Tools Resources
Policy Enforcement Redefined: Panoptica Integrates with Multi-Cloud Defense making it the first CNAPP solution to expand into Network Security

Policy Enforcement Redefined: Panoptica Integrates with Multi-Cloud Defense making it the first CNAPP solution to expand into Network Security

becca
By: Becca Gomby
Jun 5, 2024

Introduction In the dynamic landscape of cybersecurity, the integration of cutting-edge technologies is paramount to stay ahead of evolving threats. In this pursuit, the fusion of Panoptica’s robust capabilities with Multi-Cloud Defense emerges...

Outshift Cisco Live US 2024 - Las Vegas - June 2-6, 2024

Unlocking Deeper Cloud Security: Panoptica Unveils Additional Capabilities at CLUS

becca
By: Becca Gomby
Jun 5, 2024

In today' s dynamic cloud landscape, the demand for a sophisticated, all-in-one security platform is paramount. Panoptica meets the challenge head-on, empowering security teams with actionable insights that enhance their security posture. Panop...

Elevate, Automate, Anticipate: Panoptica's Cutting-Edge Security Solutions Unveiled at RSAC

Elevate, Automate, Anticipate: Panoptica’s Cutting-Edge Security Solutions Unveiled at RSAC

becca
By: Becca Gomby
May 6, 2024

The RSA Conference 2024 was a landmark event for Panoptica as we unveiled three transformative solutions: Smart CDR, GenAI Dynamic Remediation, and Security Graph Query. These tools work together seamlessly to strengthen your security architecture a...

Discover your exposure to the XZ Utilities backdoor in 10 seconds or less

Discover your exposure to the XZ Utilities backdoor in 10 seconds or less

Tim
By: Tim Miller
May 6, 2024

.indented { margin-left: 2em; } An example query for specific versions of the XZ software package. When high profile security events happen, it is essential for you and your team to have the information you require right at your fing...

Shift left: How securing from code to cloud can improve your time to market

Shift left: How securing from code to cloud can improve your time to market

becca
By: Becca Gomby
May 6, 2024

figure.wp-block-image > img { display: block; margin: 0 auto; } Embracing a shift-left security approach in software development will not only enhance your application security but will also accelerate your software product's time t...

AWS_REINVENT-Panoptica

Cloud Native Security Fortified: Panoptica at AWS re:Invent 2023  

author_profile
By: Shweta Khare
Nov 21, 2023

AWS Re:Invent in Las Vegas is just around the corner, Nov. 27th – Dec. 1st, 2023. Stop by to meet us at booth 1276 (Outshift by Cisco)!  For over a decade, the worldwide cloud community has gathered at re:Invent, fostering connections,...

AmazonAPI_Panoptica-Image

Secure incoming Amazon API Gateway traffic with Panoptica 

meenakshi
By: Meenakshi Kaushik
Nov 21, 2023

Overview  Panoptica Cisco’s Cloud Application Security platform provides end-to-end lifecycle protection for cloud native application environments. It empowers organizations to safeguard their APIs, serverless functions, containers, and Ku...

Person in hoodie sitting in front of a laptop with external monitor, looking at code

Thought your Node.js latest Docker image was safe?

jan
By: Jan Schulte
Oct 12, 2023

For all developers who run containerized JavaScript workloads in production: Is relying on node:latest as your base image a safe choice? It's effective from a developer productivity standpoint as you're up and running quickly. Have you ever wond...

Cloud Security Posture Management (CSPM)

Weaponizing the Utility of Jenkins Script Consoles 

Rami
By: Rami H.
Sep 15, 2023

Jenkins misconfigurations can have far-reaching consequences; Cisco Panoptica’s attack surface scanner can detect such misconfigurations.  Jenkins is a widely used tool for continuous integration and continuous delivery and deployment (CI/...

IBM-report-2023

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

author_profile
By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...