Tools Resources
IBM-report-2023

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023  

author_profile
By: Shweta Khare
Aug 29, 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organ...

cloud security evolution

Why a cloud native application security solution is the next step in cloud security evolution

author_profile
By: Shweta Khare
Jun 13, 2023

Cloud computing has transformed the business landscape, offering organizations unmatched flexibility, scalability, and cost-efficiency. However, as cloud adoption continues to rise, ensuring the security of cloud-native applications and infrastructu...

Panoptica_National Cybersecurity

Biden-Harris National Cybersecurity Strategy: Securing the Nation’s Future with Panoptica

Sarabjeet Chugh
By: Sarabjeet Chugh
Mar 6, 2023

Addressing Biden-Harris Administration's National Cybersecurity Strategy with Panoptica and OpenClarity solutions. On March 2, 2023, the Biden-Harris Administration issued a new National Cybersecurity Strategy, focusing on strengthening and secur...

The move to cloud native

Protect Your Cloud-Native Apps from Common Security Failures

tricia
By: Tricia Nagar
Dec 6, 2022

The shift to cloud-native app development on Kubernetes is in full force. Today, cloud-native has become the strategy of choice in the software industry. There are plenty of reasons the industry is preferring cloud-native software development over l...

Cisco_Secure_Application

Introducing Panoptica, The Cisco Secure Application Cloud

rich
By: Rich Gold
May 19, 2022

Enabling DevSecops for cloud native applications through security automation “From the acquisition of Portshift, the Cisco Emerging Technology and Incubation team has been on a mission to enable secure software development for cl...

Securing API Calls

Securing API Calls in Kubernetes, a Simple and Effective Approach

aduminuc
By: Alessandro Duminuco
Apr 13, 2022

Historically, API authentication methods have involved a tradeoff between security and convenience. Today, with cloud native applications and Kubernetes, there are several options, but security tradeoffs remain: You could hardcode credentials, w...

NSA’s Kubernetes Security

Everything DevOps need to know about the NSA’s Kubernetes Security Guidance

alex
By: Alexei Kravtsov
Nov 30, 2021

Kubernetes security is a complex topic. So complex that the National Security Agency recently issued a 59-page guidance document on Kubernetes security hardening. Yet, when you boil this advice down, you’ll find that most sources of c...

The 3 Pillars of API Security

The 3 Pillars of API Security: Visibility, Risk Scoring & Enforcement

aduminuc
By: Alessandro Duminuco
Oct 20, 2021

You can’t secure what you can’t see. APIs are no exception. Whether your application uses internal APIs to manage interactions between microservices, external APIs to integrate with third-party services, or both, you need to be able to visual...

Panoptica_Internal vs. External API Security

Internal vs. External API Security: What to Know

Peter
By: Peter Bosch
Oct 6, 2021

Every API falls into one of two categories: Internal or external. External APIs are APIs that developers use to integrate their applications with a third-party resource, such as a public cloud service or a SaaS application. This type of API is pr...

Hardening Kubernetes Containers Security with Seccomp

Hardening Kubernetes Containers Security with Seccomp

erez
By: Erez Fishimer
Aug 13, 2021

Seccomps - An often overlooked way to harden Kubernetes containers’ security is by applying seccomp profiles. Customizing seccomp profiles, in effect, provides a deeply embedded line of defense that adds a layer of protection to your application i...