Resources Plans
Escalate Privileges in Kubernetes

10 ways to Escalate Privileges in Kubernetes

Or Azarzar
By: Or Azarzar
Jul 27, 2021

There are so many benefits to a Kubernetes environment, which explains why usage has jumped to 83% in production, up from 78% last year. All in all, container usage has risen 300% in the past 5 years! Whether you’re using Kubernetes for its d...

CRN Emerging

Panoptica Named 2021 CRN Emerging Vendor in Security Category

Logo
By: Panoptica Team
Jul 26, 2021

TEL AVIV, Israel, July 26, 2021 – Panoptica, the next-generation cloud security platform, announced today that CRN®, a brand of The Channel Company, has included Panoptica in its 2021 Emerging Vendors List in the Security...

Multi-cloud Security

Multi-cloud Security Done Right – Relationships between Environments is Key

Hanan Bercu
By: Hanan Bercu
Jun 20, 2021

92% of today’s enterprises have a multi-cloud strategy in place, with an average of 2.6 public and 2.7 private clouds in use across their network. The facts are in – and security that isn’t multi-cloud just isn’t comprehensive enough fo...

10 Terms for Cloud Security

Top 10 Terms for Cloud Security

Logo
By: Panoptica Team
May 31, 2021

Cloud security is the hottest topic in the security world right now, as an increasing number of organizations make a shift to go cloud-native or see the benefits of a hybrid environment. If you ever find yourself confused about the meanings of ...

AWS terms

Top AWS Terminology to Understand AWS Security Concepts

Logo
By: Panoptica Team
May 24, 2021

Ever feel lost in a sea of AWS terminology, acronyms and AWS cloud security concepts on Amazon web services? You’re not alone! Let’s take a look at some of the most common AWS terminology that you’ll hear when you’re learning about Amazon We...

Amazon SageMaker

Protect Your Environment When Working with Amazon SageMaker

Or Azarzar
By: Or Azarzar
May 20, 2021

Panoptica’s Research and Discoveries for Securing AWS SageMaker, a Popular Data Science Tool Disclaimer: This post includes findings from December 2020. Some of them are already fixed in production and cannot be reproduced. Amazon SageM...

Least Privilege

Killing Cloud Security Misconceptions Part 3: Least Privilege

Or Azarzar
By: Or Azarzar
May 5, 2021

Ready to have some knowledge dropped about the principle of least privilege? Here at Panoptica, we love knocking those cloud security misconceptions out of the park! In our previous editions of this series, we spoke about how relying on CV...

Securing Your Cloud

Why Securing Your Cloud Is Completely Different From Securing Your On-prem Environment

Vladi Sandler
By: Vladi Sandler
Apr 29, 2021

There’s a new generation of attackers among us, that can’t be denied. Offensive methodologies are constantly changing, and as organizations aggressively move to the cloud, these need to be understood before they can be protected against. One ...

Kubernetes and Container Security

Kubernetes and Container Security Tools You Must be Aware Of

Logo
By: Panoptica Team
Apr 19, 2021

Threat detection, container lifecycle management, container registries, and access control tools. Whether paid or free, the web is full of container security tools allowing developers and organizations to maintain a secure environment.&nbs...

AWS Authorization Misuse

Presenting the Risk in IAM Policy Evaluation: Do You Know About this AWS Authorization Misuse?

Or Azarzar
By: Or Azarzar
Mar 22, 2021

Executive Summary Our researchers discovered that AWS IAM policy evaluation logic does not work the same way as security engineers may be used with other authorization mechanisms. We outline many risky and confusing examples when using AWS groups...