Resources Plans
Endpoint on AWS: Part 4

Microsoft Defender for Endpoint on AWS: Part 4 – Final Entry

Jonathan Rau
By: Jonathan Rau
Mar 24, 2022

In the first three entries in this series, we did everything from manual installation of Microsoft Defender for Endpoint (MDE) XDR agents on AWS EC2 instances, using AWS EC2 Image Builder for installing MDE, and using our tool – t...

EKS Creation

Why Create an EKS Creation Tool?

Jonathan Rau
By: Jonathan Rau
Feb 13, 2022

In our latest blog in the Microsoft Defender on AWS Series, we introduced a tool created from the ground up by the Panoptica Office of the CISO, the Amazon Elastic Kubernetes Services (EKS) Creation Engine (ECE). The most obvious ques...

Defender for Endpoint on AWS: Part 3

Microsoft Defender for Endpoint on AWS: Part 3

Jonathan Rau
By: Jonathan Rau
Feb 1, 2022

In our first two entries in this series, we explored installing Microsoft Defender for Endpoint (MDE) XDR agents on AWS EC2 instances, using manual scripts and AWS EC2 Image Builder, respectively. In this penultimate entry in the series, w...

The Log4Shell Vulnerability

CVE-2021-44228: The Log4Shell Vulnerability

becca
By: Becca Gomby
Dec 16, 2021

A critical, zero-day vulnerability known as “Log4Shell” was recently found in Apache Log4j, an open-source logging utility used by an enormous array of enterprise software, applications, and cloud services. It was first discovered in remote-code...

Defender for Endpoint on AWS

Microsoft Defender for Endpoint on AWS: Part 2

Jonathan Rau
By: Jonathan Rau
Dec 7, 2021

In the first entry in this series, we explored what Endpoint Detection and Response (EDR) is, and why the Panoptica Office of the CISO uses it to secure our Amazon EC2 server estate. We previously provided scripts and a basic walkthro...

Microsoft Defender for Endpoint on AWS

Microsoft Defender for Endpoint on AWS: Part 1

Jonathan Rau
By: Jonathan Rau
Nov 3, 2021

Protecting Your AWS Server Estate When it comes to protecting your AWS server estate, or your endpoints and servers in a broader perspective no matter the environment, one security tool solution that comes to mind is Endpoint Detection and Respon...

DevOps

DevOps Cloud Security Challenges for a Modern Environment

Or Azarzar
By: Or Azarzar
Aug 12, 2021

81% of organizations say that cloud security is their top challenge in 2021, more of a problem than they find managing cloud spend, the growing lack of resources or staying on top of compliance or governance. The truth is, man...

Cloud - 2

Killing Cloud Security Misconceptions #4: There is No Private in Your Public Cloud

Or Azarzar
By: Or Azarzar
Aug 2, 2021

Last time in our Killing Cloud Misconceptions regular series, we talked about how the principle of least privilege doesn’t work for cloud environments. This time we’re turning to the idea of keeping your assets secure using private net...

Escalate Privileges in Kubernetes

10 ways to Escalate Privileges in Kubernetes

Or Azarzar
By: Or Azarzar
Jul 27, 2021

There are so many benefits to a Kubernetes environment, which explains why usage has jumped to 83% in production, up from 78% last year. All in all, container usage has risen 300% in the past 5 years! Whether you’re using Kubernetes for its d...

CRN Emerging

Panoptica Named 2021 CRN Emerging Vendor in Security Category

Logo
By: Panoptica Team
Jul 26, 2021

TEL AVIV, Israel, July 26, 2021 – Panoptica, the next-generation cloud security platform, announced today that CRN®, a brand of The Channel Company, has included Panoptica in its 2021 Emerging Vendors List in the Security...