Academy

Introducing the Panoptica Cloud Security Academy

Rami
By: Rami H.
Oct 19, 2023

Learn cloud security fundamentals and test and improve your skills. Today we are proud to launch the Panoptica Cloud Security Academy with several free interactive models available for all. What is the Cloud Security Academy? The Cloud Securit...

IBM-report-2023

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

author_profile
By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...

OpenSSL_3.0_Critical_Vulnerabilities

OpenSSL 3.0 Critical Vulnerabilities: Should You be Spooked?

Sarabjeet Chugh
By: Sarabjeet Chugh
Nov 1, 2022

Don’t be. Act now—use Panoptica to scan for OpenSSL vulnerabilities for free. On November 1, the OpenSSL Project team released a critical patch for OpenSSL 3.0. The patch—OpenSSL 3.0.7—will fix this vulnerability in the library affecting ...

Speed Versus Security

Speed Versus Security: Tackling the “Developer’s Dilemma”

Rami
By: Rami H.
Sep 19, 2022

Today’s developer just can’t win. It’s a continuous tug of war between business objectives—the boss who wants releases “faster, faster, faster!” and the security team, who keeps halting releases because of insecure code—with the develo...

Panoptica_Securing _Serverless Applications Against the Most Critical Risks

Securing Serverless Applications Against the Most Critical Risks

Sarabjeet Chugh
By: Sarabjeet Chugh
Sep 19, 2022

If you’re a developer working in a cloud environment, there’s a good chance that you’ve either started thinking about serverless computing or have already started to deploy it. And why not? Unlike VMs or container clusters, serverless function...

Secures GitOps to Protect CI/CD Pipeline Tools

How Panoptica Secures GitOps to Protect CI/CD Pipeline Tools

Tomer
By: Tomer Dvir
Jun 8, 2022

If you work in software development or IT, you’ve likely heard about – and perhaps are even practicing – GitOps, the latest, greatest way to accelerate software delivery. GitOps uses Git, the version control system, to centralize and stan...

Panoptica_Seeing the Unseen: Gaining Visibility into API Payload Encryption

Seeing the Unseen: Gaining Visibility into API Payload Encryption

aduminuc
By: Alessandro Duminuco
Jun 7, 2022

When it comes to API security, end-to-end encryption presents something of a paradox. On one hand, encryption secures the data that is exchanged during transactions. This is, of course, a good thing. But there’s a drawback: When you use end-...

Cisco_Secure_Application

Introducing Panoptica, The Cisco Secure Application Cloud

rich
By: Rich Gold
May 19, 2022

Enabling DevSecops for cloud native applications through security automation “From the acquisition of Portshift, the Cisco Emerging Technology and Incubation team has been on a mission to enable secure software development for cl...

Cisco et&i-thumbnail

Cisco ET&I & Cloud Native Security – Pushing boundaries & making bold bets

Ran
By: Ran Ilany
Feb 7, 2022

Successful enterprises are good at what they do – so good, in fact, that it can become difficult for them to embrace new ideas. Instead, many choose to rest on the laurels of their existing products and services – Usually their successful produc...

NSA’s Kubernetes Security

Everything DevOps need to know about the NSA’s Kubernetes Security Guidance

alex
By: Alexei Kravtsov
Nov 30, 2021

Kubernetes security is a complex topic. So complex that the National Security Agency recently issued a 59-page guidance document on Kubernetes security hardening. Yet, when you boil this advice down, you’ll find that most sources of c...