Theoretical vs. Actual Cloud Threat Detection

Theoretical vs. Actual Cloud Threat Detection: How Skyhawk Discovers Incidents Before They Become Breaches Today’s security platforms can identify misconfigurations, open ports, unused permissions, and databases exposed to the internet. These are all issues that need to be corrected as they could be exploited to breach your data. The operative word here is could. You […]

Using the MITRE ATT&CK Framework for Threat Detection and Response

This post was written by Rotem Klar, Product Manager at Skyhawk. Above all else, security is a culture. Companies who strive to develop the most sophisticated security solutions will need to participate in today’s security culture, keep up with the evolving cybercrime market, as well as talk the cyber-security language and be familiar with the […]

The Science Behind our Security Part 1: Machine Learning

This post about ML in cybersecurity was written by Jennifer Gill, VP Product Marketing at Skyhawk. Securing a cloud while meeting the need of developers and the business and supporting compliance initiatives, is difficult to say the least. Analyzing trends across user behavior, application usage, cloud performance, for a single account and then across clouds, […]

5 Reasons Why CSPM Tools are not Enough

This post was written by Jennifer Gill, VP Product Marketing at Skyhawk. Cloud Security Posture Management (CSPM) tools are an important part of any security strategy. However, they fall woefully short in terms of being the end game to secure your public cloud. Why? They only look at the static configuration of your environment, and […]

What the Uber Breach Verdict Means for CISOs in the US

Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment. This is a challenging time to be a CISO. The security community has been eagerly following multiple stories regarding Uber in the past few […]

Thanks For Reaching Out!

One of our expert will get back to you
promptly at asafshachar@gmail.com

See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.