“Toxic Combinations” are Inadequate: A Case Study

Posture management has turned into an exercise in prioritization, but this hasn’t made us safer. This post was written by Chen Burshan, CEO of Skyhawk Security If a Tree Falls in the Forest… We all know the adage, “If a tree falls in the forest and nobody is there to hear it, does it make […]

Next-Generation Threat Detection for Breach Prevention

Security companies are overwhelming security teams with cloud threat detection and response tools, but what does this really mean? What is cloud threat detection and response and what are the capabilities that security teams should look for in a cloud threat detection and response platform? This blog will go over the top capabilities for cloud […]

Three Reasons why SIEMs are not Enough

Security Information and Event Management (SIEM) tools are often used to detect threats. Rules are set up to monitor the environment and once a rule is violated, it triggers an alert. Security Operation Centers spend months configuring the rules to ensure that they are triggered only when malicious behavior is present. However, as you will […]

The Simplicity Series: SBIs and MBIs – Do you need the FBI? 

SBIs and MBIs from Skyhawk Security – what are they? What do they mean and why do you care?  SBIs are suspicious behavior indicators and individual events, and MBIs are malicious behavior indicators correlating a sequence of SBIs that together are raised to indicate an alert. Differentiating between these two types of behaviors communicates to […]

Using ChatGPT to Augment Threat Detection

Skyhawk recently announced a couple of new features that are based on ChatGPT. What’s new? Watch this video and then read the blog for details: A new addition to our scoring mechanisms for malicious events called ‘Threat Detector’. We use the ChatGPT API as an “advisor” to help us be more confident about our scoring […]

Theoretical vs. Actual Cloud Threat Detection

Theoretical vs. Actual Cloud Threat Detection: How Skyhawk Discovers Incidents Before They Become Breaches Today’s security platforms can identify misconfigurations, open ports, unused permissions, and databases exposed to the internet. These are all issues that need to be corrected as they could be exploited to breach your data. The operative word here is could. You […]

Using the MITRE ATT&CK Framework for Threat Detection and Response

This post was written by Rotem Klar, Product Manager at Skyhawk. Above all else, security is a culture. Companies who strive to develop the most sophisticated security solutions will need to participate in today’s security culture, keep up with the evolving cybercrime market, as well as talk the cyber-security language and be familiar with the […]

The Science Behind our Security Part 1: Machine Learning

This post about ML in cybersecurity was written by Jennifer Gill, VP Product Marketing at Skyhawk. Securing a cloud while meeting the need of developers and the business and supporting compliance initiatives, is difficult to say the least. Analyzing trends across user behavior, application usage, cloud performance, for a single account and then across clouds, […]

5 Reasons Why CSPM Tools are not Enough

This post was written by Jennifer Gill, VP Product Marketing at Skyhawk. Cloud Security Posture Management (CSPM) tools are an important part of any security strategy. However, they fall woefully short in terms of being the end game to secure your public cloud. Why? They only look at the static configuration of your environment, and […]

Thanks For Reaching Out!

One of our expert will get back to you
promptly at asafshachar@gmail.com

See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.