Tools Resources
AWS Authorization Misuse

Presenting the Risk in IAM Policy Evaluation: Do You Know About this AWS Authorization Misuse?

Or Azarzar
By: Or Azarzar
Mar 22, 2021

Executive Summary Our researchers discovered that AWS IAM policy evaluation logic does not work the same way as security engineers may be used with other authorization mechanisms. We outline many risky and confusing examples when using AWS groups...

Contextual Cloud Security Integrates

Our New Enhanced Contextual Cloud Security Integrates with the DevOps Lifecycle!

Hanan Bercu
By: Hanan Bercu
Mar 11, 2021

If you work in a fast-paced cloud environment, you know that DevOps lives often aren’t easy. Developers have an increasing number of tasks to complete just to keep up with their existing workload and not fall behind. This can often lead to a head-...

Mergers and Acquisitions

Mergers and Acquisitions — The High Price of Cloud Security Blindspots

Vladi Sandler
By: Vladi Sandler
Mar 3, 2021

How much would you pay for a Lexus GS? MSRP is $52,090 in 2021. Throw in All Wheel Drive and the Cold Weather Package and the price climbs to $55,090.  But what if it was missing the pre-collision safety system or the airbags were faulty? Wh...

pipelines-header

Over-permissive CI/CD Pipelines are an Unnecessary Evil. Here’s Why.

Or Azarzar
By: Or Azarzar
Mar 1, 2021

Many of our customers have been struggling with a similar problem lately, the access permissions that are linked to their CI/CD servers. Development teams want a frictionless path to deploy new code, but giving all CI/CD workstations admin permissio...

Cloud Security Posture Management

What is Cloud Security Posture Management?

Or Azarzar
By: Or Azarzar
Feb 23, 2021

As organizations aggressively move to the cloud, Cloud Security Posture Management (CSPM) is the name of a group of cloud security tools and technologies that aim to reduce the added associated risks. Here’s everything you need to know. ...

Cloud Security Misconceptions

Killing Cloud Security Misconceptions Part 2: Cloud Workload Protection

Or Azarzar
By: Or Azarzar
Feb 23, 2021

As organizations accelerate their move to the cloud, it’s no surprise that many CISOs want to stick with what they know when it comes to security. On-premises, traditional best practices dictate that every endpoint or server needs to have its own ...

cloud-security

What is Cloud Security?

Or Azarzar
By: Or Azarzar
Feb 23, 2021

Cloud security refers to the procedures and the technology that an organization implements to protect its cloud workloads, govern how data is stored and management, and ensure all infrastructure is kept safe from cybersecurity threats. Som...

Panoptica-cloud-security-header

DevOps-As-A-Service: The Downside You Need to Consider for Cloud DevOps Security

Vladi Sandler
By: Vladi Sandler
Feb 23, 2021

DevOps. In just a few short years, DevOps services have gone from an obscure mashup of the words Development and Operations to being one of the most commonly adopted software development methodologies in use.  Today, many organizations ha...

cloud-misconfiguration-header

What is Cloud Misconfiguration, and How Can You Avoid it?

Vladi Sandler
By: Vladi Sandler
Dec 15, 2020

Cloud misconfiguration can be defined as any errors, glitches or gaps in your cloud environment that can leave you exposed to risk. This cloud security risk could come in the form of data breaches, cloud breaches, insider th...

cloud-compliance-header

Compliance in the Cloud is Important: But it isn’t a Cloud Security Strategy

Vladi Sandler
By: Vladi Sandler
Dec 8, 2020

Did you know that 60% of organizations believe that their cloud-initiatives are accelerating faster than the ability to secure them? One of the top considerations for fast-moving companies is their ability to remain compliant with relevant regulatio...