Getting Started with Panoptica on AWS using Kubernetes Goat

By: Jan Schulte
Sep 1, 2023

In this blog you will learn how to easily secure your microservices apps running on Amazon EKS cluster using Panoptica, Cisco's cloud native application security SaaS service. We use an open source Kubernetes Goat application to see common misconfig...

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...

Webinar | Securing Application Workloads, APIs, and Serverless Functions with Panoptica

By: Shweta Khare
Aug 25, 2023

Application architectures have been transformed in recent years. Modern application systems have become more complex with monolithic applications being replaced by more complicated applications based on multiple microservices and stored on cloud pla...

Staying Ahead of the Threat Landscape: The Importance of Application Security Modernization 

By: Shweta Khare
Aug 7, 2023

In today's world, when we talk about software, we're usually talking about the applications that make our digital lives work. Software applications have become the digital tools that empower us to navigate our complex world, streamline our workf...

Meet Panoptica at Black Hat USA 2023: Control Your Multicloud Security Chaos! 

By: Shweta Khare
Jul 25, 2023

The Many Reasons for Multicloud Security Chaos Multicloud environments and cloud native applications have become popular because they offer great advantages like flexibility, scalability, and backup redundancy. But, keeping these setups secure ca...

The 5 C’s of Cloud-Native Security: Key Challenges and How to Address Them

By: Shweta Khare
Jul 25, 2023

Cloud-native architecture is a modern approach to building applications that takes advantage of the benefits of cloud computing to create more scalable, resilient, and portable applications. As more organizations adopt cloud computing, and as...

Securing Kubernetes in Production: 5 Best Practices for Securing Your K8s Clusters

By: Tricia Nagar
Jul 11, 2023

While many organizations have successfully adopted containers and the container orchestration framework Kubernetes, it is worth noting that many enterprises feel challenged with running containers in production.Various reasons contribute to the hesi...

Fortifying the Cloud-Native Frontier: Strategies for Application Security

By: Shweta Khare
Jun 29, 2023

The absence of cloud-native application security can have serious consequences for organizations. It exposes applications to higher risks of cyber threats, making them vulnerable to unauthorized access, data breaches, and disruptions. Non-compliance...

Spica Systems Embraces Panoptica to Develop a Highly Secure Private 5G Network Application

By: Tricia Nagar
Jun 15, 2023

At Spica Systems, developing applications that support private 5G network adoption among customers is an obsession. The Spica Systems team is deeply committed to designing SMC (Spica Mobility Core), their private 5G packet core application that help...

Enhance Your Container Security with the MITRE ATT&CK Framework

By: Tricia Nagar
Apr 27, 2023

You are a self-professed cloud-native security warrior. You live to keep your containers and applications safe from the bad guys. Safe from the possibility of a cyberattack. Safe from a security breach. You are constantly evaluating the cloud threat...