The Cado Blog

Read timely commentary from the Cado Security team.

May 3, 2022

Cado Security Selected as Top 10 Finalist for RSA Conference 2022 Innovation Sandbox Contest

Today we’re beyond excited to announce that Cado Security has been named one of 10 finalists for the RSA Conference...
April 14, 2022

Investigating AWS ECS with Cado Response

Cado Response delivers forensic-level detail without forensic-level effort. Through the power of automation, the Cado Response...
April 12, 2022

AWS ECS: Fully Managed but Frustrating to Investigate

Cloudy with a High Chance of Containers Cloud computing is no longer a new idea but we are very much still in a period of...
April 11, 2022

Top 9 Best Practices for AWS ECS Security

AWS ECS is a fully managed container service that allows organizations to easily deploy, manage, and scale containerized...
April 6, 2022

Cado Discovers Denonia: The First Malware Specifically Targeting Lambda

By Matt Muir, with thanks to Chris Doman, Al Carchrie and Paul Scott. Organisations – both large and small – are increasingly...
April 5, 2022

Cado Security Extends Support To Serverless Environments 

Today we’re thrilled to announce that we’ve extended support to serverless environments! With enhanced visibility...
March 24, 2022

Automating Investigations to Turn your Response Pipeline into a Feedback Loop

One of the core concepts in DevOps (and DevSecOps) is the creation and amplification of feedback loops. By creating, shortening...
March 15, 2022

Cado Response Platform Now Available to Enterprises in AWS Marketplace

We’re beyond excited to announce that the Cado Response Platform is now available in AWS market marketplace to further...
February 22, 2022

Intelligence Driven Cloud Incident Response with Cado Response and SophosLabs Intelix

By Daniel Hunt and Chris Doman In the cloud, security incidents happen fast. But defenders can move even faster. In Cloud...