IBM-report-2023

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

author_profile
By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...

Panoptica-Attack-Path-Analysis

What Is An Attack Path & How Does It Help Identify Risks? 

becca
By: Becca Gomby
Aug 22, 2023

In this post, we discuss what an attack path is, how mapping an attack path works, and how it can help you get improved visibility into your cloud environments to better identify potential critical risks and vulnerabilities.  What Is an Atta...

Fortifying-the-cloud

Cloud Security Fortified: The Future of CNAPP and CSPM Solutions

becca
By: Becca Gomby
Aug 1, 2023

Cloud security risks are shifting, and organizations require more than just baseline security procedures in place to ensure they are staying ahead of opportunistic hackers. Cloud security posture management (CSPM) tools are table stakes for all busi...

CNAPP-CLOUD

The 5 C’s of Cloud-Native Security: Key Challenges and How to Address Them

author_profile
By: Shweta Khare
Jul 25, 2023

Cloud-native architecture is a modern approach to building applications that takes advantage of the benefits of cloud computing to create more scalable, resilient, and portable applications. As more organizations adopt cloud computing, and as...

Top 5 Risks of Cloud-Native Environments

Unveiling the Top 5 Risks of Cloud-Native Environments

author_profile
By: Shweta Khare
Jun 21, 2023

As cloud-native applications become the fuel powering business success, protecting the underlying application environment is vital. But that’s a complex and multi-faceted endeavor: Applications need to be protected throughout their lifecycle (from...

cloud security evolution

Why a cloud native application security solution is the next step in cloud security evolution

author_profile
By: Shweta Khare
Jun 13, 2023

Cloud computing has transformed the business landscape, offering organizations unmatched flexibility, scalability, and cost-efficiency. However, as cloud adoption continues to rise, ensuring the security of cloud-native applications and infrastructu...

api_security

Emerging Technologies at the Inaugural CloudNativeSecurityCon Feb 1-2 

Kim
By: Kim McMahon
Jan 31, 2023

The inaugural CloudNativeSecurityCon (CNSC), hosted by Cloud Native Computing Foundation (CNCF), is happening February 1st and 2nd in Seattle, Washington and our team is excited to participate and support this event.  As more organizations s...

Graphic depicting API security

An Open-Source Antidote for a Growing Problem: API Security

author_profile
By: Brianna Blacet
Nov 29, 2022

In an effort to support continuous development and release of new features at the lightning speed of today’s market, forward-looking organizations have been moving to cloud-native architectures in droves. The reasons are obvious: these decentraliz...

NSA’s Kubernetes Security

Everything DevOps need to know about the NSA’s Kubernetes Security Guidance

alex
By: Alexei Kravtsov
Nov 30, 2021

Kubernetes security is a complex topic. So complex that the National Security Agency recently issued a 59-page guidance document on Kubernetes security hardening. Yet, when you boil this advice down, you’ll find that most sources of c...

The 3 Pillars of API Security

The 3 Pillars of API Security: Visibility, Risk Scoring & Enforcement

aduminuc
By: Alessandro Duminuco
Oct 20, 2021

You can’t secure what you can’t see. APIs are no exception. Whether your application uses internal APIs to manage interactions between microservices, external APIs to integrate with third-party services, or both, you need to be able to visual...