Skip to content
Get a Demo
    curve design on left

    The Cado Blog

    Read timely commentary on the latest in cloud incident response from the Cado Security team.

    blog post featured image
    blog icon Featured Post |

    What’s New In The Cado Platform Q3 2024

    November 19, 2024

    As we continue to enhance and expand the capabilities of the Cado platform, Q3 2024 brings a host of updates designed to improve the...

    Continue Reading
    cloud image
    blog icon Event Recap
    Uncovering Threats with Cado Security: Highlights from the October 30th CTF
    November 6, 2024

    On October 30th, Cado Security hosted an engaging Capture the Flag (CTF) event, offering cybersecurity professionals an...

    Continue Reading
    blog icon Product Updates
    Cado's 'Impact' Rating: Prioritizing Alerts to Focus SOC Analyst Attention
    November 1, 2024

    SOC teams are often overwhelmed with a constant barrage of alerts, and the ability to effectively prioritize these alerts is...

    Continue Reading
    blog icon Product Updates
    Integrating with Ticketing Systems: Enriching Analyst Tickets With the Cado Platform
    October 28, 2024

    Incident response is a complex process, often requiring multiple tools and teams to collaborate efficiently. One of the key...

    Continue Reading
    blog icon Cloud DFIR
    Exploring the Breadth and Depth of Data Collection with Cado Security
    October 24, 2024

    Threat detection and response require more than just surface-level alerts, especially when facing increasingly sophisticated...

    Continue Reading
    blog icon Cloud DFIR
    The Future of Incident Response: AI-Powered Investigations with Cado Security
    October 21, 2024

    As organizations migrate more of their critical infrastructure to the cloud, the amount and complexity of cyberattacks have...

    Continue Reading
    blog icon Research & Threat Intel
    Part 2: Investigating Docker Hijacking Malware - A Deep Dive into ELF Binary Analysis
    October 18, 2024

    As the adoption of containerized environments like Docker continues to rise, so does the interest of cybercriminals in...

    Continue Reading