Cloud Security Posture Management (CSPM)

Weaponizing the Utility of Jenkins Script Consoles 

Rami
By: Rami H.
Sep 15, 2023

Jenkins misconfigurations can have far-reaching consequences; Cisco Panoptica’s attack surface scanner can detect such misconfigurations.  Jenkins is a widely used tool for continuous integration and continuous delivery and deployment (CI/...

Panoptica-Attack-Path-Analysis

What Is An Attack Path & How Does It Help Identify Risks? 

becca
By: Becca Gomby
Aug 22, 2023

In this post, we discuss what an attack path is, how mapping an attack path works, and how it can help you get improved visibility into your cloud environments to better identify potential critical risks and vulnerabilities.  What Is an Atta...

fig2-attack-paths-Panoptica

Technical Deep Dive of Cloud Environment Graphs and Attack Paths 

Roy Maor
By: Roy Maor
Jan 9, 2023

In this article, we will break down the complex orchestration required to form a cloud environment graph and utilize it for detection and prioritization of attack paths. One of the most valuable security outputs that cloud owners can unlock through ...

Map-5

Understanding Attack Paths and Attack Path Analysis in a Stateful Cloud Environment Graph 

Roy Maor
By: Roy Maor
Jun 30, 2021

Attack path analysis can be a complex beast. We’ve spoken in the past about how a graph-based approach to security risk analysis can elevate your cloud security posture overall. Check out this previous article to learn about the building blocks of...

Panoptica August - Attack Path Summary

How a Graph-Based Approach Can Elevate Your Cloud Security

Roy Maor
By: Roy Maor
Mar 11, 2021

Ever wondered how large organizations map complex cloud architecture, complete with dynamic assets, fast-paced changes, and tightly woven interdependencies? Here’s your introduction to using graph theory for cloud risk management, reducing the cyb...