How to Protect Your Business from Data Leaks

How to Protect Your Business from Data Leaks

Tim Szigeti
By: Tim Szigeti
Jul 19, 2024

figure.wp-block-image { text-align: center; } .blog_detail_content .content_detail_page h2 { font-size: 32px; } In this blog, we're going to discuss how you can protect your business from data leaks that can result from insecure...

Protect Your Business from Being Cryptojacked!

Protect Your Business from Being Cryptojacked!

Tim Szigeti
By: Tim Szigeti
Jul 12, 2024

figure { text-align: center; } .blog_detail_content .content_detail_page h2 { font-size: 32px; } Overview Cryptojacking is rapidly emerging as the most popular type of attack on cloud native applications and infrastructure. C...

Smart Cloud Detection and Response: Detecting attacks in real-time with Panoptica

Smart Cloud Detection and Response: Detecting attacks in real-time with Panoptica

Shibu George
By: Shibu George
May 6, 2024

.show-mobile { display: block; } .show-desktop { display: none; } figure.wp-block-image img { display: block; margin: 0 auto; } @media screen and (min-width: 768px) { .show-mobile { display: none; } .show-deskt...

Cloud Detection and Response Has Evolving, Cloud-Scale Challenges

Cloud Detection and Response Has Evolving, Cloud-Scale Challenges

Tim
By: Tim Miller
Apr 26, 2024

h3.solution { background-color: #D0E2F3; border: 1px solid #073763; padding: 0.5em; } In our previous post, we explored the essentials of cloud detection and response (CDR), highlighting how the cloud's scale and complexity have...

The What and Why of Cloud Detection and Response

Cloud-scale Threats Need Cloud Detection and Response

Tim
By: Tim Miller
Apr 25, 2024

A recent survey from Gartner forecasts that worldwide end-user spending on public cloud services will total $679 billion in 2024, and that number is expected to jump to $1 trillion in 2027. Businesses left and right are moving to the cloud. But as t...

AWS_REINVENT-Panoptica

Cloud Native Security Fortified: Panoptica at AWS re:Invent 2023  

author_profile
By: Shweta Khare
Nov 21, 2023

AWS Re:Invent in Las Vegas is just around the corner, Nov. 27th – Dec. 1st, 2023. Stop by to meet us at booth 1276 (Outshift by Cisco)!  For over a decade, the worldwide cloud community has gathered at re:Invent, fostering connections,...

AmazonAPI_Panoptica-Image

Secure incoming Amazon API Gateway traffic with Panoptica 

meenakshi
By: Meenakshi Kaushik
Nov 21, 2023

Overview  Panoptica Cisco’s Cloud Application Security platform provides end-to-end lifecycle protection for cloud native application environments. It empowers organizations to safeguard their APIs, serverless functions, containers, and Ku...

Cloud Security Posture Management (CSPM)

Weaponizing the Utility of Jenkins Script Consoles 

Rami
By: Rami H.
Sep 15, 2023

Jenkins misconfigurations can have far-reaching consequences; Cisco Panoptica’s attack surface scanner can detect such misconfigurations.  Jenkins is a widely used tool for continuous integration and continuous delivery and deployment (CI/...

Laptop with shield, header image

Getting Started with Panoptica on AWS using Kubernetes Goat

jan
By: Jan Schulte
Sep 1, 2023

In this blog you will learn how to easily secure your microservices apps running on Amazon EKS cluster using Panoptica, Cisco's cloud native application security SaaS service. We use an open source Kubernetes Goat application to see common misconfig...

IBM-report-2023

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

author_profile
By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...