Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Our 2014 Retrospective

by Doug Cahill, posted in Announcements, Company, Updates, Team

As we prepare to move across the muddy Charles River from Cambridge to our new offices in Boston’s Innovation District, I find myself reflecting on our incredible progress in 2014. From RSA in February to AWS re:Invent in November, it has truly been a whirlwind highlighted by the awesome people that make up Threat Stack including our team, investors, partners, and most importantly, our customers. Thanks to all! So, what did we get done in 2014?

 

Read More [fa icon=long-arrow-right"]

Jan 21, 2015 11:29:00 AM

[fa icon="comment"] 0 Comments

Threat Stack Names Executives As Company Brings Innovative Cloud Security Service to Market

by Kristin Dziadul, posted in Announcements, Company, Team

We're excited to announce today that we have added several key members to our management team.  Sam Bisbee has joined as CTO; Chris Gervais as VP, Engineering; and Pete Cheslock as Senior Director, Operations and Support.

Read More [fa icon=long-arrow-right"]

Jul 17, 2014 4:57:00 PM

[fa icon="comment"] 0 Comments

Threat Stack January Update

by Mark Ellzey, posted in Company, Updates

At Threat Stack, we’ve started the new year off with a bang by getting straight to work on many new exciting features that we can’t wait to share with you! No more eggnog, traveling to the in-laws’ house or singing carols -- our heads are down making our flagship product Cloud Sight better than ever.

Performance & Speed

This past month we worked tirelessly to make the task of tracking, auditing, and displaying forensic information for an organization even easier and faster than before.

To see an overview of how this now works, take a peek at this screencast demonstrating a vulnerable cloud deployment. As you saw (you watched the screencast, right?!) because of poor user and password management, multiple systems were compromised. Just like Superman, Cloud Sight swept in and reconstructed a full timeline of events -- from the introduction of a new user right down to the nitty-gritty details of the rootkit installed after the compromise.

Read More [fa icon=long-arrow-right"]

Jan 29, 2014 5:17:00 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all