Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

The Cloud Threat Landscape: Security Learnings from 500 Cloud Environments

In this cutting-edge eBook, explore an extensive analysis of the cloud threat landscape, derived from over 500 diverse cloud environments from Panoptica's own unique data set. Gain unparalleled insight into the evolving cloud threat landscape, while deep diving into attack path analysis, and trends across cloud service providers, CVEs, and Kubernetes coverage. This eBook reveals interesting trends in the market to help inform your own organization's cloud security posture and navigate the multi and hybrid cloud environments with increased confidence.

Demystifying Cloud Security: Dispelling Common Misconceptions for Robust Protection

Explore the truth behind cloud security myths. Learn why focusing beyond common vulnerabilities is crucial, delve into application security strategies, and discover the power of bug bounties. Shift your perspective to secure from the inside-out and fortify your multi-cloud presence.

Cloud Unfiltered with Chris Aniszczyk - History of CNCF, Linux FDN, KubeCon & the Future - Episode 3

In this episode, Chris Aniszczyk, CTO of Linux Foundation/CNCF sits down with host, Michael Chenetz to discuss the history of the CNCF (Cloud Native Compute Foundation) and where it is going. Additionally, Chris discusses what he expects the trends to be for the next KubeCon in Paris.

Exploring LLM Hallucinations - Insights from the Cisco Research LLM Factuality/Hallucination Summit

LLMs have many impressive business applications. But a significant challenge remains - how can we detect and mitigate LLM hallucinations? Cisco Research hosted a virtual summit to explore current research in the LLM factuality and hallucination space. The session includes presentations from University professors collaborating with the Cisco Research team, including William Wang (UCSB), Kai Shu (IIT), Danqi Chen (Princeton), and Huan Sun (Ohio State).

Cloud Unfiltered with David Aronchick - AI, Kubeflow, and CoD - Episode 2

In this episode of Cloud Unfiltered, host Michael Chenetz interviews David Aronchick, co-founder of Kubeflow and leader of a new startup, Expanso. They dive into David's unique journey as a tech innovator, detailing his significant contributions to Kubernetes at Google and his ventures in the startup world. They explore the challenges of reproducibility in technology, the evolution of Kubernetes, and the future of AI and machine learning, including the significance of Kubeflow and Expand in simplifying and advancing cloud and AI technologies.

Cloud Unfiltered with Ayse Kaya - Container Security Report - Episode 1

Join host Michael Chenetz and returning guest Ayse Kaya as they delve into the critical topic of container security. This episode covers the latest insights from the 2023 SlimAI Container Report, focusing on the challenges and advancements in this ever-evolving field.

Introducing Motific.ai. Accelerate your GenAI adoption journey.

Unlock rapid, trusted delivery of GenAI capabilities in your organization and streamline management of GenAI building blocks. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

The Beginner's Guide to Attack Paths

In the ever-evolving landscape of multi-cloud environments, the future of cloud security demands a paradigm shift. In this eBook, dive into the details of how looking at cloud environments from the perspective of an attacker to identify and prioritize critical security risks, can improve your cloud security. The power of the attack path is not just about surfacing findings; it's about visualizing them in a way that brings clarity to complexity, empowering you to make informed decisions swiftly.

The Definitive Guide to Securing AWS S3 Buckets: Best Practices and Risks Unveiled

Unlock the secrets of Amazon S3 bucket security with our comprehensive guide. Learn about S3 basics, access control methods, and the potential risks of misconfigurations. Discover real-world examples, best practices, and how to safeguard your data from breaches and vulnerabilities.