Tools Resources
Academy

Introducing the Panoptica Cloud Security Academy

Rami
By: Rami H.
Oct 19, 2023

Learn cloud security fundamentals and test and improve your skills. Today we are proud to launch the Panoptica Cloud Security Academy with several free interactive models available for all. What is the Cloud Security Academy? The Cloud Securit...

Graphic depicting API security

An Open-Source Antidote for a Growing Problem: API Security

author_profile
By: Brianna Blacet
Nov 29, 2022

In an effort to support continuous development and release of new features at the lightning speed of today’s market, forward-looking organizations have been moving to cloud-native architectures in droves. The reasons are obvious: these decentraliz...

OpenSSL_3.0_Critical_Vulnerabilities

OpenSSL 3.0 Critical Vulnerabilities: Should You be Spooked?

Sarabjeet Chugh
By: Sarabjeet Chugh
Nov 1, 2022

Don’t be. Act now—use Panoptica to scan for OpenSSL vulnerabilities for free. On November 1, the OpenSSL Project team released a critical patch for OpenSSL 3.0. The patch—OpenSSL 3.0.7—will fix this vulnerability in the library affecting ...

Secures GitOps to Protect CI/CD Pipeline Tools

How Panoptica Secures GitOps to Protect CI/CD Pipeline Tools

Tomer
By: Tomer Dvir
Jun 8, 2022

If you work in software development or IT, you’ve likely heard about – and perhaps are even practicing – GitOps, the latest, greatest way to accelerate software delivery. GitOps uses Git, the version control system, to centralize and stan...

Panoptica_Seeing the Unseen: Gaining Visibility into API Payload Encryption

Seeing the Unseen: Gaining Visibility into API Payload Encryption

aduminuc
By: Alessandro Duminuco
Jun 7, 2022

When it comes to API security, end-to-end encryption presents something of a paradox. On one hand, encryption secures the data that is exchanged during transactions. This is, of course, a good thing. But there’s a drawback: When you use end-...

Cisco_Secure_Application

Introducing Panoptica, The Cisco Secure Application Cloud

rich
By: Rich Gold
May 19, 2022

Enabling DevSecops for cloud native applications through security automation “From the acquisition of Portshift, the Cisco Emerging Technology and Incubation team has been on a mission to enable secure software development for cl...

Embrace CNAPP

Why Now Is the Time for CISOs to Embrace CNAPP for Cloud Native Security

Ran
By: Ran Ilany
Apr 20, 2022

“Breaking down silos” is a common phrase in the world of DevOps and DevSecOps. Ironically, though, if you look at how many DevOps and DevSecOps cloud native security tools actually work, you realize that the tools used are very siloed. In...

5 API Security

5 Real-World API Security Breaches from 2021

Ran
By: Ran Ilany
Apr 14, 2022

It’s no exaggeration to say that, when it comes to API security, there are a lot of challenges. Not only are attacks that exploit vulnerabilities in APIs on the rise, but there is good reason to believe that API vulnerabilities will be am...

Securing API Calls

Securing API Calls in Kubernetes, a Simple and Effective Approach

aduminuc
By: Alessandro Duminuco
Apr 13, 2022

Historically, API authentication methods have involved a tradeoff between security and convenience. Today, with cloud native applications and Kubernetes, there are several options, but security tradeoffs remain: You could hardcode credentials, w...

The 3 Pillars of API Security

The 3 Pillars of API Security: Visibility, Risk Scoring & Enforcement

aduminuc
By: Alessandro Duminuco
Oct 20, 2021

You can’t secure what you can’t see. APIs are no exception. Whether your application uses internal APIs to manage interactions between microservices, external APIs to integrate with third-party services, or both, you need to be able to visual...