Cortex XSOAR is an evolution of Demisto, continuing our tradition of raising the bar for the security orchestration, automation and response category The post Redefining Security Orchestration and Automation with Cortex XSOAR appeared first on Palo Alto Networks Blog. …
Category: Palo Alto Networks Blog
The Cortex XSOAR Ecosystem is Exploding with Partner-Owned Integrations
The Cortex XSOAR ecosystem has 360+ integrations with third-party tools, and now technical partners can submit and support their own offerings. The post The Cortex XSOAR Ecosystem is Exploding with Partner-Owned Integrations appeared first on Palo Alto Networks Blog. …
How to Use a Firewall for Network Traffic Analysis and Behavioral Detection
Network traffic analysis is a key capability of Cortex XDR, and it works with next-generation firewall logs from multiple vendors. The post How to Use a Firewall for Network Traffic Analysis and Behavioral Detection appeared first on Palo Alto Networks…
What’s it Like Being a Woman in Cybersecurity?
As a woman in cybersecurity, I see how much the industry benefits from out-of-the-box thinking, fueled by talented people from different backgrounds. The post What’s it Like Being a Woman in Cybersecurity? appeared first on Palo Alto Networks Blog. …
The Three T’s of Shift Left Security
If your strategy for shift left security is just more work, you won’t improve dev productivity, joy or flow. Learn the three components you need. The post The Three T’s of Shift Left Security appeared first on Palo Alto Networks…
What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020
Based on submissions cybersecurity experts submitted for the RSA Conference 2020, deep fakes, stalkerware, DevOps and more are key industry concerns. The post What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020 appeared first on Palo Alto…
Book Review: “Cyber Smart”
“Cyber Smart” presents a well-balanced combination of cyber threats and smart practices that the non-expert can understand and implement. The post Book Review: “Cyber Smart” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the…
Securing the Software Development Supply Chain
The software development supply chain isn’t all that different from the one that gives us bread. Learn how it works—and how to protect it. The post Securing the Software Development Supply Chain appeared first on Palo Alto Networks Blog. …
Tapping the True Potential of the 5G Digital Economy
With increasing attention to 5G, it’s a perfect time to lay out our vision of the future of the 5G digital economy. The post Tapping the True Potential of the 5G Digital Economy appeared first on Palo Alto Networks Blog.…
Holistic SDN Security Makes Security Comprehensive Everywhere
Virtual firewalls safeguard SDN platforms like NSX to secure trust zones, boundaries, and microsegmentation for security that spans environments. The post Holistic SDN Security Makes Security Comprehensive Everywhere appeared first on Palo Alto Networks Blog. Advertise on IT Security…
Cloud Native Security Beyond Your Vendor’s Tools
Cloud service providers don’t protect the entire stack. Learn what cloud native security looks like from the user’s perspective. The post Cloud Native Security Beyond Your Vendor’s Tools appeared first on Palo Alto Networks Blog. Advertise on IT Security…
Palo Alto Networks Executives Recognized as CRN Channel Chiefs
CRN has recognized three Palo Alto Networks executives in its annual list of the top 50 vendor executives who continually demonstrate exemplary leadership, influence, innovation and growth for the IT channel. The post Palo Alto Networks Executives Recognized as CRN…
The Future of the Cloud Native Security Platform: Q&A with John Morello
John Morello, VP of product, Prisma Cloud Compute Edition, shares his thoughts on the Cloud Native Security Platform and previews the Cloud Native Security Summit. The post The Future of the Cloud Native Security Platform: Q&A with John Morello appeared…
The Cloud’s Sunny Future: The Rewards of Working in Cloud Security
Working in cloud security at Palo Alto Networks is the best of both worlds: the stability of a major corporation that still operates like a startup. The post The Cloud’s Sunny Future: The Rewards of Working in Cloud Security appeared…
Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features
The Community Access edition of Cortex XDR Managed Threat Hunting is a powerful threat hunting service exclusively for our Cortex XDR customers. The post Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features appeared first on Palo Alto…
The Road to 100 on the HRC’s 2020 Corporate Equality Index
Our progress with the HRC’s Corporate Equality Index mirrors progress our company has made in our broader Inclusion & Diversity (I&D) efforts. The post The Road to 100 on the HRC’s 2020 Corporate Equality Index appeared first on Palo Alto…
Book Review: “The Fifth Domain”
“The Fifth Domain” is a “must read” for not only every cybersecurity professional, but also every global citizen with an interest in the digital age. The post Book Review: “The Fifth Domain” appeared first on Palo Alto Networks Blog. …
Earn Beacon Gold While Becoming a Ninja at Using Our Products
The Beacon digital learning platform makes it easy to expand your cybersecurity skills – and now users can earn Beacon Gold for completing activities. The post Earn Beacon Gold While Becoming a Ninja at Using Our Products appeared first on…
Data Security for the Future: DLP and Secure Access Service Edge
DLP provides visibility across sensitive information, enabling strong protective actions to safeguard data from threats and policy violations. The post Data Security for the Future: DLP and Secure Access Service Edge appeared first on Palo Alto Networks Blog. Advertise…
Book Review: Cult of the Dead Cow
“Cult of the Dead Cow” by Joseph Menn not only covers fascinating cybersecurity history – it’s also a call to change today’s “Big Tech” thinking. The post Book Review: Cult of the Dead Cow appeared first on Palo Alto Networks…
Navigating Federal Data Protection Compliance Requirements in the Cloud
A primer on federal data protection compliance and proper configuration for using cloud services for data related to work with the federal government. The post Navigating Federal Data Protection Compliance Requirements in the Cloud appeared first on Palo Alto Networks…
3 Observations About Leadership in an Age of Digital Transformation
Strong digital leadership calls for cultivating innovation and agility, or we risk paving the way for newcomers to disrupt our business models. The post 3 Observations About Leadership in an Age of Digital Transformation appeared first on Palo Alto Networks…
3 Tools for K-12 Cybersecurity: Keeping Students and Schools Safe in a Digital World
Our suggestions for K-12 cybersecurity include interactive learning, best practices for configuration and resources for securing E-rate funding. The post 3 Tools for K-12 Cybersecurity: Keeping Students and Schools Safe in a Digital World appeared first on Palo Alto Networks…
Cybersecurity Canon Candidate Book Review: Code Girls: The Untold Story of the American Women Code Breakers of World War II
“Code Girls” explores the largely unrecognized contributions of the first women to officially serve as part of U.S. code breaking efforts. The post Cybersecurity Canon Candidate Book Review: Code Girls: The Untold Story of the American Women Code Breakers of…
5 Straight Years of Delighting Our Customers with Outstanding Customer Support
J.D. Power and the Technology Services Industry Association have certified Palo Alto Networks for Rated Outstanding Assisted Support 2015-2019. The post 5 Straight Years of Delighting Our Customers with Outstanding Customer Support appeared first on Palo Alto Networks Blog. …
3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things
Your employees often don’t get to focus on the activities for which they provide unique value. The solution? Implementing better SecOps strategies. The post 3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things appeared first on…
SC Media Names Prisma Cloud an Industry Innovator
Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog. Advertise on…
SC Media Names Prisma Cloud an Industry Innovator
Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog. Advertise on…
Getting Cloud Smart: Security for Hybrid and Public Federal Clouds
Prisma Cloud has been added to Palo Alto Networks Government Cloud Services, increasing our security offerings for hybrid and public federal clouds. The post Getting Cloud Smart: Security for Hybrid and Public Federal Clouds appeared first on Palo Alto Networks…
Your SaaS Security Checklist
A brief overview of SaaS security considerations, useful when evaluating SaaS applications to deploy within your organization. The post Your SaaS Security Checklist appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete article:…
Do Your SOC Metrics Incentivize Bad Behavior?
Many security operations center (SOC) metrics – even some of the most popular ones – have the potential to drive poor behavior. The post Do Your SOC Metrics Incentivize Bad Behavior? appeared first on Palo Alto Networks Blog. Advertise…
Why Cloud Security Seems So Hard, and How to Overcome These Challenges
Exploring why cloud security and compliance seem so hard will show why organizations need to build holistic cloud security programs. The post Why Cloud Security Seems So Hard, and How to Overcome These Challenges appeared first on Palo Alto Networks…
Harnessing the Power of User and Entity Behavior Analytics (UEBA) for Cloud Security
Why a user and entity behavior analytics (UEBA) engine is essential for cloud security, and where to start if you don’t have it deployed. The post Harnessing the Power of User and Entity Behavior Analytics (UEBA) for Cloud Security appeared…
Prisma SaaS: An Octopus That Secures App Ecosystems
Learn why Prisma SaaS, with its sophisticated sensing capabilities, is a handy friend to have monitoring your application ecosystem. The post Prisma SaaS: An Octopus That Secures App Ecosystems appeared first on Palo Alto Networks Blog. Advertise on IT…
The Six Pillars of Effective Security Operations
Take a step back and do an honest evaluation of how your security operations are structured and how they’re serving your business goals. The post The Six Pillars of Effective Security Operations appeared first on Palo Alto Networks Blog. …
Zero Trust Network Access: Build Your SASE on a Solid Foundation
Prisma Access is based on the key zero trust network access principles, extending them across all the services within a SASE solution. The post Zero Trust Network Access: Build Your SASE on a Solid Foundation appeared first on Palo Alto…
Improve How You Enforce Security Policies with the Panorama Plugin for Cisco TrustSec
Since our commitment is to provide the best security possible, we designed our Panorama plugin for security in heterogeneous environments. The post Improve How You Enforce Security Policies with the Panorama Plugin for Cisco TrustSec appeared first on Palo Alto…
Cybersecurity Canon Candidate Book Review: Tribe of Hackers
“Tribe of Hackers,” by Marcus J. Carey and Jennifer Jin, is not just about the cybersecurity community; it is a gift to the cybersecurity community! The post Cybersecurity Canon Candidate Book Review: Tribe of Hackers appeared first on Palo Alto…
9 Cybersecurity Predictions for Europe, the Middle East and Africa in 2020
Our 2020 cybersecurity predictions for EMEA include consideration of upcoming challenges and opportunities in AI, cloud security, 5G and more. The post 9 Cybersecurity Predictions for Europe, the Middle East and Africa in 2020 appeared first on Palo Alto Networks…