Cloud Native Security Fortified: Panoptica at AWS re:Invent 2023  

By: Shweta Khare
Nov 21, 2023

AWS Re:Invent in Las Vegas is just around the corner, Nov. 27th – Dec. 1st, 2023. Stop by to meet us at booth 1276 (Outshift by Cisco)!  For over a decade, the worldwide cloud community has gathered at re:Invent, fostering connections,...


Secure incoming Amazon API Gateway traffic with Panoptica 

By: Meenakshi Kaushik
Nov 21, 2023

Overview  Panoptica Cisco’s Cloud Application Security platform provides end-to-end lifecycle protection for cloud native application environments. It empowers organizations to safeguard their APIs, serverless functions, containers, and Ku...

Cloud Security Posture Management (CSPM)

Weaponizing the Utility of Jenkins Script Consoles 

By: Rami H.
Sep 15, 2023

Jenkins misconfigurations can have far-reaching consequences; Cisco Panoptica’s attack surface scanner can detect such misconfigurations.  Jenkins is a widely used tool for continuous integration and continuous delivery and deployment (CI/...

Laptop with shield, header image

Getting Started with Panoptica on AWS using Kubernetes Goat

By: Jan Schulte
Sep 1, 2023

In this blog you will learn how to easily secure your microservices apps running on Amazon EKS cluster using Panoptica, Cisco's cloud native application security SaaS service. We use an open source Kubernetes Goat application to see common misconfig...


Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...


Webinar | Securing Application Workloads, APIs, and Serverless Functions with Panoptica

By: Shweta Khare
Aug 25, 2023

Application architectures have been transformed in recent years. Modern application systems have become more complex with monolithic applications being replaced by more complicated applications based on multiple microservices and stored on cloud pla...


What Is An Attack Path & How Does It Help Identify Risks? 

By: Becca Gomby
Aug 22, 2023

In this post, we discuss what an attack path is, how mapping an attack path works, and how it can help you get improved visibility into your cloud environments to better identify potential critical risks and vulnerabilities.  What Is an Atta...


Staying Ahead of the Threat Landscape: The Importance of Application Security Modernization 

By: Shweta Khare
Aug 7, 2023

In today's world, when we talk about software, we're usually talking about the applications that make our digital lives work. Software applications have become the digital tools that empower us to navigate our complex world, streamline our workf...


Cloud Security Fortified: The Future of CNAPP and CSPM Solutions

By: Becca Gomby
Aug 1, 2023

Cloud security risks are shifting, and organizations require more than just baseline security procedures in place to ensure they are staying ahead of opportunistic hackers. Cloud security posture management (CSPM) tools are table stakes for all busi...

Panoptica-BlackHat 2023

Meet Panoptica at Black Hat USA 2023: Control Your Multicloud Security Chaos! 

By: Shweta Khare
Jul 25, 2023

The Many Reasons for Multicloud Security Chaos Multicloud environments and cloud native applications have become popular because they offer great advantages like flexibility, scalability, and backup redundancy. But, keeping these setups secure ca...