Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2024

How to Protect Your Cloud Assets from Being Cryptojacked

Cryptojacking attacks have become the most prevalent type of attack on cloud native infrastructures. For example, in 2022, there were 139M cryptojacking attacks, but the following year there were over 1 billion! That translates to nearly 3M cryptojacking attacks every day, on average in 2023.

How to Protect Your Business From API Data Leaks

Application Programming Interfaces (APIs) are rapidly becoming the primary attack vector for cloud native applications. In fact, according to one study, 92% of organizations have already experienced a security incident resulting from insecure APIs. This is because loosely coupled microservices predominantly intercommunicate via APIs. In this video, we will analyze a ‘ripped from the headlines’ case-study example of data leakage via insecure APIs. Then we will examine various API vulnerabilities that can be exploited by attackers to enable data leaks, including Broken User Authentication (BUA), Broken Object Level Authentication (BOLA), and Broken Function-Level Authentication (BFLA).

Cloud Unfiltered with Sathish Balakrishnan - Exploring the Future of AI and Automation - Episode 12

Join host Michael Chenetz on this enlightening episode of Cloud Unfiltered as we dive deep into the realms of AI and automation with special guest Sathish Balakrishnan from Red Hat. Sathish, who leads the Ansible Automation Platform business, shares his valuable insights on how AI is enhancing automation technologies and the critical role of automation in leveraging AI effectively across industries.

Outshift by Cisco | An Era of GenAI & Human Collaboration

AI is the key to unlocking the untapped potential within your organization. At Outshift, we invest in the future of GenAI, not as a tool that replaces human effort but as a transformative force that amplifies the creativity and ingenuity of people across your enterprise. We invite you to reimagine the role of GenAI in business. Thinking of it as a tool for connection, adaptation, and creativity - a tool with unprecedented efficiency and impact.

Shift left: How securing from code to cloud can improve your time to market

Embracing a shift-left security approach in software development will not only enhance your application security but will also accelerate your software product's time to market. By integrating security practices early in the software development lifecycle (SDLC)—particularly in your cloud-native applications—you can navigate modern cyber threats more effectively as you get to market more swiftly.

Smart Cloud Detection and Response: Detecting attacks in real-time with Panoptica

Modern technology continues to assist, enhance, and shape every aspect of our lives—in our work, our homes, and even our vehicles. Home security video cameras and car dashcams are prevalent ways to ensure our personal safety and security. A popular electric vehicle has a “sentry mode” that is a perfect example of a system that monitors and captures events happening around the vehicle, providing information about incidents to vehicle owners.

Elevate, Automate, Anticipate: Panoptica's Cutting-Edge Security Solutions Unveiled at RSAC

The RSA Conference 2024 was a landmark event for Panoptica as we unveiled three transformative solutions: Smart CDR, GenAI Dynamic Remediation, and Security Graph Query. These tools work together seamlessly to strengthen your security architecture and ensure readiness against today's complex and evolving threats. Let’s take a look at each of these exciting new capabilities.

Generative AI & Security - Cisco Research Summit Spotlights the Latest in GenAI

Cisco Research hosted a virtual summit to explore current research in the generative AI and cybersecurity space. The session includes presentations from University professors collaborating with the Cisco Research team, including Srini Devadas (MIT), Vijayalakshmi Atluri (Rutgers), Jie Ding (Minnesota), and Ravi Sandhu and Ram Krishnan (UT San Antonio). Listen in for unique and exciting perspectives on the possibilities of generative AI in security, including discussions on the trustworthiness of LLMs, training and maintenance of AI models, and more.