Panoptica_Event_DevOps

Stronger Together with Panoptica: Join us at RSA Conference 2023 to Learn How DevOps and SecOps can Collaborate for Success

author_profile
By: Shweta Khare
Mar 28, 2023

Collaboration between developers and SecOps is essential when it comes to securing cloud computing environments. As more organizations adopt cloud computing, it's become increasingly important for teams to work together to ensure the security of the...

Panoptica_CloudNativeSecurityCon

CloudNativeSecurityCon Brought Focus and Learning to Security Issues in Cloud Native Environments

Kim
By: Kim McMahon
Feb 8, 2023

The inaugural CloudNativeSecurityCon (CNSC), hosted by the Cloud Native Computing Foundation (CNCF), in Seattle, WA on February 1st and 2nd this year brought a growing realization among attendees that security in the cloud-native ecosystem is deeply...

api_security

Emerging Technologies at the Inaugural CloudNativeSecurityCon Feb 1-2 

Kim
By: Kim McMahon
Jan 31, 2023

The inaugural CloudNativeSecurityCon (CNSC), hosted by Cloud Native Computing Foundation (CNCF), is happening February 1st and 2nd in Seattle, Washington and our team is excited to participate and support this event.  As more organizations s...

fig2-attack-paths-Panoptica

Technical Deep Dive of Cloud Environment Graphs and Attack Paths 

Roy Maor
By: Roy Maor
Jan 9, 2023

In this article, we will break down the complex orchestration required to form a cloud environment graph and utilize it for detection and prioritization of attack paths. One of the most valuable security outputs that cloud owners can unlock through ...

The move to cloud native

Protect Your Cloud-Native Apps from Common Security Failures

tricia
By: Tricia Nagar
Dec 6, 2022

The shift to cloud-native app development on Kubernetes is in full force. Today, cloud-native has become the strategy of choice in the software industry. There are plenty of reasons the industry is preferring cloud-native software development over l...

Map-5

Understanding Attack Paths and Attack Path Analysis in a Stateful Cloud Environment Graph 

Roy Maor
By: Roy Maor
Jun 30, 2021

Attack path analysis can be a complex beast. We’ve spoken in the past about how a graph-based approach to security risk analysis can elevate your cloud security posture overall. Check out this previous article to learn about the building blocks of...

Panoptica August - Attack Path Summary

How a Graph-Based Approach Can Elevate Your Cloud Security

Roy Maor
By: Roy Maor
Mar 11, 2021

Ever wondered how large organizations map complex cloud architecture, complete with dynamic assets, fast-paced changes, and tightly woven interdependencies? Here’s your introduction to using graph theory for cloud risk management, reducing the cyb...