Tools Resources
Recon.Cloud

What is your public cloud exposure? See what an attacker sees with Recon.Cloud from Panoptica

logo
By: Panoptica Security Research Team
Apr 5, 2022

"What is my public exposure?” This is a question we have heard time and time again from our customers. The Panoptica platform provides a variety of views of customers’ cloud environment – from surfacing the most critical attack paths, ...

Endpoint on AWS: Part 4

Microsoft Defender for Endpoint on AWS: Part 4 – Final Entry

Jonathan Rau
By: Jonathan Rau
Mar 24, 2022

In the first three entries in this series, we did everything from manual installation of Microsoft Defender for Endpoint (MDE) XDR agents on AWS EC2 instances, using AWS EC2 Image Builder for installing MDE, and using our tool – t...

CircleCI Pipelines

Scan Your IaC Templates in CircleCI Pipelines Using Panoptica

Shay
By: Shay Ulmer
Mar 7, 2022

When working with your Infrastructure as Code (IaC) files (whether those are Terraform files, Kubernetes manifests, Helm charts, or others), it is important to be able to scan them for possible security threats. Whether you are implementing a sophis...

EKS Creation

Why Create an EKS Creation Tool?

Jonathan Rau
By: Jonathan Rau
Feb 13, 2022

In our latest blog in the Microsoft Defender on AWS Series, we introduced a tool created from the ground up by the Panoptica Office of the CISO, the Amazon Elastic Kubernetes Services (EKS) Creation Engine (ECE). The most obvious ques...

Defender for Endpoint on AWS: Part 3

Microsoft Defender for Endpoint on AWS: Part 3

Jonathan Rau
By: Jonathan Rau
Feb 1, 2022

In our first two entries in this series, we explored installing Microsoft Defender for Endpoint (MDE) XDR agents on AWS EC2 instances, using manual scripts and AWS EC2 Image Builder, respectively. In this penultimate entry in the series, w...

The Log4Shell Vulnerability

CVE-2021-44228: The Log4Shell Vulnerability

becca
By: Becca Gomby
Dec 16, 2021

A critical, zero-day vulnerability known as “Log4Shell” was recently found in Apache Log4j, an open-source logging utility used by an enormous array of enterprise software, applications, and cloud services. It was first discovered in remote-code...

Defender for Endpoint on AWS

Microsoft Defender for Endpoint on AWS: Part 2

Jonathan Rau
By: Jonathan Rau
Dec 7, 2021

In the first entry in this series, we explored what Endpoint Detection and Response (EDR) is, and why the Panoptica Office of the CISO uses it to secure our Amazon EC2 server estate. We previously provided scripts and a basic walkthro...

Microsoft Defender for Endpoint on AWS

Microsoft Defender for Endpoint on AWS: Part 1

Jonathan Rau
By: Jonathan Rau
Nov 3, 2021

Protecting Your AWS Server Estate When it comes to protecting your AWS server estate, or your endpoints and servers in a broader perspective no matter the environment, one security tool solution that comes to mind is Endpoint Detection and Respon...

azure

Top 10 Terms for Azure Cloud Security

Logo
By: Panoptica Team
Aug 24, 2021

Understanding the cloud starts with understanding the lingo! Here’s our deep-dive into the most important cloud terms to understand for Azure cloud security, including exactly what they mean for your unique cloud environment. Table of Contents:...

DevOps

DevOps Cloud Security Challenges for a Modern Environment

Or Azarzar
By: Or Azarzar
Aug 12, 2021

81% of organizations say that cloud security is their top challenge in 2021, more of a problem than they find managing cloud spend, the growing lack of resources or staying on top of compliance or governance. The truth is, man...