Vulnerabilities in the Cloud

Why You Can’t Afford to Ignore Prioritizing Vulnerabilities in the Cloud

By: Becca Gomby
Mar 2, 2023

In cloud environments, assets, resources, and permissions are constantly changing and being updated. As such, risks in cloud environments are dynamic and new security findings and alerts are identified and sent to cloud security teams via their vari...

Asset Management

The Importance of 100% Visibility in Cloud Asset Management

By: Becca Gomby
Feb 15, 2023

Cloud asset management is a fundamental component to any cloud security tool. It helps organizations to identify, track, and protect their assets in the cloud. Cloud security engineers need 100% visibility across their cloud environments to enhance ...


Why a CNAPP Solution is the Next Step in Cloud Security Evolution

By: Becca Gomby
Jan 24, 2023

Cloud security risks are shifting, and organizations require more than just baseline security procedures in place to ensure they are staying ahead of opportunistic hackers. Cloud security posture management (CSPM) tools are table stakes for all busi...

Cloud Security Researcher at Panoptica

A Day in the Life of a Cloud Security Researcher at Panoptica

By: Becca Gomby
Jan 18, 2023

Efficiently protecting the cloud at scale You probably know our amazing research team from the cloud vulnerabilities they’ve discovered such as the AWS RDS Vulnerability, the AWS ECR Public Vulnerability, or the Azure Cloud Shell Command Inj...


The Most Efficient Way to Secure Your Cloud Environment and Reduce MTTR: The Benefit of Black Box Attack Path Analysis And Thinking Like an Attacker

By: Luke Tucker
Jan 11, 2023

Digesting vast amounts of data stored on modern data platforms such as a graph database is a primary benefit of true cloud attack path analysis. This is called contextual cloud security at scale. And it’s the key to noise reduction, improvement in...

Cloud-Native Application Protection Platform

What Is a Cloud-Native Application Protection Platform (CNAPP)? Four Must-Have Features

By: Panoptica Team
Dec 20, 2022

Cloud security is a giant field for good reason: 77% of CIOs say their IT environment changes once every minute or less. As you can imagine, the dynamic nature of cloud computing makes preventing, detecting and fixing vulnerabilities ...

SBOM -Software Bill of Materials

What is an SBOM (Software Bill of Materials)?

By: Panoptica Team
Dec 5, 2022

Understand why SBOMS are vital as part of covering your cloud estate and better securing your environments. What is an SBOM? SBOM or the Software Bill of Materials is the inventory package that comprises the different software components ...

SOC2 Compliance

What is SOC2 Compliance?

By: Panoptica Team
Sep 13, 2022

Intro  Cloud security is an ongoing requirement for all organizations born and built in the cloud. As organizations build and develop new features and expand their presence in the cloud, they must not only contend with the ability to continu...


What Is DevSecOps? How Does It Work & What Are the Benefits?

By: Panoptica Team
Sep 8, 2022

We explain what DevSecOps is, how it works, and how integrating security throughout the development process helps create more secure systems.  What is DevSecOps? DevSecOps stands for development, security, and operations. It’s an approa...

Guide to AWS KMS

The Complete Guide to AWS KMS

By: Noga Yam Amitai
Sep 8, 2022

AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the cryptographic keys used to protect your data. This service easily integrates with other AWS services, such a...