Read the original article: Paradigm Shift: The World’s First ML-Powered NGFW with PAN-OS 10.0 A paradigm shift in cybersecurity is needed. The world’s first ML-powered NGFW with PAN-OS 10.0 introduces more than 70 innovative new capabilities. The post Paradigm Shift:…
Category: Palo Alto Networks Blog
How to Create a DevSecOps Culture
Read the original article: How to Create a DevSecOps Culture A DevSecOps culture helps security teams and developers work together, to the benefit of your organization. The post How to Create a DevSecOps Culture appeared first on Palo Alto Networks…
Online Learning: Security and Connectivity for Teachers and Students
Read the original article: Online Learning: Security and Connectivity for Teachers and Students Enabling successful online learning requires ensuring access to needed devices, maintaining adequate connectivity and implementing effective security. The post Online Learning: Security and Connectivity for Teachers and…
3 Ways SD-WAN Can Benefit Industrial Control System Environments
Read the original article: 3 Ways SD-WAN Can Benefit Industrial Control System Environments SD-WAN technology offers improved user experience, simplified operations and stronger cybersecurity for ICS and SCADA systems. The post 3 Ways SD-WAN Can Benefit Industrial Control System Environments…
How Palo Alto Networks and Okta Are Helping Enable Secure Remote Work
Read the original article: How Palo Alto Networks and Okta Are Helping Enable Secure Remote Work Both Next-Generation Firewalls – and now, Prisma Access – integrate with Okta Identity Cloud to further simplify the remote worker experience. The post How…
Shift-Left with IaC Build Policies in Prisma Cloud
Read the original article: Shift-Left with IaC Build Policies in Prisma Cloud Prisma Cloud recently added IaC Build Policies, as well as support for Terraform 0.12. The post Shift-Left with IaC Build Policies in Prisma Cloud appeared first on Palo…
Shift-Left with IaC Build Policies in Prisma Cloud
Read the original article: Shift-Left with IaC Build Policies in Prisma Cloud Prisma Cloud recently added IaC Build Policies, as well as support for Terraform 0.12. The post Shift-Left with IaC Build Policies in Prisma Cloud appeared first on Palo…
Rethinking Zero Trust Network Access for a Zero Trust Strategy
Read the original article: Rethinking Zero Trust Network Access for a Zero Trust Strategy A Zero Trust strategy is not a plug-in solution. Zero Trust Network Access can be one aspect of an end-to-end approach to Zero Trust. The post…
Proactively Addressing FedRAMP Continuous Monitoring Requirements
Read the original article: Proactively Addressing FedRAMP Continuous Monitoring Requirements Earning and maintaining FedRAMP ATO is challenging. This four-step method, applicable to any business, can help with FedRAMP continuous monitoring requirements. The post Proactively Addressing FedRAMP Continuous Monitoring Requirements appeared…
Proactively Addressing FedRAMP Continuous Monitoring Requirements
Read the original article: Proactively Addressing FedRAMP Continuous Monitoring Requirements Earning and maintaining FedRAMP ATO is challenging. This four-step method, applicable to any business, can help with FedRAMP continuous monitoring requirements. The post Proactively Addressing FedRAMP Continuous Monitoring Requirements appeared…
Cortex XDR 2.4: One Small Step for Cortex XDR, One Giant Leap for SecOps
Read the original article: Cortex XDR 2.4: One Small Step for Cortex XDR, One Giant Leap for SecOps Cortex XDR 2.4 is packed with features that enhance detection, investigation and ease of management, from vulnerability assessment to integration with Cortex…
Secure EUC Environments with Palo Alto Networks and Nutanix
Read the original article: Secure EUC Environments with Palo Alto Networks and Nutanix Palo Alto Networks and our technology partner Nutanix have teamed up to make it easy for you to implement Zero Trust in virtualized environments. The post Secure…
Physical Hack, Insider Threat: Busted by Cortex XDR Managed Threat Hunting
Read the original article: Physical Hack, Insider Threat: Busted by Cortex XDR Managed Threat Hunting An EMEA-based consulting firm was able to identify and stop an insider threat with the help of the Cortex XDR Managed Threat Hunting team. The…
Introducing the Palo Alto Networks Google Search Extension
Read the original article: Introducing the Palo Alto Networks Google Search Extension The Google Search Extension from Palo Alto Networks can help you find our most valued documents directly in the Google search results page. The post Introducing the Palo…
Achieving End-to-End Zero Trust
Read the original article: Achieving End-to-End Zero Trust Achieving end-to-end Zero Trust requires a well-coordinated architecture and solutions that work across your entire infrastructure. The post Achieving End-to-End Zero Trust appeared first on Palo Alto Networks Blog. Advertise on…
Managing Container Image Trust with Prisma Cloud
Read the original article: Managing Container Image Trust with Prisma Cloud Better processes around container image trust create a more secure environment for less effort. The post Managing Container Image Trust with Prisma Cloud appeared first on Palo Alto Networks…
Email Gateways Stop Phishing Attacks: Reality or Myth?
Read the original article: Email Gateways Stop Phishing Attacks: Reality or Myth? As necessary as email gateways are, they are not enough to protect against email-related attacks including phishing. The post Email Gateways Stop Phishing Attacks: Reality or Myth? appeared…
Need to Secure Cloud Native Applications? Take a Look at Airport Security
Read the original article: Need to Secure Cloud Native Applications? Take a Look at Airport Security 2 essentials of airport threat prevention nicely illustrate why virtual and container NGFWs are vital for securing cloud-native applications. The post Need to Secure…
Cooperation and Collaborative Partnerships are Key to Protect Businesses
Read the original article: Cooperation and Collaborative Partnerships are Key to Protect Businesses Cooperation between cybersecurity organizations, vendors and MSSPs can help stop cyber attacks. The post Cooperation and Collaborative Partnerships are Key to Protect Businesses appeared first on Palo…
FLEXWORK
Read the original article: FLEXWORK Reimagining the Workplace – Employer Choice to Employee Choice The post FLEXWORK appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the original article: FLEXWORK
Cortex XDR Managed Threat Hunting Is Available To All Customers
Read the original article: Cortex XDR Managed Threat Hunting Is Available To All Customers Cortex XDR Managed Threat Hunting operates across integrated endpoint, network and cloud data. The post Cortex XDR Managed Threat Hunting Is Available To All Customers appeared…
Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing?
Read the original article: Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing? Vulnerabilities in conferencing tools don’t necessarily mean you should stop using them. The post Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing? appeared first…
Are We Prepared to Deal with the Impact of Cyber Threats on 5G?
Read the original article: Are We Prepared to Deal with the Impact of Cyber Threats on 5G? With the 5G focus on bandwidth, devices, coverage and density, what about 5G security? The post Are We Prepared to Deal with the…
Why DevOps Needs to Change Security
Read the original article: Why DevOps Needs to Change Security DevOps has changed how apps are developed. It’s time for DevOps to change security, too. The post Why DevOps Needs to Change Security appeared first on Palo Alto Networks Blog.…
Containers are inherently secure – Reality or myth?
Read the original article: Containers are inherently secure – Reality or myth? Containers have unique properties that provide invaluable cybersecurity benefits but they’re far from being impenetrable. We discuss the myths and truths behind them. The post Containers are inherently…
CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List
Read the original article: CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List CRN recognized 10 leaders from Palo Alto Networks to be included in its esteemed 2020 Women of the Channel list The post…
Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways
Read the original article: Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways In the new Market Guide for Cloud Workload Protection Platforms, Gartner explores recent trends in CWPP. Read our assessment of key takeaways. The post Gartner Market…
Palo Alto Networks Named Google Cloud Technology Partner of the Year
Read the original article: Palo Alto Networks Named Google Cloud Technology Partner of the Year Learn why Prisma Cloud was named Google Cloud Technology Partner of the Year. The post Palo Alto Networks Named Google Cloud Technology Partner of the…
Prisma Cloud Named Google Cloud Technology Partner of the Year
Read the original article: Prisma Cloud Named Google Cloud Technology Partner of the Year Learn why Prisma Cloud was named Google Cloud Technology Partner of the Year. The post Prisma Cloud Named Google Cloud Technology Partner of the Year appeared…
Manage a Remote SOC: Micro-Surveys for Crisis Management
Read the original article: Manage a Remote SOC: Micro-Surveys for Crisis Management Micro-surveys in Cortex XSOAR can help security analysts manage communication in a remote SOC. The post Manage a Remote SOC: Micro-Surveys for Crisis Management appeared first on Palo…
Bridging the DevOps and Security Divide with DevSecOps
Read the original article: Bridging the DevOps and Security Divide with DevSecOps Adopting DevSecOps means recognizing gaps between DevOps and security teams, and accepting that DevSecOps is a practice, not an endpoint. The post Bridging the DevOps and Security Divide…
Using a Full Lifecycle Approach to Secure Cloud Native Applications
Read the original article: Using a Full Lifecycle Approach to Secure Cloud Native Applications Gartner’s recent “Top Security and Risk Management Trends” introduces cloud native application protection platforms. Learn more and get your copy. The post Using a Full Lifecycle…
The Right Approach to Securing 5G
Read the original article: The Right Approach to Securing 5G To lay a foundation for securing 5G, we must consider the challenges of IoT, 5G cloud adoption and the development of standards and best practices. The post The Right Approach…
How PwC Achieved a Work-from-Home Model
Read the original article: How PwC Achieved a Work-from-Home Model A PwC CIO/CISO shares how they created a secure remote workforce in response to the pandemic. The post How PwC Achieved a Work-from-Home Model appeared first on Palo Alto Networks…
How PwC Achieved a Scalable Work-from-Home Model
Read the original article: How PwC Achieved a Scalable Work-from-Home Model The Global CIO/CISO for PwC shares how his organization was able to achieve a scalable and secure work from home model in response to the pandemic. The post How…
Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends
Read the original article: Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends Scaling security for data center transformation is even more important during the pandemic. These techniques could help organizations keep pace. The post Scaling Security for Data Center…
Power the New Normal with Prisma Access: Delivering Next-gen Cybersecurity
Read the original article: Power the New Normal with Prisma Access: Delivering Next-gen Cybersecurity Learn how Prisma Access provides cloud-delivered security to help our global enterprise customers scale for remote work virtually overnight. The post Power the New Normal with…
Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard
Read the original article: Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard Microsoft recognized Zhibin Zhang on the MSRC Security Researcher Leaderboard for Q1 2020 for significant vulnerability research and CVE generation. The post Unit 42 Recognized…
Learning from Home While School’s Out: Cybersecurity Education for Kids
Read the original article: Learning from Home While School’s Out: Cybersecurity Education for Kids Free cybersecurity education resources can educate students about the industry while helping them have safer online experiences. The post Learning from Home While School’s Out: Cybersecurity…
What Kind of Cybersecurity Leader Are You? Advice for CSOs and Others
Read the original article: What Kind of Cybersecurity Leader Are You? Advice for CSOs and Others CSOs and other cybersecurity leaders can use moments of challenge and change as opportunities to change their organizations for the better. The post What…
Highlighting the Latest Compute Security Capabilities in Prisma Cloud
Read the original article: Highlighting the Latest Compute Security Capabilities in Prisma Cloud Take a deep dive into the new Compute Security capabilities that are available as part of our latest Prisma Cloud release. The post Highlighting the Latest Compute…
Manage a Remote SOC: Playbooks for Monitoring Remote User Activity
Read the original article: Manage a Remote SOC: Playbooks for Monitoring Remote User Activity The ability to monitor remote user activity is becoming more important than ever as many SOCs work to secure remote end users. The post Manage a…
XDR Listed as a Top Security and Risk Management Trend by Gartner
Read the original article: XDR Listed as a Top Security and Risk Management Trend by Gartner Learn why XDR and security automation are top security and risk management trends for 2020. The post XDR Listed as a Top Security and…
3 Myths About Security in the Cloud
Read the original article: 3 Myths About Security in the Cloud There are many myths about security in the cloud. Our CSO for public cloud breaks down a few big ones and offers some truths. The post 3 Myths About…
Keep Adversaries at Bay with Managed Detection and Response
Read the original article: Keep Adversaries at Bay with Managed Detection and Response Knowing what to consider when choosing managed detection and response partner services can help in the effort to be cyber resilient. The post Keep Adversaries at Bay…
MITRE Round 2 Results Solidify Cortex XDR as a Leader in EDR
Read the original article: MITRE Round 2 Results Solidify Cortex XDR as a Leader in EDR Round 2 MITRE ATT&CK evaluations tested Cortex XDR against tactics and techniques that have been used by the threat actor group APT29, aka Cozy…
Cortex XDR Further Extends Network Visibility and Endpoint Control
Read the original article: Cortex XDR Further Extends Network Visibility and Endpoint Control Cortex XDR 2.2 enhances network visibility and endpoint control, making threat hunting and response across data sources easier. The post Cortex XDR Further Extends Network Visibility and…
The Industry’s Most Comprehensive SASE Just Got Better with CloudGenix
Read the original article: The Industry’s Most Comprehensive SASE Just Got Better with CloudGenix The cloud-delivered branch capability and application-centric approach of CloudGenix will accelerate the Palo Alto Networks SASE vision. The post The Industry’s Most Comprehensive SASE Just Got…
Five Remote Access Security Risks And How To Protect Against Them
Read the original article: Five Remote Access Security Risks And How To Protect Against Them Learn technology and user education best practices to protect a newly remote workforce and keep remote users safe from common security risks. The post Five…
Manage A Remote SOC: Shift Management Tips
Read the original article: Manage A Remote SOC: Shift Management Tips Learn how you can use the shift management feature of Cortex XSOAR to maintain visibility into team availability while managing a remote SOC. The post Manage A Remote SOC:…
Cloud Security 2021: 4 Key Trends You Shouldn’t Miss
Read the original article: Cloud Security 2021: 4 Key Trends You Shouldn’t Miss Security is a fast-changing industry. Cloud security 2021 covers the trends you need to know to stay ahead in the coming year and beyond. The post Cloud…
Working from Home During COVID-19: Secure Access for Remote Workers
Read the original article: Working from Home During COVID-19: Secure Access for Remote Workers As organizations seek to provide secure access to newly remote workers, they need to consider scale, performance and security. The post Working from Home During COVID-19:…
Book Review: “Black Box Thinking”
Read the complete article: b’Book Review: \xe2\x80\x9cBlack Box Thinking\xe2\x80\x9d’ This post doesn’t have text content, please click on the link below to view the original article. Advertise on IT Security News. Read the complete article: b’Book Review: \xe2\x80\x9cBlack Box…
The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene?
Adversaries flock to commonly used tools and processes, and we need to apply Security 101 habits to increasingly popular video conferencing tools. The post The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene? appeared first…
Securing US Federal Agency Remote Workers and Branch Offices
Prisma Access, a product that can help secure federal agency remote workers, has achieved the designation of “In Process” for FedRAMP. The post Securing US Federal Agency Remote Workers and Branch Offices appeared first on Palo Alto Networks Blog. …
Book Review: “The Cyber Conundrum”
“The Cyber Conundrum” by Peter K. Chronis advocates for a cybersecurity “moonshot,” but falls short of offering a clear path to success. The post Book Review: “The Cyber Conundrum” appeared first on Palo Alto Networks Blog. Advertise on IT…
Prisma Cloud Helps 3-GIS Secure AWS Workloads
One customer explains why Prisma Cloud was the right choice to help secure AWS workloads, allowing for a “set it and forget it” approach to security. The post Prisma Cloud Helps 3-GIS Secure AWS Workloads appeared first on Palo Alto…
Book Review: “Design for How People Think”
“Design for How People Think” isn’t a cybersecurity book, but it is useful for considering how best to report cyber risk data so it’s accessible. The post Book Review: “Design for How People Think” appeared first on Palo Alto Networks…
How DNS Security Helps Secure Your Remote Workforce
DNS security is often overlooked in discussions of securing remote workers. Addressing it can be simple to execute and have a tremendous impact. The post How DNS Security Helps Secure Your Remote Workforce appeared first on Palo Alto Networks Blog.…
How to Protect Against Cyberattacks When Working from Home During COVID-19
With more people working from home, businesses and individuals have critical roles and responsibilities for securing their organizations. The post How to Protect Against Cyberattacks When Working from Home During COVID-19 appeared first on Palo Alto Networks Blog. Advertise…
Helping Companies Meet US Government Guidance on Securing Remote Workforces
US government guidance on securing remote workforces includes an Enterprise VPN Security Alert. Palo Alto Networks can help with what it outlines. The post Helping Companies Meet US Government Guidance on Securing Remote Workforces appeared first on Palo Alto Networks…
Best Practices for Video Conferencing Security
Organizations and individuals can help improve video conferencing security, as the technology surges in popularity during these challenging times. The post Best Practices for Video Conferencing Security appeared first on Palo Alto Networks Blog. Advertise on IT Security News.…
Securing IoT in Federal Agencies
Zingbox IoT Guardian, the Palo Alto Networks product for securing IoT, has achieved the designation of In Process for FedRAMP. The post Securing IoT in Federal Agencies appeared first on Palo Alto Networks Blog. Advertise on IT Security News.…
Announcing New QuickStart Services for Strata
Organizations seeking to enable their remote workforces and secure their environments can take advantage of our new QuickStart Services. The post Announcing New QuickStart Services for Strata appeared first on Palo Alto Networks Blog. Advertise on IT Security News.…
The Zero Trust Learning Curve: Deploying Zero Trust One Step at a Time
Understanding the Zero Trust learning curve will help your organization protect sensitive information by deploying Zero Trust safely and efficiently. The post The Zero Trust Learning Curve: Deploying Zero Trust One Step at a Time appeared first on Palo Alto…
5 Reasons Why Threat Intel Management Needs to SOAR!
Extending SOAR to provide native threat intel management is a natural progression that can help fix broken threat intel management processes. The post 5 Reasons Why Threat Intel Management Needs to SOAR! appeared first on Palo Alto Networks Blog. …
Prisma Cloud Native Security Platform Embeds Security into DevOps Lifecycle
Prisma Cloud extends its Cloud Native Security Platform with advanced “Shift Left” capabilities to embed cloud security into the DevOps lifecycle. The post Prisma Cloud Native Security Platform Embeds Security into DevOps Lifecycle appeared first on Palo Alto Networks Blog.…
Secure Connectivity is The Only Connectivity
The need for direct to internet connectivity from anywhere on any device, securely, calls for new approaches, such as the Secure Access Service Edge. The post Secure Connectivity is The Only Connectivity appeared first on Palo Alto Networks Blog. …
COVID-19 (coronavirus) Partner and Customer Statement
Our global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. The post COVID-19 (coronavirus) Partner and Customer Statement appeared first on Palo Alto Networks Blog.…
Palo Alto Networks Joins Bay Area Companies to Provide Funds for COVID-19
Funding will support vulnerable populations, nonprofits and small businesses impacted, as well as national and global public health response efforts. The post Palo Alto Networks Joins Bay Area Companies to Provide Funds for COVID-19 appeared first on Palo Alto Networks…
COVID-19 (coronavirus) Partner and Customer Statement
Our global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. The post COVID-19 (coronavirus) Partner and Customer Statement appeared first on Palo Alto Networks Blog.…
Palo Alto Networks Joins Bay Area Companies to Provide Funds for COVID-19
Funding will support vulnerable populations, nonprofits, and small businesses impacted as well as national and global public health response efforts The post Palo Alto Networks Joins Bay Area Companies to Provide Funds for COVID-19 appeared first on Palo Alto Networks…
The Best Method to Secure the Cloud Starts Offline
Learn what education is needed to secure the cloud and re-engineer your network architecture to match your public cloud. The post The Best Method to Secure the Cloud Starts Offline appeared first on Palo Alto Networks Blog. Advertise on…
Launch a Remote SOC Today with Cortex XSOAR
We would like to share our journey and best practices, along with a series of resources, to help jump-start your transition to a remote SOC. The post Launch a Remote SOC Today with Cortex XSOAR appeared first on Palo Alto…
Do MSSPs Have What it Takes to Win Today’s Cybersecurity War?
MSSPs need the highest degree of protection, security automation, deployment flexibility and management ease – and a unique collaborative approach. The post Do MSSPs Have What it Takes to Win Today’s Cybersecurity War? appeared first on Palo Alto Networks Blog.…
Book Review: “InSecurity”
“InSecurity” by Jane Frankland highlights the importance of developing the talent of all people who can support the cybersecurity industry. The post Book Review: “InSecurity” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the…
Our March 16 Updated COVID-19 Guidance for Employees
Palo Alto Networks’ global crisis management team continues to closely monitor the COVID-19 outbreak. The following is updated guidance for employees. The post Our March 16 Updated COVID-19 Guidance for Employees appeared first on Palo Alto Networks Blog. Advertise…
Book Review: How America Lost Its Secrets
“How America Lost Its Secrets” is a great read for anyone who wants to understand how Edward Snowden was able to carry out large-scale data theft. The post Book Review: How America Lost Its Secrets appeared first on Palo Alto…
The Art of Automation: Creating Threat Intelligence Bots in the Cloud
How to use threat intelligence bots to create a collaborative space to share information and lessons learned and create an audit trail. The post The Art of Automation: Creating Threat Intelligence Bots in the Cloud appeared first on Palo Alto…
CCPA, GDPR and Beyond: How Data Loss Prevention Can Help with Compliance
In a quickly moving regulatory landscape, it’s a good time to consider investing in technologies that help make it easier to manage compliance. The post CCPA, GDPR and Beyond: How Data Loss Prevention Can Help with Compliance appeared first on…
Securely Connect and Scale Remote Workforces
How Palo Alto Networks can provide security as you rapidly scale remote work options for your employees during the COVID-19 outbreak. The post Securely Connect and Scale Remote Workforces appeared first on Palo Alto Networks Blog. Advertise on IT…
Palo Alto Networks Statement Regarding COVID-19 (Coronavirus)
Our global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. The post Palo Alto Networks Statement Regarding COVID-19 (Coronavirus) appeared first on Palo Alto Networks…
How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins
Prisma Cloud has many DevOps plugins to detect insecure configurations in IaC templates and vulnerabilities in container images. The post How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins appeared first on Palo Alto Networks Blog. Advertise…
4 Steps to Reduce IoT Risk in Your Enterprise
As IoT devices surge on corporate networks, there are some steps organizations can take immediately to reduce exposure to IoT-initiated attacks. The post 4 Steps to Reduce IoT Risk in Your Enterprise appeared first on Palo Alto Networks Blog. …
Our March 6 COVID-19 Guidance for Palo Alto Networks Employees
Palo Alto Networks’ global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. CEO and Chairman Nikesh Arora … The post Our March 6 COVID-19 Guidance…
Busted by Cortex XDR: Network Traffic Analysis in Action
Attackers made it past this large pharmaceutical company’s endpoint agents, only to be “Busted by Cortex XDR” and its network traffic analysis. The post Busted by Cortex XDR: Network Traffic Analysis in Action appeared first on Palo Alto Networks Blog.…
Breaking Down Silos with DevSecOps
As IT and Development work at greater speeds, Security needs resources to keep up. Adopting DevSecOps and the right tools is the way. The post Breaking Down Silos with DevSecOps appeared first on Palo Alto Networks Blog. Advertise on…
Why Proxy-Based Firewalls Are Not Enough
Can proxy-based firewalls really help keep users safe? We examine some of the drawbacks that prevent them from being effective security tools. The post Why Proxy-Based Firewalls Are Not Enough appeared first on Palo Alto Networks Blog. Advertise on…
Securing Serverless Applications with Prisma Cloud
Learn what security teams need to change for serverless computing, and how Prisma Cloud can help. The post Securing Serverless Applications with Prisma Cloud appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete…
Book Review: “The Perfect Weapon”
“The Perfect Weapon” will help you understand the cyber activities of governments, industry, criminals and the blurry mixtures of these groups. The post Book Review: “The Perfect Weapon” appeared first on Palo Alto Networks Blog. Advertise on IT Security…
Book Review: “No Place to Hide”
“No Place to Hide” will make you question data privacy law and ponder what’s to come with even more sophisticated data collection and analysis. The post Book Review: “No Place to Hide” appeared first on Palo Alto Networks Blog. …
5 Cybersecurity Issues to Address in the Asia-Pacific Region
Major cybersecurity issues on the horizon for the Asia-Pacific region include 5G security, addressing the talent shortage and navigating IoT security. The post 5 Cybersecurity Issues to Address in the Asia-Pacific Region appeared first on Palo Alto Networks Blog. …
Book Review: “CISO Compass”
“CISO Compass” includes insights into many topics important to cybersecurity professionals, covering technologies, regulations and soft skills. The post Book Review: “CISO Compass” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete article:…
Deepfakes Extend the Concept of “Fake News,” and They’re Here to Stay
Hany Farid, Ph.D., who spoke at The Palo Alto Networks Experience during RSA 2020, gives recommendations for how to address the problem of deepfakes. The post Deepfakes Extend the Concept of “Fake News,” and They’re Here to Stay appeared first…
RSAC Day Three – Highlights from Social Media
Palo Alto Networks happenings for RSAC day three included branded socks, free coffee and a talk from digital forensics expert Hany Farid on deepfakes. The post RSAC Day Three – Highlights from Social Media appeared first on Palo Alto Networks…
Book Review: “Digital Resilience”
“Digital Resilience” explains how cybersecurity professionals must balance people, processes and technologies – and communicate with management. The post Book Review: “Digital Resilience” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete article:…
RSAC Day Two – Highlights from Social Media
RSAC day two included a talk from Palo Alto Networks co-founder and CTO Nir Zuk. Sheryl Crow performed at the Palo Alto Networks Experience. The post RSAC Day Two – Highlights from Social Media appeared first on Palo Alto Networks…
The Role of Identity Access Management (IAM) in Cloud Security
Cloud providers offer many services. You need to govern and secure many of them with identity and access management (IAM). Here’s how. The post The Role of Identity Access Management (IAM) in Cloud Security appeared first on Palo Alto Networks…
Cortex XDR Earns “AA” Rating on NSS Labs 2020 AEP Test
NSS Labs’ Advanced Endpoint Protection Test put leading endpoint security products through 45,000 attack test cases across all tested products. The post Cortex XDR Earns “AA” Rating on NSS Labs 2020 AEP Test appeared first on Palo Alto Networks Blog.…
Google Chronicle Integrates with Cortex XSOAR
Users can combine Google Chronicle’s real-time threat detection capability with the security orchestration and automation features of Cortex XSOAR. The post Google Chronicle Integrates with Cortex XSOAR appeared first on Palo Alto Networks Blog. Advertise on IT Security News.…