Skyhawk Security re:Invent Recap

AWS Security Blog Cloud Security

Re:Invent has come to a close and we had a great week! 

We kicked off the week with our product announcement. Did you know that most threat actors (70%) are logging into the cloud – they are not “breaking in”. Today, threat actors are using leaked credentials and API keys to log into the cloud, making it hard for the SOC to determine which activities are malicious given a legitimate identity was compromised. Skyhawk’s new capability, Interactive CDR, verifies suspicious activity with the cloud asset owner, who can indicate whether the behavior is a threat or legitimate, though irregular activity. With Skyhawk’s Interactive CDR, enterprises add a cloud-native zero trust solution to their overall zero trust strategy to help prevent cloud breaches natively. 

How does it work? 

When an abnormal activity is detected, the cloud asset owner is determined, and an alert is sent to their phone asking them to confirm if they are the ones executing the activity or not. If they are, they can just say “Yes, it is me”, additional context is added to the alert which helps the SOC reduce alert fatigue. If the asset owner says, “No, report it”, then all alarms go off, the SOC knows they need to take action fast. Read the blog or press release for more information.  

Skyhawk’s proactive and interactive CDR in a single platform for the very first time bridges the gaps and reduces friction between cloud teams, cloud security and SOC, and reduces the alert fatigue. It adds context both proactively, before an incident happens and interactively, when an incident happens. And the market was clearly listening as we had lots of coverage!  

SC Media recognized the need to align with zero trust principles by treating all users – inside or out – with suspicion. ChannelE2E and MSSP covered the news as well. This really showed us that many recognize this risk – threat actors with credentials are all too common and the strain on the SOC to find these threat actors is high.  Finally, you can read these more from Solutions Review, SiliconAngle, Market Insider by Business Insider, and SecurityWeek 

We had several great conversations with prospects – when we said threat actors are logging in – there was 100% agreement on that. Many were very interested in how we add security validate proactively as well as add context and differentiate between a real threat and just one-off behavior from employees interactively. Skyhawk Security’s Platform is an award-winning technology, and this latest enhancement furthers the goal – to prevent cloud breaches. 

People still like the giveaways! Light-up wristbands, sleep masks, and Bluetooth speakers were all on the scene and people stopped to learn about Skyhawk but also pick up some swag 😊 which was a hit!  

Finally, as always, it is always great to see our coworkers, friends, and colleagues who are so far away.  

You can try the product for free – sign up today! 

Blog

We may have recently been exposed to the largest cyber campaign of all times, in which China managed to completely penetrate the communications infrastructure of its great rival, the United States.In doing so, gained access to huge amounts of invaluable

Cloud Breach
Blog

The global cloud market continues to grow rapidly, growing 23% year-over-year. This year, Google captured 13%, up from 10% last year. Google complements this impressive growth rate with an emphasis on privacy and security. The commitment to security is clear,

Cloud BreachCloud SecurityCSPM
Blog

Re:Invent has come to a close and we had a great week! We kicked off the week with our product announcement. Did you know that most threat actors (70%) are logging into the cloud – they are not “breaking in”.

Cloud BreachCloud SecurityThreat Detection
Blog

Skyhawk Security is proud to announce the expansion of its cloud threat detection and response capabilities with Interactive CDR. This new capability expands the team that can verify if an activity is malicious or not, by going to the alleged

AICloud BreachCloud SecurityThreat Detection
Blog

Skyhawk Security announces the availability of new features and integrations of its Autonomous Purple Team, aimed at extending detection and improving security validation as well as pre-validating threat detection alerts, to effectively manage the security of your cloud. The company

AICloud BreachCloud SecurityThreat Detection
Blog

By Asaf Shahar, VP, Product at Skyhawk Security Securing cloud environments presents unique challenges due to their constantly evolving nature. CERT-IL’s alert on public cloud threats (ALERT-CERT-IL-W-1810) underscores common vulnerabilities—exposed credentials, service misconfigurations, and inadequate tenant isolation—frequently exploited by attackers.

AICloud BreachCloud SecurityThreat Detection

Thanks For Reaching Out!

One of our expert will get back to you
promptly at asafshachar@gmail.com

See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.