Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

A Year in the Life of Threat Stack’s Cloud Security Platform®

by Megan Rees Ahigian , posted in CSP, Threat Intelligence, Cloud Security Platform, Vulnerability Monitoring, AWS Configuration Auditing

CSP Year Blog Banner.jpg

Before we get too far into 2017, we want to take a final look back at 2016 — specifically at some of the great enhancements we made to Threat Stack’s Cloud Security Platform®.

In the security world, 2016 was filled with major incidents, including massive data breaches, nation-state cyber interference, crippling DDoS attacks, and increased numbers of ransomware incidents — along with all the less glamorous, day-to-day security threats that had the potential to impact every cloud-based business in existence. So much for the bad news!

At Threat Stack, 2016 was the year we transformed our best-of-breed Host Intrusion Detection System into the industry’s first cloud-native, end-to-end Cloud Security Platform to deliver a unified view into workloads, infrastructure monitoring, vulnerability management, threat intelligence, and compliance reporting.

Read More [fa icon=long-arrow-right"]

Jan 3, 2017 12:35:48 PM

[fa icon="comment"] 0 Comments

Trust the cloud, they said. It’ll be safe, they said.

by Brian Ahern , posted in Shared Responsibility Model, Cloud, CIA, Arlette Hart, Government, CSP, Government Security, FBI,


Speaking recently in a Google webcast, U.S. CIO Tony Scott declared major cloud providers like Google, Amazon or Microsoft just as secure as the world’s largest financial institutions. He even implied that there’s no safer place to store data than in the cloud.

Read More [fa icon=long-arrow-right"]

Nov 25, 2015 10:52:15 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all