Funding will support vulnerable populations, nonprofits, and small businesses impacted as well as national and global public health response efforts The post Palo Alto Networks Joins Bay Area Companies to Provide Funds for COVID-19 appeared first on Palo Alto Networks…
Category: Palo Alto Networks Blog
The Best Method to Secure the Cloud Starts Offline
Learn what education is needed to secure the cloud and re-engineer your network architecture to match your public cloud. The post The Best Method to Secure the Cloud Starts Offline appeared first on Palo Alto Networks Blog. Advertise on…
Launch a Remote SOC Today with Cortex XSOAR
We would like to share our journey and best practices, along with a series of resources, to help jump-start your transition to a remote SOC. The post Launch a Remote SOC Today with Cortex XSOAR appeared first on Palo Alto…
Do MSSPs Have What it Takes to Win Today’s Cybersecurity War?
MSSPs need the highest degree of protection, security automation, deployment flexibility and management ease – and a unique collaborative approach. The post Do MSSPs Have What it Takes to Win Today’s Cybersecurity War? appeared first on Palo Alto Networks Blog.…
Book Review: “InSecurity”
“InSecurity” by Jane Frankland highlights the importance of developing the talent of all people who can support the cybersecurity industry. The post Book Review: “InSecurity” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the…
Our March 16 Updated COVID-19 Guidance for Employees
Palo Alto Networks’ global crisis management team continues to closely monitor the COVID-19 outbreak. The following is updated guidance for employees. The post Our March 16 Updated COVID-19 Guidance for Employees appeared first on Palo Alto Networks Blog. Advertise…
Book Review: How America Lost Its Secrets
“How America Lost Its Secrets” is a great read for anyone who wants to understand how Edward Snowden was able to carry out large-scale data theft. The post Book Review: How America Lost Its Secrets appeared first on Palo Alto…
The Art of Automation: Creating Threat Intelligence Bots in the Cloud
How to use threat intelligence bots to create a collaborative space to share information and lessons learned and create an audit trail. The post The Art of Automation: Creating Threat Intelligence Bots in the Cloud appeared first on Palo Alto…
CCPA, GDPR and Beyond: How Data Loss Prevention Can Help with Compliance
In a quickly moving regulatory landscape, it’s a good time to consider investing in technologies that help make it easier to manage compliance. The post CCPA, GDPR and Beyond: How Data Loss Prevention Can Help with Compliance appeared first on…
Securely Connect and Scale Remote Workforces
How Palo Alto Networks can provide security as you rapidly scale remote work options for your employees during the COVID-19 outbreak. The post Securely Connect and Scale Remote Workforces appeared first on Palo Alto Networks Blog. Advertise on IT…
Palo Alto Networks Statement Regarding COVID-19 (Coronavirus)
Our global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. The post Palo Alto Networks Statement Regarding COVID-19 (Coronavirus) appeared first on Palo Alto Networks…
How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins
Prisma Cloud has many DevOps plugins to detect insecure configurations in IaC templates and vulnerabilities in container images. The post How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins appeared first on Palo Alto Networks Blog. Advertise…
4 Steps to Reduce IoT Risk in Your Enterprise
As IoT devices surge on corporate networks, there are some steps organizations can take immediately to reduce exposure to IoT-initiated attacks. The post 4 Steps to Reduce IoT Risk in Your Enterprise appeared first on Palo Alto Networks Blog. …
Our March 6 COVID-19 Guidance for Palo Alto Networks Employees
Palo Alto Networks’ global crisis management team is closely monitoring the COVID-19 outbreak with regional teams and taking action to mitigate risks to our people and business. CEO and Chairman Nikesh Arora … The post Our March 6 COVID-19 Guidance…
Busted by Cortex XDR: Network Traffic Analysis in Action
Attackers made it past this large pharmaceutical company’s endpoint agents, only to be “Busted by Cortex XDR” and its network traffic analysis. The post Busted by Cortex XDR: Network Traffic Analysis in Action appeared first on Palo Alto Networks Blog.…
Breaking Down Silos with DevSecOps
As IT and Development work at greater speeds, Security needs resources to keep up. Adopting DevSecOps and the right tools is the way. The post Breaking Down Silos with DevSecOps appeared first on Palo Alto Networks Blog. Advertise on…
Why Proxy-Based Firewalls Are Not Enough
Can proxy-based firewalls really help keep users safe? We examine some of the drawbacks that prevent them from being effective security tools. The post Why Proxy-Based Firewalls Are Not Enough appeared first on Palo Alto Networks Blog. Advertise on…
Securing Serverless Applications with Prisma Cloud
Learn what security teams need to change for serverless computing, and how Prisma Cloud can help. The post Securing Serverless Applications with Prisma Cloud appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete…
Book Review: “The Perfect Weapon”
“The Perfect Weapon” will help you understand the cyber activities of governments, industry, criminals and the blurry mixtures of these groups. The post Book Review: “The Perfect Weapon” appeared first on Palo Alto Networks Blog. Advertise on IT Security…
Book Review: “No Place to Hide”
“No Place to Hide” will make you question data privacy law and ponder what’s to come with even more sophisticated data collection and analysis. The post Book Review: “No Place to Hide” appeared first on Palo Alto Networks Blog. …
5 Cybersecurity Issues to Address in the Asia-Pacific Region
Major cybersecurity issues on the horizon for the Asia-Pacific region include 5G security, addressing the talent shortage and navigating IoT security. The post 5 Cybersecurity Issues to Address in the Asia-Pacific Region appeared first on Palo Alto Networks Blog. …
Book Review: “CISO Compass”
“CISO Compass” includes insights into many topics important to cybersecurity professionals, covering technologies, regulations and soft skills. The post Book Review: “CISO Compass” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete article:…
Deepfakes Extend the Concept of “Fake News,” and They’re Here to Stay
Hany Farid, Ph.D., who spoke at The Palo Alto Networks Experience during RSA 2020, gives recommendations for how to address the problem of deepfakes. The post Deepfakes Extend the Concept of “Fake News,” and They’re Here to Stay appeared first…
RSAC Day Three – Highlights from Social Media
Palo Alto Networks happenings for RSAC day three included branded socks, free coffee and a talk from digital forensics expert Hany Farid on deepfakes. The post RSAC Day Three – Highlights from Social Media appeared first on Palo Alto Networks…
Book Review: “Digital Resilience”
“Digital Resilience” explains how cybersecurity professionals must balance people, processes and technologies – and communicate with management. The post Book Review: “Digital Resilience” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete article:…
RSAC Day Two – Highlights from Social Media
RSAC day two included a talk from Palo Alto Networks co-founder and CTO Nir Zuk. Sheryl Crow performed at the Palo Alto Networks Experience. The post RSAC Day Two – Highlights from Social Media appeared first on Palo Alto Networks…
The Role of Identity Access Management (IAM) in Cloud Security
Cloud providers offer many services. You need to govern and secure many of them with identity and access management (IAM). Here’s how. The post The Role of Identity Access Management (IAM) in Cloud Security appeared first on Palo Alto Networks…
Cortex XDR Earns “AA” Rating on NSS Labs 2020 AEP Test
NSS Labs’ Advanced Endpoint Protection Test put leading endpoint security products through 45,000 attack test cases across all tested products. The post Cortex XDR Earns “AA” Rating on NSS Labs 2020 AEP Test appeared first on Palo Alto Networks Blog.…
Google Chronicle Integrates with Cortex XSOAR
Users can combine Google Chronicle’s real-time threat detection capability with the security orchestration and automation features of Cortex XSOAR. The post Google Chronicle Integrates with Cortex XSOAR appeared first on Palo Alto Networks Blog. Advertise on IT Security News.…
Redefining Security Orchestration and Automation with Cortex XSOAR
Cortex XSOAR is an evolution of Demisto, continuing our tradition of raising the bar for the security orchestration, automation and response category The post Redefining Security Orchestration and Automation with Cortex XSOAR appeared first on Palo Alto Networks Blog. …
The Cortex XSOAR Ecosystem is Exploding with Partner-Owned Integrations
The Cortex XSOAR ecosystem has 360+ integrations with third-party tools, and now technical partners can submit and support their own offerings. The post The Cortex XSOAR Ecosystem is Exploding with Partner-Owned Integrations appeared first on Palo Alto Networks Blog. …
How to Use a Firewall for Network Traffic Analysis and Behavioral Detection
Network traffic analysis is a key capability of Cortex XDR, and it works with next-generation firewall logs from multiple vendors. The post How to Use a Firewall for Network Traffic Analysis and Behavioral Detection appeared first on Palo Alto Networks…
What’s it Like Being a Woman in Cybersecurity?
As a woman in cybersecurity, I see how much the industry benefits from out-of-the-box thinking, fueled by talented people from different backgrounds. The post What’s it Like Being a Woman in Cybersecurity? appeared first on Palo Alto Networks Blog. …
The Three T’s of Shift Left Security
If your strategy for shift left security is just more work, you won’t improve dev productivity, joy or flow. Learn the three components you need. The post The Three T’s of Shift Left Security appeared first on Palo Alto Networks…
What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020
Based on submissions cybersecurity experts submitted for the RSA Conference 2020, deep fakes, stalkerware, DevOps and more are key industry concerns. The post What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020 appeared first on Palo Alto…
Book Review: “Cyber Smart”
“Cyber Smart” presents a well-balanced combination of cyber threats and smart practices that the non-expert can understand and implement. The post Book Review: “Cyber Smart” appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the…
Securing the Software Development Supply Chain
The software development supply chain isn’t all that different from the one that gives us bread. Learn how it works—and how to protect it. The post Securing the Software Development Supply Chain appeared first on Palo Alto Networks Blog. …
Tapping the True Potential of the 5G Digital Economy
With increasing attention to 5G, it’s a perfect time to lay out our vision of the future of the 5G digital economy. The post Tapping the True Potential of the 5G Digital Economy appeared first on Palo Alto Networks Blog.…
Holistic SDN Security Makes Security Comprehensive Everywhere
Virtual firewalls safeguard SDN platforms like NSX to secure trust zones, boundaries, and microsegmentation for security that spans environments. The post Holistic SDN Security Makes Security Comprehensive Everywhere appeared first on Palo Alto Networks Blog. Advertise on IT Security…
Cloud Native Security Beyond Your Vendor’s Tools
Cloud service providers don’t protect the entire stack. Learn what cloud native security looks like from the user’s perspective. The post Cloud Native Security Beyond Your Vendor’s Tools appeared first on Palo Alto Networks Blog. Advertise on IT Security…
Palo Alto Networks Executives Recognized as CRN Channel Chiefs
CRN has recognized three Palo Alto Networks executives in its annual list of the top 50 vendor executives who continually demonstrate exemplary leadership, influence, innovation and growth for the IT channel. The post Palo Alto Networks Executives Recognized as CRN…
The Future of the Cloud Native Security Platform: Q&A with John Morello
John Morello, VP of product, Prisma Cloud Compute Edition, shares his thoughts on the Cloud Native Security Platform and previews the Cloud Native Security Summit. The post The Future of the Cloud Native Security Platform: Q&A with John Morello appeared…
The Cloud’s Sunny Future: The Rewards of Working in Cloud Security
Working in cloud security at Palo Alto Networks is the best of both worlds: the stability of a major corporation that still operates like a startup. The post The Cloud’s Sunny Future: The Rewards of Working in Cloud Security appeared…
Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features
The Community Access edition of Cortex XDR Managed Threat Hunting is a powerful threat hunting service exclusively for our Cortex XDR customers. The post Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features appeared first on Palo Alto…
The Road to 100 on the HRC’s 2020 Corporate Equality Index
Our progress with the HRC’s Corporate Equality Index mirrors progress our company has made in our broader Inclusion & Diversity (I&D) efforts. The post The Road to 100 on the HRC’s 2020 Corporate Equality Index appeared first on Palo Alto…
Book Review: “The Fifth Domain”
“The Fifth Domain” is a “must read” for not only every cybersecurity professional, but also every global citizen with an interest in the digital age. The post Book Review: “The Fifth Domain” appeared first on Palo Alto Networks Blog. …
Earn Beacon Gold While Becoming a Ninja at Using Our Products
The Beacon digital learning platform makes it easy to expand your cybersecurity skills – and now users can earn Beacon Gold for completing activities. The post Earn Beacon Gold While Becoming a Ninja at Using Our Products appeared first on…
Data Security for the Future: DLP and Secure Access Service Edge
DLP provides visibility across sensitive information, enabling strong protective actions to safeguard data from threats and policy violations. The post Data Security for the Future: DLP and Secure Access Service Edge appeared first on Palo Alto Networks Blog. Advertise…
Book Review: Cult of the Dead Cow
“Cult of the Dead Cow” by Joseph Menn not only covers fascinating cybersecurity history – it’s also a call to change today’s “Big Tech” thinking. The post Book Review: Cult of the Dead Cow appeared first on Palo Alto Networks…
Navigating Federal Data Protection Compliance Requirements in the Cloud
A primer on federal data protection compliance and proper configuration for using cloud services for data related to work with the federal government. The post Navigating Federal Data Protection Compliance Requirements in the Cloud appeared first on Palo Alto Networks…
3 Observations About Leadership in an Age of Digital Transformation
Strong digital leadership calls for cultivating innovation and agility, or we risk paving the way for newcomers to disrupt our business models. The post 3 Observations About Leadership in an Age of Digital Transformation appeared first on Palo Alto Networks…
3 Tools for K-12 Cybersecurity: Keeping Students and Schools Safe in a Digital World
Our suggestions for K-12 cybersecurity include interactive learning, best practices for configuration and resources for securing E-rate funding. The post 3 Tools for K-12 Cybersecurity: Keeping Students and Schools Safe in a Digital World appeared first on Palo Alto Networks…
Cybersecurity Canon Candidate Book Review: Code Girls: The Untold Story of the American Women Code Breakers of World War II
“Code Girls” explores the largely unrecognized contributions of the first women to officially serve as part of U.S. code breaking efforts. The post Cybersecurity Canon Candidate Book Review: Code Girls: The Untold Story of the American Women Code Breakers of…
5 Straight Years of Delighting Our Customers with Outstanding Customer Support
J.D. Power and the Technology Services Industry Association have certified Palo Alto Networks for Rated Outstanding Assisted Support 2015-2019. The post 5 Straight Years of Delighting Our Customers with Outstanding Customer Support appeared first on Palo Alto Networks Blog. …
3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things
Your employees often don’t get to focus on the activities for which they provide unique value. The solution? Implementing better SecOps strategies. The post 3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things appeared first on…
SC Media Names Prisma Cloud an Industry Innovator
Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog. Advertise on…
SC Media Names Prisma Cloud an Industry Innovator
Prisma Cloud’s advanced features, such as automated remediation and detailed forensics, have led to our recognition as an industry innovator. The post SC Media Names Prisma Cloud an Industry Innovator appeared first on Palo Alto Networks Blog. Advertise on…
Getting Cloud Smart: Security for Hybrid and Public Federal Clouds
Prisma Cloud has been added to Palo Alto Networks Government Cloud Services, increasing our security offerings for hybrid and public federal clouds. The post Getting Cloud Smart: Security for Hybrid and Public Federal Clouds appeared first on Palo Alto Networks…
Your SaaS Security Checklist
A brief overview of SaaS security considerations, useful when evaluating SaaS applications to deploy within your organization. The post Your SaaS Security Checklist appeared first on Palo Alto Networks Blog. Advertise on IT Security News. Read the complete article:…
Do Your SOC Metrics Incentivize Bad Behavior?
Many security operations center (SOC) metrics – even some of the most popular ones – have the potential to drive poor behavior. The post Do Your SOC Metrics Incentivize Bad Behavior? appeared first on Palo Alto Networks Blog. Advertise…
Why Cloud Security Seems So Hard, and How to Overcome These Challenges
Exploring why cloud security and compliance seem so hard will show why organizations need to build holistic cloud security programs. The post Why Cloud Security Seems So Hard, and How to Overcome These Challenges appeared first on Palo Alto Networks…
Harnessing the Power of User and Entity Behavior Analytics (UEBA) for Cloud Security
Why a user and entity behavior analytics (UEBA) engine is essential for cloud security, and where to start if you don’t have it deployed. The post Harnessing the Power of User and Entity Behavior Analytics (UEBA) for Cloud Security appeared…
Prisma SaaS: An Octopus That Secures App Ecosystems
Learn why Prisma SaaS, with its sophisticated sensing capabilities, is a handy friend to have monitoring your application ecosystem. The post Prisma SaaS: An Octopus That Secures App Ecosystems appeared first on Palo Alto Networks Blog. Advertise on IT…
The Six Pillars of Effective Security Operations
Take a step back and do an honest evaluation of how your security operations are structured and how they’re serving your business goals. The post The Six Pillars of Effective Security Operations appeared first on Palo Alto Networks Blog. …
Zero Trust Network Access: Build Your SASE on a Solid Foundation
Prisma Access is based on the key zero trust network access principles, extending them across all the services within a SASE solution. The post Zero Trust Network Access: Build Your SASE on a Solid Foundation appeared first on Palo Alto…
Improve How You Enforce Security Policies with the Panorama Plugin for Cisco TrustSec
Since our commitment is to provide the best security possible, we designed our Panorama plugin for security in heterogeneous environments. The post Improve How You Enforce Security Policies with the Panorama Plugin for Cisco TrustSec appeared first on Palo Alto…
Cybersecurity Canon Candidate Book Review: Tribe of Hackers
“Tribe of Hackers,” by Marcus J. Carey and Jennifer Jin, is not just about the cybersecurity community; it is a gift to the cybersecurity community! The post Cybersecurity Canon Candidate Book Review: Tribe of Hackers appeared first on Palo Alto…
9 Cybersecurity Predictions for Europe, the Middle East and Africa in 2020
Our 2020 cybersecurity predictions for EMEA include consideration of upcoming challenges and opportunities in AI, cloud security, 5G and more. The post 9 Cybersecurity Predictions for Europe, the Middle East and Africa in 2020 appeared first on Palo Alto Networks…