Quantcast
Channel: Cloud Security Archives | Threat Stack
Browsing latest articles
Browse All 25 View Live

Making Supervised Learning Work: Threat Stack’s Unique Data Labeling...

Do you have those moments when suddenly the light goes on in your head, and you “get it”? Most of us do. Usually, it’s because I’m overthinking something, OR I’m not following a logic thread through to...

View Article



Reducing Teams’ Burdens–ThreatML w/ Supervised Learning

Cybersecurity is known for adding resource burdens to DevSecOps teams. But those burdens can be significantly reduced by the right cloud security solutions. Threat Stack’s RVP of Product and...

View Article

Real World: How Machine Learning Modeling Works–ThreatML

As cybersecurity in a zero-trust era becomes increasingly important for organizations protecting customer data and business operations, mere anomaly detection and finding known threats is not enough....

View Article

Cybersecurity Alert Visibility: NOT Black Box Detection

Chris Ford, RVP of Product and Engineering at Threat Stack / Application Infrastructure Protection, (part of F5,) has had many customers who are frustrated with other vendors who take a “black box”,...

View Article

Creating Compliance Framework Templates with Threat Stack

As customer data protection expectations and regulatory compliance mandates in cybersecurity become more and more focused, organizations seek ways to fulfill compliance in effective, yet rapid, ways,...

View Article


Microservice Cloud Security Monitoring Reduces MTTK

Genesys gets actionable cloud security monitoring in context Genesys needed actionable cloud security monitoring, security visibility, and a way to secure their new cloud environment that had just...

View Article

Cloud-Based Application Infrastructure Protection

Cloud-based cybersecurity requires application infrastructure protection as well as application and API protection. With the purchase of Threat Stack by F5, these two cloud security companies merge...

View Article

Cybersecurity That’s Not Fairy Dust: It’s Cloud Security Engineering and Science

In the ever-evolving and increasingly competitive cybersecurity environment, Threat Stack and Lacework both aim to support customers in detecting critical threats to cloud-native workloads. Both...

View Article


Threat Stack’s Network Access Control Cybersecurity: Improvements Through...

The benefits of working on the cloud far outweigh the risks, yet recent crypto-jacks and cyber-attacks on both the app/API and infrastructure levels prove how fragile cloud-based operations can be....

View Article


HIPAA Compliance and HIDS For Healthcare IT: Case Study

Stratasan’s Security and Compliance Solution Healthcare IT Customer’s Cybersecurity Problem Stratasan delivers web-based software and professional services that enable healthcare organizations to...

View Article
Browsing latest articles
Browse All 25 View Live




Latest Images