How a Graph-Based Approach Can Elevate Your Cloud Security

By: Roy Maor
Sep 27, 2023

Ever wondered how large organizations map complex cloud architecture, complete with dynamic assets, fast-paced changes, and tightly woven interdependencies? Here’s your introduction to using graph theory for cloud risk management, reducing the cyb...

What Is An Attack Path & How Does It Help Identify Risks? 

By: Becca Gomby
Aug 22, 2023

In this post, we discuss what an attack path is, how mapping an attack path works, and how it can help you get improved visibility into your cloud environments to better identify potential critical risks and vulnerabilities.  What Is an Atta...

Cloud Security Fortified: The Future of CNAPP and CSPM Solutions

By: Becca Gomby
Aug 1, 2023

Cloud security risks are shifting, and organizations require more than just baseline security procedures in place to ensure they are staying ahead of opportunistic hackers. Cloud security posture management (CSPM) tools are table stakes for all busi...

Enhancing Cloud Visibility: The Importance of CSPM in Cloud Security

By: Becca Gomby
Jul 5, 2023

Curious about CSPM? We explain what cloud security posture management is, why it is needed, and how it works.  What is CSPM? Cloud security posture management (CSPM) is a set of automated procedures designed to identify and remediate misc...

Panoptica: A Holistic Cloud Native Application Security Solution for Enterprises

By: Idan Kober
Jun 6, 2023

Outshift by Cisco is paving the way with “DevOps-friendly” cloud native security solutions that fundamentally simplify conventional offerings. Today we are excited to announce the launch of Panoptica, our cloud native application security so...