Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»Technologies»Skyhawk launches AI-driven proactive cloud security
Technologies

Skyhawk launches AI-driven proactive cloud security

CloudSecNewsHubBy CloudSecNewsHubDecember 2, 2023No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Skyhawk Launches Ai Driven Proactive Cloud Security
Share
Facebook Twitter LinkedIn Pinterest Email

Cloud computing and technologies

GT

In cloud-based systems, most security is reactive, meaning that security provisions don't kick in until something happens, such as malware starting to attack cloud applications. Often when this happens, some damage has already been done, and the malware may already be inside the servers, meaning security personnel have to deal with removing the malware and repairing the damage that has been done.

Keith J explained: Vincent, principal engineer at Technologent, notes that “all cloud security solutions to date react to problems that have already been created.” “There are several issues with this approach, especially with regard to threat detection.”

In other words, reactive solutions are not fast enough to protect data and applications in the cloud. “For cloud security, organizations need the ability to respond faster to cybersecurity threats and manage threat detection more efficiently,” said John Yeoh, global vice president of research at Cloud Security Alliance. “Today, the cloud ecosystem and technology stack are increasingly complex, and the emergence of generative AI business tools has increased this. However, cloud security’s generative AI capabilities can adapt to an organization’s increasing use of technology and the customer’s specific cloud environment, providing Improved security awareness, visibility and response.

Given cybersecurity skills shortages and budget constraints, generative AI for cloud security is critical to automating threat detection and response, as well as for vulnerability management and compliance, Yeoh said.

And it's not a minute too early. According to Stu Sjoerman, writing for Forbes, the first AI-based malware has already been released as part of an academic test. In addition, he said that IBM's DeepLocker, an AI-powered ransomware package that has not yet been released but could soon, has already been tested.

Real-time security

Cyber ​​security technology

GT

Attacking security with a real-time solution, so that threats are identified and stopped before they can harm data or applications on cloud servers, is the most effective approach, but until recently there have been tools to achieve this kind of proactive approach. It didn't exist. But now, AI-based anti-malware solutions are starting to emerge. One of the first companies is Skyhawk Security, which has updated its Synthesis platform to operate in real-time vulnerability scanning and situation management.

What Skyhawk is doing now is adopting the military approach of using red and blue teams to look for weak spots. Each of these AI teams attacks protected cloud infrastructure in their own way, sharing what they've learned with each other. Teams look for paths of least resistance, while also learning about security capabilities and the nature of the data being protected.

Then, using what the teams learn, they launch simulated attacks looking for vulnerabilities. Chen Burchan, CEO of Skyhawk Security, described this approach as a paradigm shift, and said the process is constantly iterative, assessing defenses in real time.

“The model we are changing advances beyond current ‘reactive’ solutions,” Barchan said. Skyhawk is automatic, but allows fine-tuning of the specific implementation. “Response automation works at two levels, either in assisted or fully automated response modes,” he said.

“Skyhawk has three layers of artificial intelligence working in the system,” Borsgam explained. “The first layer detects suspicious behaviors. These are suspicious activities called indicators of malicious behavior. The second layer correlates activities and issues alerts when the associated activities indicate an incident. This layer is responsible for ensuring that the customer receives real alerts and reducing alert fatigue resulting from false positives. As for The third layer, which uses generative AI, acts as a virtual incident responder, analyzing interconnected events as they are built and can raise the alert level and add reasons for alerting.

Skyhawk is a cloud-native application, which makes implementation relatively easy, usually within the capacity of internal staff. The company said that this does not affect the system's performance.

AIdriven cloud launches proactive security Skyhawk
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWiz unveils secure cloud development capabilities
Next Article The new Cisco AI Assistant looks to drive cloud security automation
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
News

The most prominent report: 2025 Experience of exposure to cloud data

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?