Category: Palo Alto Networks Blog

The Best Method to Secure the Cloud Starts Offline

Learn what education is needed to secure the cloud and re-engineer your network architecture to match your public cloud. The post The Best Method to Secure the Cloud Starts Offline appeared first on Palo Alto Networks Blog.   Advertise on…

Launch a Remote SOC Today with Cortex XSOAR

We would like to share our journey and best practices, along with a series of resources, to help jump-start your transition to a remote SOC. The post Launch a Remote SOC Today with Cortex XSOAR appeared first on Palo Alto…

Book Review: “InSecurity”

“InSecurity” by Jane Frankland highlights the importance of developing the talent of all people who can support the cybersecurity industry. The post Book Review: “InSecurity” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the…

Our March 16 Updated COVID-19 Guidance for Employees

Palo Alto Networks’ global crisis management team continues to closely monitor the COVID-19 outbreak. The following is updated guidance for employees. The post Our March 16 Updated COVID-19 Guidance for Employees appeared first on Palo Alto Networks Blog.   Advertise…

Book Review: How America Lost Its Secrets

“How America Lost Its Secrets” is a great read for anyone who wants to understand how Edward Snowden was able to carry out large-scale data theft. The post Book Review: How America Lost Its Secrets appeared first on Palo Alto…

Securely Connect and Scale Remote Workforces

How Palo Alto Networks can provide security as you rapidly scale remote work options for your employees during the COVID-19 outbreak. The post Securely Connect and Scale Remote Workforces appeared first on Palo Alto Networks Blog.   Advertise on IT…

4 Steps to Reduce IoT Risk in Your Enterprise

As IoT devices surge on corporate networks, there are some steps organizations can take immediately to reduce exposure to IoT-initiated attacks. The post 4 Steps to Reduce IoT Risk in Your Enterprise appeared first on Palo Alto Networks Blog.  …

Busted by Cortex XDR: Network Traffic Analysis in Action

Attackers made it past this large pharmaceutical company’s endpoint agents, only to be “Busted by Cortex XDR” and its network traffic analysis. The post Busted by Cortex XDR: Network Traffic Analysis in Action appeared first on Palo Alto Networks Blog.…

Breaking Down Silos with DevSecOps

As IT and Development work at greater speeds, Security needs resources to keep up. Adopting DevSecOps and the right tools is the way. The post Breaking Down Silos with DevSecOps appeared first on Palo Alto Networks Blog.   Advertise on…

Why Proxy-Based Firewalls Are Not Enough

Can proxy-based firewalls really help keep users safe? We examine some of the drawbacks that prevent them from being effective security tools. The post Why Proxy-Based Firewalls Are Not Enough appeared first on Palo Alto Networks Blog.   Advertise on…

Securing Serverless Applications with Prisma Cloud

Learn what security teams need to change for serverless computing, and how Prisma Cloud can help. The post Securing Serverless Applications with Prisma Cloud appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete…

Book Review: “The Perfect Weapon”

“The Perfect Weapon” will help you understand the cyber activities of governments, industry, criminals and the blurry mixtures of these groups. The post Book Review: “The Perfect Weapon” appeared first on Palo Alto Networks Blog.   Advertise on IT Security…

Book Review: “No Place to Hide”

“No Place to Hide” will make you question data privacy law and ponder what’s to come with even more sophisticated data collection and analysis. The post Book Review: “No Place to Hide” appeared first on Palo Alto Networks Blog.  …

Book Review: “CISO Compass”

“CISO Compass” includes insights into many topics important to cybersecurity professionals, covering technologies, regulations and soft skills. The post Book Review: “CISO Compass” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete article:…

RSAC Day Three – Highlights from Social Media

Palo Alto Networks happenings for RSAC day three included branded socks, free coffee and a talk from digital forensics expert Hany Farid on deepfakes. The post RSAC Day Three – Highlights from Social Media appeared first on Palo Alto Networks…

Book Review: “Digital Resilience”

“Digital Resilience” explains how cybersecurity professionals must balance people, processes and technologies – and communicate with management. The post Book Review: “Digital Resilience” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete article:…

RSAC Day Two – Highlights from Social Media

RSAC day two included a talk from Palo Alto Networks co-founder and CTO Nir Zuk. Sheryl Crow performed at the Palo Alto Networks Experience. The post RSAC Day Two – Highlights from Social Media appeared first on Palo Alto Networks…

Google Chronicle Integrates with Cortex XSOAR

Users can combine Google Chronicle’s real-time threat detection capability with the security orchestration and automation features of Cortex XSOAR. The post Google Chronicle Integrates with Cortex XSOAR appeared first on Palo Alto Networks Blog.   Advertise on IT Security News.…

What’s it Like Being a Woman in Cybersecurity?

As a woman in cybersecurity, I see how much the industry benefits from out-of-the-box thinking, fueled by talented people from different backgrounds. The post What’s it Like Being a Woman in Cybersecurity? appeared first on Palo Alto Networks Blog.  …

The Three T’s of Shift Left Security

If your strategy for shift left security is just more work, you won’t improve dev productivity, joy or flow. Learn the three components you need. The post The Three T’s of Shift Left Security appeared first on Palo Alto Networks…

Book Review: “Cyber Smart”

“Cyber Smart” presents a well-balanced combination of cyber threats and smart practices that the non-expert can understand and implement. The post Book Review: “Cyber Smart” appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the…

Securing the Software Development Supply Chain

The software development supply chain isn’t all that different from the one that gives us bread. Learn how it works—and how to protect it. The post Securing the Software Development Supply Chain appeared first on Palo Alto Networks Blog.  …

Holistic SDN Security Makes Security Comprehensive Everywhere

Virtual firewalls safeguard SDN platforms like NSX to secure trust zones, boundaries, and microsegmentation for security that spans environments. The post Holistic SDN Security Makes Security Comprehensive Everywhere appeared first on Palo Alto Networks Blog.   Advertise on IT Security…

Cloud Native Security Beyond Your Vendor’s Tools

Cloud service providers don’t protect the entire stack. Learn what cloud native security looks like from the user’s perspective. The post Cloud Native Security Beyond Your Vendor’s Tools appeared first on Palo Alto Networks Blog.   Advertise on IT Security…

Book Review: “The Fifth Domain”

“The Fifth Domain” is a “must read” for not only every cybersecurity professional, but also every global citizen with an interest in the digital age. The post Book Review: “The Fifth Domain” appeared first on Palo Alto Networks Blog.  …

Book Review: Cult of the Dead Cow

“Cult of the Dead Cow” by Joseph Menn not only covers fascinating cybersecurity history – it’s also a call to change today’s “Big Tech” thinking. The post Book Review: Cult of the Dead Cow appeared first on Palo Alto Networks…

SC Media Names Prisma Cloud an Industry Innovator

Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog.   Advertise on…

SC Media Names Prisma Cloud an Industry Innovator

Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog.   Advertise on…

Your SaaS Security Checklist

A brief overview of SaaS security considerations, useful when evaluating SaaS applications to deploy within your organization. The post Your SaaS Security Checklist appeared first on Palo Alto Networks Blog.   Advertise on IT Security News. Read the complete article:…

Do Your SOC Metrics Incentivize Bad Behavior?

Many security operations center (SOC) metrics – even some of the most popular ones – have the potential to drive poor behavior. The post Do Your SOC Metrics Incentivize Bad Behavior? appeared first on Palo Alto Networks Blog.   Advertise…

Prisma SaaS: An Octopus That Secures App Ecosystems

Learn why Prisma SaaS, with its sophisticated sensing capabilities, is a handy friend to have monitoring your application ecosystem. The post Prisma SaaS: An Octopus That Secures App Ecosystems appeared first on Palo Alto Networks Blog.   Advertise on IT…

The Six Pillars of Effective Security Operations

Take a step back and do an honest evaluation of how your security operations are structured and how they’re serving your business goals. The post The Six Pillars of Effective Security Operations appeared first on Palo Alto Networks Blog.  …