Category: Palo Alto Networks Blog

What’s it Like Being a Woman in Cybersecurity?

As a woman in cybersecurity, I see how much the industry benefits from out-of-the-box thinking, fueled by talented people from different backgrounds. The post What’s it Like Being a Woman in Cybersecurity? appeared first on Palo Alto Networks Blog.  …

The Three T’s of Shift Left Security

If your strategy for shift left security is just more work, you won’t improve dev productivity, joy or flow. Learn the three components you need. The post The Three T’s of Shift Left Security appeared first on Palo Alto Networks…

Book Review: “Cyber Smart”

“Cyber Smart” presents a well-balanced combination of cyber threats and smart practices that the non-expert can understand and implement. The post Book Review: “Cyber Smart” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the…

Securing the Software Development Supply Chain

The software development supply chain isn’t all that different from the one that gives us bread. Learn how it works—and how to protect it. The post Securing the Software Development Supply Chain appeared first on Palo Alto Networks Blog.  …

Holistic SDN Security Makes Security Comprehensive Everywhere

Virtual firewalls safeguard SDN platforms like NSX to secure trust zones, boundaries, and microsegmentation for security that spans environments. The post Holistic SDN Security Makes Security Comprehensive Everywhere appeared first on Palo Alto Networks Blog.   Advertise on IT Security…

Cloud Native Security Beyond Your Vendor’s Tools

Cloud service providers don’t protect the entire stack. Learn what cloud native security looks like from the user’s perspective. The post Cloud Native Security Beyond Your Vendor’s Tools appeared first on Palo Alto Networks Blog.   Advertise on IT Security…

Book Review: “The Fifth Domain”

“The Fifth Domain” is a “must read” for not only every cybersecurity professional, but also every global citizen with an interest in the digital age. The post Book Review: “The Fifth Domain” appeared first on Palo Alto Networks Blog.  …

Book Review: Cult of the Dead Cow

“Cult of the Dead Cow” by Joseph Menn not only covers fascinating cybersecurity history – it’s also a call to change today’s “Big Tech” thinking. The post Book Review: Cult of the Dead Cow appeared first on Palo Alto Networks…

SC Media Names Prisma Cloud an Industry Innovator

Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog.   Advertise on…

SC Media Names Prisma Cloud an Industry Innovator

Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog.   Advertise on…

Your SaaS Security Checklist

A brief overview of SaaS security considerations, useful when evaluating SaaS applications to deploy within your organization. The post Your SaaS Security Checklist appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete article:…

Do Your SOC Metrics Incentivize Bad Behavior?

Many security operations center (SOC) metrics – even some of the most popular ones – have the potential to drive poor behavior. The post Do Your SOC Metrics Incentivize Bad Behavior? appeared first on Palo Alto Networks Blog.   Advertise…

Prisma SaaS: An Octopus That Secures App Ecosystems

Learn why Prisma SaaS, with its sophisticated sensing capabilities, is a handy friend to have monitoring your application ecosystem. The post Prisma SaaS: An Octopus That Secures App Ecosystems appeared first on Palo Alto Networks Blog.   Advertise on IT…

The Six Pillars of Effective Security Operations

Take a step back and do an honest evaluation of how your security operations are structured and how they’re serving your business goals. The post The Six Pillars of Effective Security Operations appeared first on Palo Alto Networks Blog.  …