What Is An Attack Path & How Does It Help Identify Risks? 

By: Becca Gomby
Aug 22, 2023

In this post, we discuss what an attack path is, how mapping an attack path works, and how it can help you get improved visibility into your cloud environments to better identify potential critical risks and vulnerabilities.  What Is an Atta...


Cloud Security Fortified: The Future of CNAPP and CSPM Solutions

By: Becca Gomby
Aug 1, 2023

Cloud security risks are shifting, and organizations require more than just baseline security procedures in place to ensure they are staying ahead of opportunistic hackers. Cloud security posture management (CSPM) tools are table stakes for all busi...

Cloud Security

Enhancing Cloud Visibility: The Importance of CSPM in Cloud Security

By: Becca Gomby
Jul 5, 2023

Curious about CSPM? We explain what cloud security posture management is, why it is needed, and how it works.  What is CSPM? Cloud security posture management (CSPM) is a set of automated procedures designed to identify and remediate misc...


Panoptica: A Holistic Cloud Native Application Security Solution for Enterprises

By: Idan Kober
Jun 6, 2023

Outshift by Cisco is paving the way with “DevOps-friendly” cloud native security solutions that fundamentally simplify conventional offerings. Today we are excited to announce the launch of Panoptica, our cloud native application security so...

Cloud Security Researcher at Panoptica

A Day in the Life of a Cloud Security Researcher at Panoptica

By: Becca Gomby
Jan 18, 2023

Efficiently protecting the cloud at scale You probably know our amazing research team from the cloud vulnerabilities they’ve discovered such as the AWS RDS Vulnerability, the AWS ECR Public Vulnerability, or the Azure Cloud Shell Command Inj...


The Most Efficient Way to Secure Your Cloud Environment and Reduce MTTR: The Benefit of Black Box Attack Path Analysis And Thinking Like an Attacker

By: Luke Tucker
Jan 11, 2023

Digesting vast amounts of data stored on modern data platforms such as a graph database is a primary benefit of true cloud attack path analysis. This is called contextual cloud security at scale. And it’s the key to noise reduction, improvement in...

Panoptica August - Attack Path Summary

How a Graph-Based Approach Can Elevate Your Cloud Security

Roy Maor
By: Roy Maor
Mar 11, 2021

Ever wondered how large organizations map complex cloud architecture, complete with dynamic assets, fast-paced changes, and tightly woven interdependencies? Here’s your introduction to using graph theory for cloud risk management, reducing the cyb...