Map-5

Understanding Attack Paths and Attack Path Analysis in a Stateful Cloud Environment Graph 

Roy Maor
By: Roy Maor
Jun 30, 2021

Attack path analysis can be a complex beast. We’ve spoken in the past about how a graph-based approach to security risk analysis can elevate your cloud security posture overall. Check out this previous article to learn about the building blocks of...

Multi-cloud Security

Multi-cloud Security Done Right – Relationships between Environments is Key

Hanan Bercu
By: Hanan Bercu
Jun 20, 2021

92% of today’s enterprises have a multi-cloud strategy in place, with an average of 2.6 public and 2.7 private clouds in use across their network. The facts are in – and security that isn’t multi-cloud just isn’t comprehensive enough fo...

10 Terms for Cloud Security

Top 10 Terms for Cloud Security

Logo
By: Panoptica Team
May 31, 2021

Cloud security is the hottest topic in the security world right now, as an increasing number of organizations make a shift to go cloud-native or see the benefits of a hybrid environment. If you ever find yourself confused about the meanings of ...

AWS terms

Top AWS Terminology to Understand AWS Security Concepts

Logo
By: Panoptica Team
May 24, 2021

Ever feel lost in a sea of AWS terminology, acronyms and AWS cloud security concepts on Amazon web services? You’re not alone! Let’s take a look at some of the most common AWS terminology that you’ll hear when you’re learning about Amazon We...

Amazon SageMaker

Protect Your Environment When Working with Amazon SageMaker

Or Azarzar
By: Or Azarzar
May 20, 2021

Panoptica’s Research and Discoveries for Securing AWS SageMaker, a Popular Data Science Tool Disclaimer: This post includes findings from December 2020. Some of them are already fixed in production and cannot be reproduced. Amazon SageM...

Least Privilege

Killing Cloud Security Misconceptions Part 3: Least Privilege

Or Azarzar
By: Or Azarzar
May 5, 2021

Ready to have some knowledge dropped about the principle of least privilege? Here at Panoptica, we love knocking those cloud security misconceptions out of the park! In our previous editions of this series, we spoke about how relying on CV...

Securing Your Cloud

Why Securing Your Cloud Is Completely Different From Securing Your On-prem Environment

Vladi Sandler
By: Vladi Sandler
Apr 29, 2021

There’s a new generation of attackers among us, that can’t be denied. Offensive methodologies are constantly changing, and as organizations aggressively move to the cloud, these need to be understood before they can be protected against. One ...

Kubernetes and Container Security

Kubernetes and Container Security Tools You Must be Aware Of

Logo
By: Panoptica Team
Apr 19, 2021

Threat detection, container lifecycle management, container registries, and access control tools. Whether paid or free, the web is full of container security tools allowing developers and organizations to maintain a secure environment.&nbs...

cloud-visibility-header

Can There Be Too Much Cloud Visibility in a Cloud Environment?

Vladi Sandler
By: Vladi Sandler
Apr 19, 2021

Everywhere you look in cloud security, you’ll see experts waxing lyrical about the importance of visibility. Trust us, we get it! If you can’t get an active and accurate view of everything that’s going on inside your environment, from con...

AWS Authorization Misuse

Presenting the Risk in IAM Policy Evaluation: Do You Know About this AWS Authorization Misuse?

Or Azarzar
By: Or Azarzar
Mar 22, 2021

Executive Summary Our researchers discovered that AWS IAM policy evaluation logic does not work the same way as security engineers may be used with other authorization mechanisms. We outline many risky and confusing examples when using AWS groups...