Skip to content
Get a Demo
    curve design on left

    Cloud Investigations

    blog post featured image
    blog icon Featured Post |

    Darktrace's Proposed Acquisition of Cado Security

    January 22, 2025

    We are excited to share the news that Darktrace has announced its proposed acquisition of Cado Security. This milestone marks a new chapter...

    Continue Reading
    blog icon Cloud Investigations
    Forensics or Fauxrensics? 5 Core Capabilities for Cloud Forensics and Incident Response
    February 23, 2024

    The speed and scale at which new cloud resources can be spun up has resulted in uncontrolled deployments, misconfigurations,...

    Continue Reading
    blog icon Cloud Investigations
    Implementing a Proactive Cloud Incident Response Strategy
    January 23, 2024

    The question of an incident occurring is an 'if' not 'when' scenario. Thus, an organization's level of preparedness to...

    Continue Reading
    blog icon Cloud Investigations
    Saved Searches Drive Consistent Investigations
    December 28, 2023

    Recently we talked about “NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response” and the emphasis...

    Continue Reading
    blog icon Cloud Investigations
    Navigating the Cloud: The Art of Digital Forensics and Incident Response in Google Cloud Platform (GCP)
    November 28, 2023

    Organizations of all sizes are making a monumental shift towards cloud computing to improve efficiency, scalability, and...

    Continue Reading
    blog icon Cloud Investigations
    Top Security Best Practices for Google Cloud Platform (GCP)
    November 20, 2023

    In the fast-paced and ever-evolving digital landscape, cloud computing has become the backbone of modern businesses. Among...

    Continue Reading
    blog icon Cloud Investigations
    Navigating the Cyber Security Regulatory Maze: Balancing Incident Response, Breach Disclosure, and Compliance in the Cloud Era
    October 27, 2023

    Amidst the rapid migration to cloud and the persistent cyber threat landscape, businesses face a formidable task of managing...

    Continue Reading