Darktrace has completed the acquisition of Cado Security.
Read the announcement press release here
Platform
Products
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Comprehensive risk management
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber AI Analyst
Investigates every alert like a human analyst, at the speed and scale of AI
Darktrace Services
Maximize your security investments with 24/7 expert support and incident management from our global SOC team.
Our AI
Resources
Customers
Blog
Events
Inside the SOC
The Inference
Glossary
All resources
White paper
The AI Arsenal: Understanding the Tools Shaping Cybersecurity
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partners
Overview
Partner Portal
Technology Partners
Integrations
Featured Partners
Microsoft
AWS
Mclaren
Products
Overview
/ NETWORK
Proactive protection
/ EMAIL
Cloud-native AI security
/ CLOUD
Complete cloud coverage
/ OT
Defend critical systems
/ IDENTITY
360° user protection
/ ENDPOINT
Coverage for every device
/Proactive Exposure Management
/Attack Surface Management
/Incident Readiness & Recovery
Cyber AI Analyst
Services
Our AI
Resources
All Resources
Customers
Blog
Events
The Inference
Inside the SOC
Glossary
Company
About us
Contact
Careers
Leadership
News
Federal
Academy
SDR Academy
Legal
Partners
Overview
Partner Portal
Technology Partners
Become a Partner
Integrations
Microsoft
AWS
Mclaren
Get a demo
Get a demo
Get a demo
Register now
Topic
Identity
Learn how to protect your cloud applications and users in an increasingly hostile and complex threat landscape.
View all
Category one
Category two
Category three
Category four
Identity
Bytesize Security: Insider Threats in Google Workspace
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Vivek Rajan
Cyber Analyst
Identity
Behind the Veil: Darktrace's Detection of VPN Exploitation in SaaS Environments
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Priya Thapa
Cyber Analyst
Identity
Thread hijacking: How attackers exploit trusted conversations to infiltrate networks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Maria Geronikolou
Cyber Analyst
Identity
Attack Trends: VIP Impersonation in the Business Hierarchy
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Kendra Gonzalez Duran
Director, Field CISO
Identity
How Darktrace Halted A DarkGate in MS Teams
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Natalia Sánchez Rocafort
Cyber Security Analyst
Identity
How Darktrace Stopped an Account Hijack Fast
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Min Kim
Cyber Security Analyst
Identity
PerfectData Software Abuse and Account Takeover Risks
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Sam Lister
SOC Analyst
Identity
Darktrace Stops Large-Scale Account Hijack
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Zoe Tilsiter
Cyber Analyst
Identity
Multi-Factor Authentication: Not the Silver Bullet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Tegbir Singh
Cyber Analyst
Identity
Account Hijack Prevention: Detect, Respond & Escalate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Lydiane-Ashley Belle
Cyber Security Analyst
Identity
Understanding The Threat of Social Engineering
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Brianna Leddy
Director of Analyst Operations
Identity
Multi-Account Compromise in Office 365
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Laura Leyland
Cyber Analyst
Identity
How AI Keeps Priefert Productive and Secure
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.
Mike Autrey
Lead Network Administrator at Priefert (Guest Contributor)
Identity
Multi-Account Hijack Detection with AI
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.