Threat Stack

threatstack.com

Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss. Built in the cloud, for the cloud, Threat Stack is the first and only intrusion detection and auditing service purpose-built for cloud environments where network-based controls cannot be deployed.Specialties: Continuous Security Monitoring, Behavior-Based Intrusion Detection, Cloud Security, DevOps Enabled Deployment, Deep OS Auditing, File Integrity Monitoring, Host-based IDS, AWS Integration, Security, Compliance, Operational Efficiency.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Platform Security

UPTYCS UNVEILS ADVANCED CONTAINER AND KUBERNETES CAPABILITIES

Uptycs | May 27, 2022

news image

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement.
Read More

GOOGLE'S ADVANCED PROTECTION CYBERSECURITY NOW AVAILABLE TO NEST USERS

Google | June 04, 2020

news image

Google's had an extra-high level of cybersecurity that can be applied to people's accounts if they're particularly at risk of malicious hacking attempts or online attacks. Google account signed up for both the Advanced Protection Program and for use as ...

Read More

Enterprise Security, Platform Security, Software Security

CYBERARK IDENTITY FLOWS ACCELERATES CYBERSECURITY RISK RESPONSE

Businesswire | May 10, 2023

news image

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced enhancements to its CyberArk Identity Flows orchestration solution, including new integrations with Gurucul, Proofpoint and SentinelOne. Part of the CyberArk Identity Security Platform, CyberArk Identity Flows automates risk response tasks and processes through no-code app integrations and workflows, and improves response times, efficiency and productivity. CyberArk Identity Flows includes a user-fr...

Read More

API Security

DATA THEOREM INTRODUCES INDUSTRY’S FIRST CNAPP WORKFLOW OPTIMIZATIONS FOR ATTACK PATH ANALYSIS AND PROTECTION OF APIS AND SOFTWARE SUPPLY CHAINS

Business Wire | October 25, 2023

news image

Data Theorem, Inc., a leading provider of modern application security, today introduced an industry-first attack path analysis of APIs and software supply chain exploits to its Cloud-Native Application Protection Platform (CNAPP) called Cloud Secure. The new release includes machine learning (ML)-based hacker toolkits and improved visualizations that boost discovery of potential dat...

Read More
news image

Platform Security

UPTYCS UNVEILS ADVANCED CONTAINER AND KUBERNETES CAPABILITIES

Uptycs | May 27, 2022

Uptycs, the first cloud-native security analytics platform that enables both cloud and endpoint security from a single platform, today unveiled expanded container and Kubernetes security posture management (KSPM) features for its cloud workload protection platform (CWPP). These features enable real-time identification of containerized workloads, proactive scanning of container images in the CI/CD pipeline, constant compliance monitoring, and Kubernetes security policy audit and enforcement.
Read More

news image

GOOGLE'S ADVANCED PROTECTION CYBERSECURITY NOW AVAILABLE TO NEST USERS

Google | June 04, 2020

Google's had an extra-high level of cybersecurity that can be applied to people's accounts if they're particularly at risk of malicious hacking attempts or online attacks. Google account signed up for both the Advanced Protection Program and for use as ...

Read More
news image

Enterprise Security, Platform Security, Software Security

CYBERARK IDENTITY FLOWS ACCELERATES CYBERSECURITY RISK RESPONSE

Businesswire | May 10, 2023

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced enhancements to its CyberArk Identity Flows orchestration solution, including new integrations with Gurucul, Proofpoint and SentinelOne. Part of the CyberArk Identity Security Platform, CyberArk Identity Flows automates risk response tasks and processes through no-code app integrations and workflows, and improves response times, efficiency and productivity. CyberArk Identity Flows includes a user-fr...

Read More
news image

API Security

DATA THEOREM INTRODUCES INDUSTRY’S FIRST CNAPP WORKFLOW OPTIMIZATIONS FOR ATTACK PATH ANALYSIS AND PROTECTION OF APIS AND SOFTWARE SUPPLY CHAINS

Business Wire | October 25, 2023

Data Theorem, Inc., a leading provider of modern application security, today introduced an industry-first attack path analysis of APIs and software supply chain exploits to its Cloud-Native Application Protection Platform (CNAPP) called Cloud Secure. The new release includes machine learning (ML)-based hacker toolkits and improved visualizations that boost discovery of potential dat...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

The Great CISO Resignation

Article

resource image

Data Security, Platform Security, Software Security

DDoS Mitigation: Pushing Business’ Cybersecurity to New Heights

infographic

resource image

Enterprise Security, Platform Security, Software Security

The Great CISO Resignation

Article

resource image

Data Security, Platform Security, Software Security

DDoS Mitigation: Pushing Business’ Cybersecurity to New Heights

infographic

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us