Threat Stack’s data portability feature to dive deeper into security analytics using Jupyter PySpark notebooks.
Threat Stack’s latest Threat Intelligence Report and live attack simulation show how Threat Stack Cloud SecOps Program analysts investigate the downstream actions of automation tools when conducting forensics that require user attribution.
Andrew Warren discusses best practices for writing automated system integration tests using containers in order to effectively gray box test microservices.
Threat Stack has introduced additional runtime attack detection to its Cloud Security Platform to further protect web application, microservice, and API workloads against path or directory traversal attacks, and remote code execution.
Drawing on lessons learned from its successful 2017 and 2018 Type 2 SOC 2 examinations, Threat Stack further optimized its people, processes, and tools to accommodate scope changes and successfully complete its 2019 Type 2 SOC 2 examination with zero exceptions.
Omada Health uses Threat Stack’s Cloud Security, Oversight, and Insight Services to provide data and systems security, and HIPAA compliance.
TJ Maher examines 10 reasons why his team uses the ThoughtWorks Gauge cross-platform test automation framework to set up acceptance tests at Threat Stack.
In this post, Tim Buntel explains how Threat Stack’s Application Security Monitoring satisfies the two distinct needs of PCI DSS Requirement 6.6: 1) Reviewing applications to proactively find vulnerabilities (and then make sure they get corrected), and 2) Detecting and blocking attacks in real time.
Threat Stack’s Application Security Monitoring detects and blocks real-time attacks at runtime while also giving developers the context they need to build in security that can help prevent future attacks.
Threat Stack’s Application Security Monitoring embeds security in development processes with no negative impact on agility or speed of application development and deployment.