Category: Palo Alto Networks Blog

How to Create a DevSecOps Culture

Read the original article: How to Create a DevSecOps Culture A DevSecOps culture helps security teams and developers work together, to the benefit of your organization. The post How to Create a DevSecOps Culture appeared first on Palo Alto Networks…

Online Learning: Security and Connectivity for Teachers and Students

Read the original article: Online Learning: Security and Connectivity for Teachers and Students Enabling successful online learning requires ensuring access to needed devices, maintaining adequate connectivity and implementing effective security. The post Online Learning: Security and Connectivity for Teachers and…

3 Ways SD-WAN Can Benefit Industrial Control System Environments

Read the original article: 3 Ways SD-WAN Can Benefit Industrial Control System Environments SD-WAN technology offers improved user experience, simplified operations and stronger cybersecurity for ICS and SCADA systems. The post 3 Ways SD-WAN Can Benefit Industrial Control System Environments…

Shift-Left with IaC Build Policies in Prisma Cloud

Read the original article: Shift-Left with IaC Build Policies in Prisma Cloud Prisma Cloud recently added IaC Build Policies, as well as support for Terraform 0.12. The post Shift-Left with IaC Build Policies in Prisma Cloud appeared first on Palo…

Shift-Left with IaC Build Policies in Prisma Cloud

Read the original article: Shift-Left with IaC Build Policies in Prisma Cloud Prisma Cloud recently added IaC Build Policies, as well as support for Terraform 0.12. The post Shift-Left with IaC Build Policies in Prisma Cloud appeared first on Palo…

Proactively Addressing FedRAMP Continuous Monitoring Requirements

Read the original article: Proactively Addressing FedRAMP Continuous Monitoring Requirements Earning and maintaining FedRAMP ATO is challenging. This four-step method, applicable to any business, can help with FedRAMP continuous monitoring requirements. The post Proactively Addressing FedRAMP Continuous Monitoring Requirements appeared…

Proactively Addressing FedRAMP Continuous Monitoring Requirements

Read the original article: Proactively Addressing FedRAMP Continuous Monitoring Requirements Earning and maintaining FedRAMP ATO is challenging. This four-step method, applicable to any business, can help with FedRAMP continuous monitoring requirements. The post Proactively Addressing FedRAMP Continuous Monitoring Requirements appeared…

Achieving End-to-End Zero Trust

Read the original article: Achieving End-to-End Zero Trust Achieving end-to-end Zero Trust requires a well-coordinated architecture and solutions that work across your entire infrastructure. The post Achieving End-to-End Zero Trust appeared first on Palo Alto Networks Blog.   Advertise on…

Managing Container Image Trust with Prisma Cloud

Read the original article: Managing Container Image Trust with Prisma Cloud Better processes around container image trust create a more secure environment for less effort. The post Managing Container Image Trust with Prisma Cloud appeared first on Palo Alto Networks…

Email Gateways Stop Phishing Attacks: Reality or Myth?

Read the original article: Email Gateways Stop Phishing Attacks: Reality or Myth? As necessary as email gateways are, they are not enough to protect against email-related attacks including phishing. The post Email Gateways Stop Phishing Attacks: Reality or Myth? appeared…

FLEXWORK

Read the original article: FLEXWORK Reimagining the Workplace – Employer Choice to Employee Choice The post FLEXWORK appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the original article: FLEXWORK

Why DevOps Needs to Change Security

Read the original article: Why DevOps Needs to Change Security DevOps has changed how apps are developed. It’s time for DevOps to change security, too. The post Why DevOps Needs to Change Security appeared first on Palo Alto Networks Blog.…

Containers are inherently secure – Reality or myth?

Read the original article: Containers are inherently secure – Reality or myth? Containers have unique properties that provide invaluable cybersecurity benefits but they’re far from being impenetrable. We discuss the myths and truths behind them. The post Containers are inherently…

Manage a Remote SOC: Micro-Surveys for Crisis Management

Read the original article: Manage a Remote SOC: Micro-Surveys for Crisis Management Micro-surveys in Cortex XSOAR can help security analysts manage communication in a remote SOC. The post Manage a Remote SOC: Micro-Surveys for Crisis Management appeared first on Palo…

Bridging the DevOps and Security Divide with DevSecOps

Read the original article: Bridging the DevOps and Security Divide with DevSecOps Adopting DevSecOps means recognizing gaps between DevOps and security teams, and accepting that DevSecOps is a practice, not an endpoint. The post Bridging the DevOps and Security Divide…

The Right Approach to Securing 5G

Read the original article: The Right Approach to Securing 5G To lay a foundation for securing 5G, we must consider the challenges of IoT, 5G cloud adoption and the development of standards and best practices. The post The Right Approach…

How PwC Achieved a Work-from-Home Model

Read the original article: How PwC Achieved a Work-from-Home Model A PwC CIO/CISO shares how they created a secure remote workforce in response to the pandemic. The post How PwC Achieved a Work-from-Home Model appeared first on Palo Alto Networks…

How PwC Achieved a Scalable Work-from-Home Model

Read the original article: How PwC Achieved a Scalable Work-from-Home Model The Global CIO/CISO for PwC shares how his organization was able to achieve a scalable and secure work from home model in response to the pandemic. The post How…

3 Myths About Security in the Cloud

Read the original article: 3 Myths About Security in the Cloud There are many myths about security in the cloud. Our CSO for public cloud breaks down a few big ones and offers some truths. The post 3 Myths About…

Manage A Remote SOC: Shift Management Tips

Read the original article: Manage A Remote SOC: Shift Management Tips Learn how you can use the shift management feature of Cortex XSOAR to maintain visibility into team availability while managing a remote SOC. The post Manage A Remote SOC:…

Book Review: “Black Box Thinking”

Read the complete article: b’Book Review: \xe2\x80\x9cBlack Box Thinking\xe2\x80\x9d’ This post doesn’t have text content, please click on the link below to view the original article.   Advertise on IT Security News. Read the complete article: b’Book Review: \xe2\x80\x9cBlack Box…

Book Review: “The Cyber Conundrum”

“The Cyber Conundrum” by Peter K. Chronis advocates for a cybersecurity “moonshot,” but falls short of offering a clear path to success. The post Book Review: “The Cyber Conundrum” appeared first on Palo Alto Networks Blog.   Advertise on IT…

Prisma Cloud Helps 3-GIS Secure AWS Workloads

One customer explains why Prisma Cloud was the right choice to help secure AWS workloads, allowing for a “set it and forget it” approach to security. The post Prisma Cloud Helps 3-GIS Secure AWS Workloads appeared first on Palo Alto…

Book Review: “Design for How People Think”

“Design for How People Think” isn’t a cybersecurity book, but it is useful for considering how best to report cyber risk data so it’s accessible. The post Book Review: “Design for How People Think” appeared first on Palo Alto Networks…

How DNS Security Helps Secure Your Remote Workforce

DNS security is often overlooked in discussions of securing remote workers. Addressing it can be simple to execute and have a tremendous impact. The post How DNS Security Helps Secure Your Remote Workforce appeared first on Palo Alto Networks Blog.…

Best Practices for Video Conferencing Security

Organizations and individuals can help improve video conferencing security, as the technology surges in popularity during these challenging times. The post Best Practices for Video Conferencing Security appeared first on Palo Alto Networks Blog.   Advertise on IT Security News.…

Securing IoT in Federal Agencies

Zingbox IoT Guardian, the Palo Alto Networks product for securing IoT, has achieved the designation of In Process for FedRAMP. The post Securing IoT in Federal Agencies appeared first on Palo Alto Networks Blog.   Advertise on IT Security News.…

Announcing New QuickStart Services for Strata

Organizations seeking to enable their remote workforces and secure their environments can take advantage of our new QuickStart Services. The post Announcing New QuickStart Services for Strata appeared first on Palo Alto Networks Blog.   Advertise on IT Security News.…

5 Reasons Why Threat Intel Management Needs to SOAR!

Extending SOAR to provide native threat intel management is a natural progression that can help fix broken threat intel management processes. The post 5 Reasons Why Threat Intel Management Needs to SOAR! appeared first on Palo Alto Networks Blog.  …

Secure Connectivity is The Only Connectivity

The need for direct to internet connectivity from anywhere on any device, securely, calls for new approaches, such as the Secure Access Service Edge. The post Secure Connectivity is The Only Connectivity appeared first on Palo Alto Networks Blog.  …

COVID-19 (coronavirus) Partner and Customer Statement

Our global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. The post COVID-19 (coronavirus) Partner and Customer Statement appeared first on Palo Alto Networks Blog.…

COVID-19 (coronavirus) Partner and Customer Statement

Our global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. The post COVID-19 (coronavirus) Partner and Customer Statement appeared first on Palo Alto Networks Blog.…

The Best Method to Secure the Cloud Starts Offline

Learn what education is needed to secure the cloud and re-engineer your network architecture to match your public cloud. The post The Best Method to Secure the Cloud Starts Offline appeared first on Palo Alto Networks Blog.   Advertise on…

Launch a Remote SOC Today with Cortex XSOAR

We would like to share our journey and best practices, along with a series of resources, to help jump-start your transition to a remote SOC. The post Launch a Remote SOC Today with Cortex XSOAR appeared first on Palo Alto…

Book Review: “InSecurity”

“InSecurity” by Jane Frankland highlights the importance of developing the talent of all people who can support the cybersecurity industry. The post Book Review: “InSecurity” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the…

Our March 16 Updated COVID-19 Guidance for Employees

Palo Alto Networks’ global crisis management team continues to closely monitor the COVID-19 outbreak. The following is updated guidance for employees. The post Our March 16 Updated COVID-19 Guidance for Employees appeared first on Palo Alto Networks Blog.   Advertise…

Book Review: How America Lost Its Secrets

“How America Lost Its Secrets” is a great read for anyone who wants to understand how Edward Snowden was able to carry out large-scale data theft. The post Book Review: How America Lost Its Secrets appeared first on Palo Alto…

Securely Connect and Scale Remote Workforces

How Palo Alto Networks can provide security as you rapidly scale remote work options for your employees during the COVID-19 outbreak. The post Securely Connect and Scale Remote Workforces appeared first on Palo Alto Networks Blog.   Advertise on IT…

4 Steps to Reduce IoT Risk in Your Enterprise

As IoT devices surge on corporate networks, there are some steps organizations can take immediately to reduce exposure to IoT-initiated attacks. The post 4 Steps to Reduce IoT Risk in Your Enterprise appeared first on Palo Alto Networks Blog.  …

Busted by Cortex XDR: Network Traffic Analysis in Action

Attackers made it past this large pharmaceutical company’s endpoint agents, only to be “Busted by Cortex XDR” and its network traffic analysis. The post Busted by Cortex XDR: Network Traffic Analysis in Action appeared first on Palo Alto Networks Blog.…

Breaking Down Silos with DevSecOps

As IT and Development work at greater speeds, Security needs resources to keep up. Adopting DevSecOps and the right tools is the way. The post Breaking Down Silos with DevSecOps appeared first on Palo Alto Networks Blog.   Advertise on…

Why Proxy-Based Firewalls Are Not Enough

Can proxy-based firewalls really help keep users safe? We examine some of the drawbacks that prevent them from being effective security tools. The post Why Proxy-Based Firewalls Are Not Enough appeared first on Palo Alto Networks Blog.   Advertise on…

Securing Serverless Applications with Prisma Cloud

Learn what security teams need to change for serverless computing, and how Prisma Cloud can help. The post Securing Serverless Applications with Prisma Cloud appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete…

Book Review: “The Perfect Weapon”

“The Perfect Weapon” will help you understand the cyber activities of governments, industry, criminals and the blurry mixtures of these groups. The post Book Review: “The Perfect Weapon” appeared first on Palo Alto Networks Blog.   Advertise on IT Security…

Book Review: “No Place to Hide”

“No Place to Hide” will make you question data privacy law and ponder what’s to come with even more sophisticated data collection and analysis. The post Book Review: “No Place to Hide” appeared first on Palo Alto Networks Blog.  …

Book Review: “CISO Compass”

“CISO Compass” includes insights into many topics important to cybersecurity professionals, covering technologies, regulations and soft skills. The post Book Review: “CISO Compass” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete article:…

RSAC Day Three – Highlights from Social Media

Palo Alto Networks happenings for RSAC day three included branded socks, free coffee and a talk from digital forensics expert Hany Farid on deepfakes. The post RSAC Day Three – Highlights from Social Media appeared first on Palo Alto Networks…

Book Review: “Digital Resilience”

“Digital Resilience” explains how cybersecurity professionals must balance people, processes and technologies – and communicate with management. The post Book Review: “Digital Resilience” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete article:…

RSAC Day Two – Highlights from Social Media

RSAC day two included a talk from Palo Alto Networks co-founder and CTO Nir Zuk. Sheryl Crow performed at the Palo Alto Networks Experience. The post RSAC Day Two – Highlights from Social Media appeared first on Palo Alto Networks…

Google Chronicle Integrates with Cortex XSOAR

Users can combine Google Chronicle’s real-time threat detection capability with the security orchestration and automation features of Cortex XSOAR. The post Google Chronicle Integrates with Cortex XSOAR appeared first on Palo Alto Networks Blog.   Advertise on IT Security News.…