Tools Resources
Top 5 Risks of Cloud-Native Environments

Unveiling the Top 5 Risks of Cloud-Native Environments

author_profile
By: Shweta Khare
Jun 21, 2023

As cloud-native applications become the fuel powering business success, protecting the underlying application environment is vital. But that’s a complex and multi-faceted endeavor: Applications need to be protected throughout their lifecycle (from...

Shiny,Pink,Black,And,White,Crossing,Lines,Background,Illustrator

Spica Systems Embraces Panoptica to Develop a Highly Secure Private 5G Network Application

tricia
By: Tricia Nagar
Jun 15, 2023

At Spica Systems, developing applications that support private 5G network adoption among customers is an obsession. The Spica Systems team is deeply committed to designing SMC (Spica Mobility Core), their private 5G packet core application that help...

cloud security evolution

Why a cloud native application security solution is the next step in cloud security evolution

author_profile
By: Shweta Khare
Jun 13, 2023

Cloud computing has transformed the business landscape, offering organizations unmatched flexibility, scalability, and cost-efficiency. However, as cloud adoption continues to rise, ensuring the security of cloud-native applications and infrastructu...

Panoptica_Scanning_for_simpler_cloud-native

Panoptica: A Holistic Cloud Native Application Security Solution for Enterprises

idan
By: Idan Kober
Jun 6, 2023

Outshift by Cisco is paving the way with “DevOps-friendly” cloud native security solutions that fundamentally simplify conventional offerings. Today we are excited to announce the launch of Panoptica, our cloud native application security so...

Panoptica_shutterstock

Enhance Your Container Security with the MITRE ATT&CK Framework

tricia
By: Tricia Nagar
Apr 27, 2023

You are a self-professed cloud-native security warrior. You live to keep your containers and applications safe from the bad guys. Safe from the possibility of a cyberattack. Safe from a security breach. You are constantly evaluating the cloud threat...

Panoptica_Scanning_for_simpler_cloud-native

The Case for Agentless Scanning for Simpler Cloud-Native Security

tricia
By: Tricia Nagar
Mar 30, 2023

As the cloud-native security space continues to evolve and expand, emerging concepts from the domain keep finding their way into mainstream industry vernacular. “Agentless” being one such concept. If you’ve never heard of agentless scanning be...

Panoptica_Event_DevOps

Stronger Together with Panoptica: Join us at RSA Conference 2023 to Learn How DevOps and SecOps can Collaborate for Success

author_profile
By: Shweta Khare
Mar 28, 2023

Collaboration between developers and SecOps is essential when it comes to securing cloud computing environments. As more organizations adopt cloud computing, it's become increasingly important for teams to work together to ensure the security of the...

Panoptica_CloudNativeSecurityCon

CloudNativeSecurityCon Brought Focus and Learning to Security Issues in Cloud Native Environments

Kim
By: Kim McMahon
Feb 8, 2023

The inaugural CloudNativeSecurityCon (CNSC), hosted by the Cloud Native Computing Foundation (CNCF), in Seattle, WA on February 1st and 2nd this year brought a growing realization among attendees that security in the cloud-native ecosystem is deeply...

api_security

Emerging Technologies at the Inaugural CloudNativeSecurityCon Feb 1-2 

Kim
By: Kim McMahon
Jan 31, 2023

The inaugural CloudNativeSecurityCon (CNSC), hosted by Cloud Native Computing Foundation (CNCF), is happening February 1st and 2nd in Seattle, Washington and our team is excited to participate and support this event.  As more organizations s...

fig2-attack-paths-Panoptica

Technical Deep Dive of Cloud Environment Graphs and Attack Paths 

Roy Maor
By: Roy Maor
Jan 9, 2023

In this article, we will break down the complex orchestration required to form a cloud environment graph and utilize it for detection and prioritization of attack paths. One of the most valuable security outputs that cloud owners can unlock through ...