Credit: Thinkstock Orca Security has added cloud detection and response (CDR) capabilities to its cloud security platform, the company announced Tuesday. The new feature expands the platform’s ability to detect, investigate, and respond to in-progress attacks.“What we’re adding with the CDR capability is the ability to have full visibility for governance of the cloud environment from workload scanning to non-workload related incidents,” says Orca CEO and co-founder Avi Shua. “What we’re seeing more frequently is that many attacks these days don’t involve workloads at all so putting endpoint protection on them is not going to protect an organization.”“Endpoint protection is limited by deployment,” Shua adds. “I haven’t seen a single organization these days able to deploy endpoint security with sufficient coverage. You can’t cover all your endpoints because of organizational friction. There are so many people involved in deploying agents and maintaining them so there are always areas that are missed.” Continuous monitoring for cloud vulnerabilitiesOrca claims the new CDR capabilities allow its platform to continuously monitor for cloud vulnerabilities and misconfigurations, as well as malware, identity and access management risks, lateral movement risks, and sensitive data exposure. Shua claims it avoids over-alerting security teams. “The vast number of alerts organizations get are not actionable,” Shua says. “A problem with security tools today is they can be technically right, but they can’t contextualize what they find and deliver what’s important to the business. We can tell you, ‘This is the combination of issues that you should look at because it exposes sensitive data so you need to look at it first.'” New CDR dashboard lets defenders visualize eventsAnother new feature is a CDR dashboard that enables defenders to visualize if an event is an attack and if critical assets are at risk. “The added Cloud Detection and Response dashboard and capabilities strengthen the Orca Cloud Security Platform to continue scaling our cloud security efforts,” Jeremy Turner, deputy CISO and senior cloud security engineer at Paidy, an online payment platform, said in a statement.Cloud attacks can also be remediated through Orca’s automated steps or through its integration with SIEM and SOAR solutions such as Splunk, Sumo Logic, IBM Qradar, Torq, and Brinqa. It also integrates with ticketing solutions, such as Slack, PagerDuty, ServiceNow, and Jira. Related content news analysis Massive security hole in VPNs shows their shortcomings as a defensive measure Researchers found a deep, unpatchable flaw in virtual private networks dubbed Tunnelvision can allow attackers to siphon off data without any indication that they are there. By Evan Schuman May 08, 2024 8 mins Threat and Vulnerability Management Data and Information Security Network Security news DocGo says hackers stole patient data in a recent cyberattack The attack compromised some healthcare data with no material or financial losses, the company said. By Shweta Sharma May 08, 2024 3 mins Data Breach Hacking news Google, Meta, Spotify accused of flouting Apple’s device fingerprinting rules Security researchers allege that several apps are collecting data from iOS devices, violating Apple’s policy on device fingerprinting. By Gyana Swain May 08, 2024 7 mins Mobile Security Application Security news analysis Kinsing crypto mining campaign targets 75 cloud-native applications Five years after being discovered, the Kinsing cryptojacking operation remains very active against organizations, employing daily probes for vulnerable applications using an ever-growing list of exploits. By Lucian Constantin May 08, 2024 6 mins Cryptocurrency Malware Application Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe