Please turn on your JavaScript for this page to function normally.
stop
Build-time security: Block risk and security issues from production rings

Build-time security has become a standard part of any security program and continues to grow in popularity with the shift left movement. In its most popular form, it’s a …

Threat Stack provides full workload observability across all public cloud provider platforms

Threat Stack, the leader in cloud infrastructure security, announced the next stage of its multi-cloud support which extends security observability to containers. Leveraging …

research
New infosec products of the week: January 25, 2019

Threat Stack announces new API for streamlined DevOps and security workflows The new API will allow for the suppression and dismissal of alerts from existing tools, …

Threat Stack announces new API for streamlined DevOps and security workflows

Threat Stack released a new API that will give customers the ability to create, deploy, augment, and tune security rules directly within their existing DevOps and security …

Threat Stack announces contextualized data export to Amazon S3 for cloud security observability

Threat Stack unveiled its plan to export cloud infrastructure security telemetry directly to its customers’ Amazon S3 accounts in order to enhance security observability. With …

Threat Stack acquires runtime application security vendor Bluefyre

Threat Stack has acquired application security vendor Bluefyre to deliver full stack security observability from the control plane to the application layer. With the addition …

money
Security budgets are rising, but is it enough?

A majority of companies (54 percent) are worried that they will soon outgrow their security solutions, according to Threat Stack. While budgets are expected to increase by 19 …

fight
You gotta fight, for your right, to erasure

According to Article 17 of the European Union’s General Data Protection Regulation (GDPR), all personal data that is no longer necessary must be removed and deleted. This …

Threat Stack announces containerized agent to enable container deployment at scale

Threat Stack announced streamlined deployment of the Threat Stack Cloud Security Platform designed to provide organizations with the ability to automate the deployment of …

connection
SecOps reality gap: 85% say practicing SecOps is a goal, 35% actually do

More than half of companies (52 percent) admit to cutting back on security measures to meet a business deadline or objective. Based on a survey of over 200 senior-level …

analyst
Five mental shifts we must make to achieve security beyond perimeters

Data centers aren’t exactly going extinct, but given the massive shift to public clouds, you need to make some significant adjustments if your mindset doesn’t already include …

cloud
Cloud security today: Complexity, compliance, and containerization

An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

Don't miss

Cybersecurity news