Threat Stack Blog

Continuous security monitoring for your cloud.

Applying The Principles of The Quantified Self to ​Cloud Security

by Nathan Cooprider, posted in Cloud Security, nathan cooprider, Quantified Self, digital security, continuous monitoring


I like the ideas behind quantified self. This has not driven me to purchase an Apple Watch, but I am now on my second fitbit. I also use MyFitnessPalRunKeeperMint, and Jenkins. These services provide low-friction visibility to otherwise obscured aspects of my life. The first step to self-improvement is to "know thyself."

Quantified self introduces an aspect of continuous monitoring to my life. I could view snapshots into my health every year at my physical or just kind of eyeball my health based on looking in the mirror, but neither of those provides the visibility to optimize my health. And auditing my finances every year at tax time is better than nothing, but that by itself will not lead to wealth. 

Read More [fa icon=long-arrow-right"]

May 20, 2015 9:47:44 AM

[fa icon="comment"] 0 Comments

Unveiling Threat Stack's New PagerDuty Integration

by Palen Schwab, posted in Integrations, PagerDuty, Alerts


We’re thrilled to announce today that Threat Stack has joined PagerDuty's rapidly expanding partner ecosystem with a new integration now available to all customers! This integration allows you to easily manage your Threat Stack cloud security incidents directly within PagerDuty, a popular platform that allows engineering and IT teams to connect their operations systems, teams and data into a single, easy-to-use console, making managing and responding to incidents quick and easy.


Read More [fa icon=long-arrow-right"]

Apr 28, 2015 9:00:00 AM

[fa icon="comment"] 0 Comments

New Case Study:
Protecting Customer Data & Meeting SOC 2 Compliance

by Palen Schwab, posted in Compliance, Customers, SOC 2, Continuous Cloud Security

We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the below case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.

Read More [fa icon=long-arrow-right"]

Apr 21, 2015 10:26:47 AM

[fa icon="comment"] 0 Comments

See Threat Stack at AWS Enterprise Summit 2015 in San Francisco Next Week

by Kristin Dziadul, posted in Cloud Security, AWS, AWS Security, EC2 Security, AWS Summit San Francisco


AWS-Summit_Option-White-San Francisco.png

For the second year in a row, Threat Stack will be attending and exhibiting at the AWS Enterprise Summit, this time at the Moscone Center in San Francisco. Throughout the past year alone, our integration with AWS has grown even deeper, helping customers effectively meet their responsibilities within the shared security model. We look forward to sharing the significant advances on our platform with the AWS community during the AWS Summit next week.

Read More [fa icon=long-arrow-right"]

Apr 1, 2015 10:53:00 AM

[fa icon="comment"] 0 Comments

A Deep Dive on Threat Stack: Recap of our Live Product Q&A

by Kristin Dziadul, posted in Cloud Security, Webinar, Continuous Cloud Security, EC2 Integration, AWS Integration

This week our product team, led by Chris Gervais, Threat Stack’s VP of Engineering, and Aaron Botsis, Threat Stack’s Product Manager, hosted a live Q&A webinar, diving into the intricacies of security for cloud-native environments and what Threat Stack is doing about it. Before the webinar, we asked attendees to submit their most pressing questions, letting them take the reigns in the discussion. We had many great questions come in and took care to cover as many as possible. We also demoed Threat Stack itself to show how the platform works and some recent updates based specifically on customer feedback.

Read More [fa icon=long-arrow-right"]

Mar 26, 2015 9:28:40 AM

[fa icon="comment"] 0 Comments

Get The Inside Scoop: Join Our Live Product Q&A Webinar

by Palen Schwab, posted in Webinar

Whether you’re a current Threat Stack customer or not, there is a lot you’ll be interested to learn in regards to proactively protecting your company’s cloud-resident data with Threat Stack. It is our single most important mission to help you answer the questions that matter most in regards to cloud security. That’s why we’ve developed an exclusive product webinar on March 24th where we’ll let you take the reins. We will be providing a lot of information that you may not yet know about Threat Stack’s capabilities, but a majority of the time will be spent answering your most pressing questions which you can submit to us prior to the webinar. We will take care to answer every question we can to elevate your knowledge about continuous cloud security and Threat Stack.


Read More [fa icon=long-arrow-right"]

Mar 11, 2015 2:43:00 PM

[fa icon="comment"] 0 Comments

Who Watches the Watchmen? Securing Configuration Management Systems

by Jen Andre, posted in Security, DevOps, Operations, Configuration Management


This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations pipelines from a security perspective.   

Read More [fa icon=long-arrow-right"]

Feb 24, 2015 9:41:00 AM

[fa icon="comment"] 0 Comments

Implementing Better DevOps Security: Expert Perspectives

by Kristin Dziadul, posted in Cloud Security, Webinar, DevOps, SecDevOps, EC2

On Wednesday, Threat Stack was featured in an important GigaOM webinar panel, Iron Clad DevOps Security for Your EC2 Environments. The panel included our own Director of Ops and Support, Pete Cheslock, along with David Linthicum of GigaOM, Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group. It was a deeply informative hour-long discussion which David himself claimed as one of the best security webinars he’s had. We couldn’t agree more!


Read More [fa icon=long-arrow-right"]

Feb 13, 2015 1:21:16 PM

[fa icon="comment"] 0 Comments

3 Reasons Why the Host Rules Cloud IDS

by Sam Bisbee, posted in Cloud Security, Intrusion Detection, IDS, Cloud IDS


To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push past the hype and worn platitudes about “the Cloud with a capital C.” The reality is that it is the side effects that have caused such a large impact, like cost of operation as a function of scaled purchasing power and the forcing of software-only solutions.

This has certainly been felt in intrusion detection systems (IDS). They have traditionally been deployed as network hardware devices enabled by access to the network infrastructure, but are struggling to find relevance in a world where the traditional network boundary no longer exists.

Read More [fa icon=long-arrow-right"]

Feb 5, 2015 1:44:00 PM

[fa icon="comment"] 0 Comments

Iron Clad DevOps Security for your EC2 Environments: Webinar with GigaOM

by Palen Schwab, posted in Continuous Security Monitoring, Webinar, SecDevOps, EC2



Join Threat Stack's Director of Ops & Support, Pete Cheslock, as he discusses the security needs of modern, DevOps-managed infrastructures with Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group, in next week's GigaOM webinar. 

With the lack of sophisticated security features in public cloud infrastructure environments like AWS, it's critical for DevOps teams to implement audit trails in order to adhere to compliance and regulation mandates. Continuous security monitoring is the answer and on Febuary 11th, Pete, Greg and Matt will be discussing the importance of having this new level of visibility into an entire EC2 attack surface. 

Read More [fa icon=long-arrow-right"]

Feb 2, 2015 11:33:41 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all