Skyhawk Security re:Invent Recap

AWS Security Blog Cloud Security

Re:Invent has come to a close and we had a great week! 

We kicked off the week with our product announcement. Did you know that most threat actors (70%) are logging into the cloud – they are not “breaking in”. Today, threat actors are using leaked credentials and API keys to log into the cloud, making it hard for the SOC to determine which activities are malicious given a legitimate identity was compromised. Skyhawk’s new capability, Interactive CDR, verifies suspicious activity with the cloud asset owner, who can indicate whether the behavior is a threat or legitimate, though irregular activity. With Skyhawk’s Interactive CDR, enterprises add a cloud-native zero trust solution to their overall zero trust strategy to help prevent cloud breaches natively. 

How does it work? 

When an abnormal activity is detected, the cloud asset owner is determined, and an alert is sent to their phone asking them to confirm if they are the ones executing the activity or not. If they are, they can just say “Yes, it is me”, additional context is added to the alert which helps the SOC reduce alert fatigue. If the asset owner says, “No, report it”, then all alarms go off, the SOC knows they need to take action fast. Read the blog or press release for more information.  

Skyhawk’s proactive and interactive CDR in a single platform for the very first time bridges the gaps and reduces friction between cloud teams, cloud security and SOC, and reduces the alert fatigue. It adds context both proactively, before an incident happens and interactively, when an incident happens. And the market was clearly listening as we had lots of coverage!  

SC Media recognized the need to align with zero trust principles by treating all users – inside or out – with suspicion. ChannelE2E and MSSP covered the news as well. This really showed us that many recognize this risk – threat actors with credentials are all too common and the strain on the SOC to find these threat actors is high.  Finally, you can read these more from Solutions Review, SiliconAngle, Market Insider by Business Insider, and SecurityWeek 

We had several great conversations with prospects – when we said threat actors are logging in – there was 100% agreement on that. Many were very interested in how we add security validate proactively as well as add context and differentiate between a real threat and just one-off behavior from employees interactively. Skyhawk Security’s Platform is an award-winning technology, and this latest enhancement furthers the goal – to prevent cloud breaches. 

People still like the giveaways! Light-up wristbands, sleep masks, and Bluetooth speakers were all on the scene and people stopped to learn about Skyhawk but also pick up some swag 😊 which was a hit!  

Finally, as always, it is always great to see our coworkers, friends, and colleagues who are so far away.  

You can try the product for free – sign up today! 

Blog

In recent Gartner® research, Emerging Tech Disruptors: Top 5 Early Disruptive Trends in Cybersecurity for 2025, it is noted that there will be a shift from detection and response to preemptive cyber defense using key AI-advancements like Simulation Digital Twins.

Blog

As cloud adoption continues to gain traction, so do the risks and challenges of its security. The latest Google Cloud Threat Horizons Report for the first half of 2025, titled:” Evolving Ransomware and Data Theft Risks in the Cloud”, highlights

Cloud BreachAICloud SecurityThreat Detection
Blog

The digital transformation of industries worldwide has been powered by advancements in Information Technology (IT). Over the past two decades, IT has reshaped nearly every facet of modern life, from communication to commerce, especially in developing countries. Within this growth,

Cloud BreachAICloud SecurityThreat Detection
Blog

MITRE ATT&CK® framework provides a comprehensive matrix detailing the tactics and techniques adversaries employ during cyber attacks on cloud environments But as recent attacks illustrate, hackers no longer need to tread the long an winding path described by MITRE ATT&CK®

Cloud BreachAICloud SecurityThreat Detection
Blog

As organizations continue to embrace cloud technology, they often overlook one of the most fundamental security risks: cloud credential theft. Securing the cloud itself is instrumental for organizations to operate in our time (see the very recent CISA Binding Operational

Cloud BreachCloud Security
Blog

The year is 1985. The movie Back to the Future is released, and the crowds are pouring to see Marty McFly travel through time. If you were in high school back then, it just might be that your school records

AIThreat Detection
See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.