Unpacking The SEC’s Cybersecurity Disclosure For Incident Response Teams
The Securities and Exchange Commission (SEC) has introduced new rules mandating public companies to report cybersecurity breaches. This highlights the growing importance of cyber security outside of...
View ArticleCado Security Releases H2 2023 Cloud Threat Findings Report
Cado Security Labs, Cado’s internal threat research function, today released its H2 2023 Cloud Threat Findings Report to help security teams secure against cloud-focused threat actors. Cado Security...
View ArticleAligning Forensic Investigations To The MITRE ATT&CK Framework
In this blog we’ll explore how the Cado Security platform leverages the MITRE ATT&CK Framework to enhance forensic investigations. By combining ATT&CK’s comprehensive knowledge with Cado’s...
View ArticleUPCOMING WEBINAR – Fireside Chat: Navigating The Cloud – Expert Insights On...
REGISTER NOW HERE Join James Campbell, Co-Founder and CEO of Cado Security, and Robert Wallace, Senior Director at Mandiant, for a fireside chat to delve into the evolution of cloud threats and the...
View ArticleThe Differences Between Full Disk And Triage Acquisition
In digital forensics, data acquisition is a key first step in the investigation process. For acquiring data from either physical or virtual machines, there are two high-level approaches: full disk...
View ArticleChallenges Of DFIR In Distroless And Other Container Environments
Containerization has changed the way organizations develop and deploy applications. However, the same benefits that make containers attractive, their ephemeral and layered nature, also present unique...
View ArticleSOC Automation: More Secure For Less Cost
Your SOC is on the front line of defending your organization from cyber attacks and they are drowning in a wave of thousands of alerts every single day. This is a serious problem: Inducing high stress...
View ArticleVigilance In Action: Monitoring Typosquatting Domains
In today’s digital landscape, cybercriminals are constantly devising new and innovative ways to infiltrate and compromise corporate systems. One such tactic is called typosquatting: the registration of...
View ArticleFrom Automation To Exploitation: The Growing Misuse Of Selenium Grid For...
Cado Security reveals two campaigns turning Selenium Grid from a tool of automation into a weapon for cryptomining and proxyjacking.
View ArticleNavigating The Cloud – Expert Insights On Emerging Cloud Threats And...
James Campbell, CEO and Co-Founder of Cado Security, and Robert Wallace, Senior Director at Mandiant, delve into the evolving landscape of cloud security.
View ArticleRevolutionize Cloud Investigation And Response Automation
The Cado Platform revolutionises cloud investigation and response by leveraging cloud speed, scalability and automation.
View Article