Published: Aug 11, 2022
Read how the Threat Stack DevSecOps team increased the stability and improved operational efficiency of the Threat Stack Data Platform by leveraging Apache Spark and Amazon EMR.
Published: Jun 6, 2022
Need compliance help? This video explains how supervised machine learning / deep learning for cloud security gives high-efficacy alerts and intrusion detection for compliance audits while avoiding false negatives/positives. No alert fatigue for DevSecOps teams.
Published: Aug 11, 2021
How Threat Stack's User Interface and alert context changes can reduce key security metrics like mean-time-to-know (MTTK)
Published: Jul 21, 2021
The first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases.
Published: Jun 24, 2021
Combining the power of Threat Stack and Squadcast will help you quickly detect and respond to security and compliance risk across your cloud workloads, making an enormous contribution to drive down KPIs such as MTTK and MTTR.
Published: Apr 21, 2021
Case studies how cloud-native security + compliance improves ROI: Save time plus increase revenue and productivity
Published: Aug 4, 2020
Learn how Threat Stack’s new Fargate support can augment your existing AWS security controls.
Published: Feb 25, 2020
In this post, Blaine Connaughton uses Threat Stack’s data portability feature to dive deeper into security analytics using Jupyter PySpark notebooks.
Published: Feb 20, 2020
Threat Stack’s latest Threat Intelligence Report and live attack simulation show how Threat Stack Cloud SecOps Program analysts investigate the downstream actions of automation tools when conducting forensics that require user attribution.
Published: Feb 18, 2020
Andrew Warren discusses best practices for writing automated system integration tests using containers in order to effectively gray box test microservices.
Published: Jan 21, 2020
Threat Stack has introduced additional runtime attack detection to its Cloud Security Platform to further protect web application, microservice, and API workloads against path or directory traversal attacks, and remote code execution.
Published: Jan 9, 2020
Drawing on lessons learned from its successful 2017 and 2018 Type 2 SOC 2 examinations, Threat Stack further optimized its people, processes, and tools to accommodate scope changes and successfully complete its 2019 Type 2 SOC 2 examination with zero exceptions.
Published: Dec 12, 2019
Omada Health uses Threat Stack’s Cloud Security, Oversight, and Insight Services to provide data and systems security, and HIPAA compliance.
Published: Oct 31, 2019
TJ Maher examines 10 reasons why his team uses the ThoughtWorks Gauge cross-platform test automation framework to set up acceptance tests at Threat Stack.
Published: Sep 4, 2019
In this post, Tim Buntel explains how Threat Stack’s Application Security Monitoring satisfies the two distinct needs of PCI DSS Requirement 6.6: 1) Reviewing applications to proactively find vulnerabilities (and then make sure they get corrected), and 2) Detecting and blocking attacks in real time.
Published: Aug 20, 2019
The healthcare information technology company, Stratasan, uses Threat Stack to gain visibility, establish multiple tiers of monitoring, and create auditable data to address its growing security and compliance (HIPAA) needs.
Published: Jul 18, 2019
Threat Stack’s Application Security Monitoring detects and blocks real-time attacks at runtime while also giving developers the context they need to build in security that can help prevent future attacks.
Published: Jul 9, 2019
Threat Stack’s Application Security Monitoring embeds security in development processes with no negative impact on agility or speed of application development and deployment.