34% of organizations lack cloud cybersecurity skills

Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to identified threats, according to Cado Security. The incident response challenge is fur… Continue reading 34% of organizations lack cloud cybersecurity skills

Cado Security launches solution for forensic investigations in distroless container environments

Cado Security has introduced a solution for conducting forensic investigations in distroless container environments. With Cado Security’s new offering, security teams can investigate the root cause, scope, and impact of malicious activity detected with… Continue reading Cado Security launches solution for forensic investigations in distroless container environments

Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats

Cado Security has uveiled its partnership with Wiz and joins Wiz Integration (WIN) Platform. Cado Security enhances WIN by bringing the power of the Cado Security platform to the partner ecosystem so that Wiz customers can seamlessly integrate Cado int… Continue reading Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats

Infosec products of the month: March 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Cado Security, Check Point, CyberArk, Cynerio, DataDome, Delinea, Drata, Exabeam, GitGuardian, GitHub, GlobalSign, Legat… Continue reading Infosec products of the month: March 2024

Cado Security enables organizations to investigate and respond to potential M365 threats

Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 compromises such as business email compromise (BEC), account takeover (ATO), and insi… Continue reading Cado Security enables organizations to investigate and respond to potential M365 threats

CloudGrappler: Open-source tool detects activity in cloud environments

CloudGrappler is an open-source tool designed to assist security teams in identifying threat actors within their AWS and Azure environments. The tool, built on the foundation of Cado Security’s cloudgrep project, offers enhanced detection capabilities … Continue reading CloudGrappler: Open-source tool detects activity in cloud environments

Cryptojacking is no longer the sole focus of cloud attackers

As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in sophistication and number – a collective effort to safeguard both large and small enterprises is critical, according to Cado Security. Docker rema… Continue reading Cryptojacking is no longer the sole focus of cloud attackers

Cloud security predictions for 2024

As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp of a paradigm shift in cloud security. Businesses and cybersecurity professionals must stay abreast of these changes, a… Continue reading Cloud security predictions for 2024

Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Cado Security has unveiled Cado’s Incident Readiness Dashboard. This new dashboard provides the ability to proactively run readiness checks, see readiness trends over time, and identify issues that could prevent the organization from rapidly responding… Continue reading Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Jupyter Notebooks targeted by cryptojackers

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter is a service that allows you to host individual … Continue reading Jupyter Notebooks targeted by cryptojackers