Cloud Native Threat Detection

Fire up Your Cloud Threat Detection Program

There are two types of companies: those that have been hacked, and those who don't know they have been hacked.
- John Chambers
cloud siem devices and sensors

See Everything

Comprehensively monitor events irrespective of cloud provider or service.

Cloud Native

An architecture that's born on the cloud, built on server-less infrastructure and integrates seamlessly with cloud native sources.

cloud native architecture

Threat Response

Integrate with SOAR platforms or write playbooks to mitigate threats in near realtime.

threat orchestration and response automation

Further Reading


Practical AWS Logging in 5 Steps

Logging is probably one of the most crucial areas when a security or operational incident needs to be investigated…. is what most technology practitioners would say.  But, monitoring logs for malicious or unusual activity, carrying out threat hunting are proactive

Read More »
aws s3 security

14 AWS S3 Security Best Practices

S3 or Simple Storage Service : the most popular service in AWS and undoubtedly the most low hanging service from a security misconfiguration perspective.  Over the years, organisations hosted on public cloud have seen a series of breaches arising due

Read More »
denonia monero mining

Denonia – Guide to Prevention & Detection

Well it’s not unheard of, that security issues, malware or exploits often follow soon after an emerging technology finds prominence. Denonia, the first Lambda malware is out. Originally discovered by Cado Labs a few days ago, Denonia specifically targets Lambda functions with

Read More »

Ready to try?