Managing the Unseen Attack Surface

What is the Cloud Security Maturity Model and How mature are you?

US National Institute of Standards and Technology (NIST) defines “Attack surface” as: The set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or extract data from, that system, system element, or environment. However, this definition is predominantly relevant […]

The Perfect Storm: Lack of Security and Cloud Skills

It is a fact that the security industry suffers from a chronic shortage of skilled employees. This global shortage, which ISC2 estimates at 4 million professionals. The global workforce is estimated at 5.5 million people, meaning it nearly needs to double itself to keep up with growing demand.  This is so profound that 71% of […]

SEC Cyber Rule: A Primer for Practitioners by Alex Sharpe

Please check out this guest blog post by Alex Sharpe, a Cyber Security Expert with decades of experience. The SEC Cybersecurity Rule is designed to provide transparency so investors can make information decisions. The rule effectively imposes two requirements on publicly traded companies. The full rule can be found here. The SEC has three missions: […]

Fight AI-based Threats with AI-based Security

Security teams are quickly realizing the benefits of Generative AI and are incorporating this technology into their security products for earlier detection of risks in the environment. AI can help security teams better recognize and resolve threats and exposures in their cloud environment. However, threat actors have also realized that AI offers them benefits as […]

AWS re: Invent 2023 recap

Can you believe that re: Invent ended only 10 days ago! Skyhawk had a great event – great conversations, a great product launch and lots of coverage. So, what did we learn? Purple team is “the perfect use case for Generative AI”. We heard this from industry experts, customers, and prospects. Continuous Proactive Protection is […]

New Horizons in Cloud Security Part 1: Assembling LLMs to Discern Malicious Activities with “Integrated Learning”

This blog was written by Amir Shachar, Director, AI and Research. The digital landscape constantly evolves, increasing complexity to cloud security. In this dynamic environment, it’s becoming more and more challenging to pinpoint and assess the risks associated with cloud incidents, especially when the sequences in question straddle the line between malicious and benign intentions. […]

Unleashing the Power of Multiple AI Layers for Detecting Unknown Cybersecurity Threats

This blog is authored by Amir Shachar, Chief Data Scientist at Skyhawk Security. If you are reading this blog, you are probably wondering how to detect unknown unknowns in the realm of cybersecurity. The very nature of these unknown threats makes them difficult to detect using conventional security measures. However, by leveraging a platform that […]

Skyhawk Synthesis Security Platform mentioned in the 2023 Gartner® Emerging Tech: Security — Cloud Investigation and Response Automation Offers Transformation Opportunities

This post was written by Jennifer Gill, VP Product Marketing at Skyhawk. Skyhawk Security was recently mentioned in Gartner research, “Emerging Tech: Security – Cloud Investigation and Response Automation Offers Transformation Opportunities”, and we think that it really aligns with our vision and strategy. According to the Gartner report, “Cloud investigation and response automation is […]

See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.