How a Graph-Based Approach Can Elevate Your Cloud Security

By: Roy Maor
Sep 27, 2023

Ever wondered how large organizations map complex cloud architecture, complete with dynamic assets, fast-paced changes, and tightly woven interdependencies? Here’s your introduction to using graph theory for cloud risk management, reducing the cyb...

Weaponizing the Utility of Jenkins Script Consoles 

By: Rami H.
Sep 15, 2023

Jenkins misconfigurations can have far-reaching consequences; Cisco Panoptica’s attack surface scanner can detect such misconfigurations.  Jenkins is a widely used tool for continuous integration and continuous delivery and deployment (CI/...

What Is An Attack Path & How Does It Help Identify Risks? 

By: Becca Gomby
Aug 22, 2023

In this post, we discuss what an attack path is, how mapping an attack path works, and how it can help you get improved visibility into your cloud environments to better identify potential critical risks and vulnerabilities.  What Is an Atta...