ReportsPractical Guide to Cloud Detection and ResponseWe published a new report! Check out our new Practical Guide to Cloud Threat Detection, Investigation, and Response. The report is...
Mar 27ResearchDefeating Kubernetes Privilege Escalation: A Cloud Threat Detection & Incident Response Case Study
Feb 8ResearchLessons from Cloudflare’s Response to the Okta Breach: How to Detect & Respond to Cloud Identity Compromise
Jan 22ResearchGem Cloud Security Research Update: What to Know about the Microsoft Cloud Tenant Breach
Dec 21, 2023ProductHow Gem's Architecture Enables Real-Time Enrichment & Analysis of Cloud Telemetry at Scale
Dec 19, 2023ResearchUncovering Hybrid Cloud Attacks Through Intelligence-Driven Incident Response: Part 3 – The Response
Dec 15, 2023ResearchUncovering Hybrid Cloud Attacks Through Intelligence-Driven Incident Response: Part 2 – The Attack
Dec 12, 2023ResearchUncovering Hybrid Cloud Attacks Through Intelligence-Driven Incident Response: Part 1– Addressing the Speed of Cloud Attacks
Nov 9, 2023ResearchLessons from the Okta Breach: Strategies for Protecting Against Identity-Based Threats
Nov 7, 2023ProductGem launches cloud detection and response for identity, covering Okta, Azure AD and Google Workspace
Sep 7, 2023ResearchAWS Console Session Traceability: How Attackers Obfuscate Identity Through the AWS Console