Making Supervised Learning Work: Threat Stack’s Unique Data Labeling...
Do you have those moments when suddenly the light goes on in your head, and you “get it”? Most of us do. Usually, it’s because I’m overthinking something, OR I’m not following a logic thread through to...
View ArticleReducing Teams’ Burdens–ThreatML w/ Supervised Learning
Cybersecurity is known for adding resource burdens to DevSecOps teams. But those burdens can be significantly reduced by the right cloud security solutions. Threat Stack’s RVP of Product and...
View ArticleReal World: How Machine Learning Modeling Works–ThreatML
As cybersecurity in a zero-trust era becomes increasingly important for organizations protecting customer data and business operations, mere anomaly detection and finding known threats is not enough....
View ArticleCybersecurity Alert Visibility: NOT Black Box Detection
Chris Ford, RVP of Product and Engineering at Threat Stack / Application Infrastructure Protection, (part of F5,) has had many customers who are frustrated with other vendors who take a “black box”,...
View ArticleCreating Compliance Framework Templates with Threat Stack
As customer data protection expectations and regulatory compliance mandates in cybersecurity become more and more focused, organizations seek ways to fulfill compliance in effective, yet rapid, ways,...
View ArticleMicroservice Cloud Security Monitoring Reduces MTTK
Genesys gets actionable cloud security monitoring in context Genesys needed actionable cloud security monitoring, security visibility, and a way to secure their new cloud environment that had just...
View ArticleCloud-Based Application Infrastructure Protection
Cloud-based cybersecurity requires application infrastructure protection as well as application and API protection. With the purchase of Threat Stack by F5, these two cloud security companies merge...
View ArticleCybersecurity That’s Not Fairy Dust: It’s Cloud Security Engineering and Science
In the ever-evolving and increasingly competitive cybersecurity environment, Threat Stack and Lacework both aim to support customers in detecting critical threats to cloud-native workloads. Both...
View ArticleThreat Stack’s Network Access Control Cybersecurity: Improvements Through...
The benefits of working on the cloud far outweigh the risks, yet recent crypto-jacks and cyber-attacks on both the app/API and infrastructure levels prove how fragile cloud-based operations can be....
View ArticleHIPAA Compliance and HIDS For Healthcare IT: Case Study
Stratasan’s Security and Compliance Solution Healthcare IT Customer’s Cybersecurity Problem Stratasan delivers web-based software and professional services that enable healthcare organizations to...
View Article
More Pages to Explore .....