Master Cloud Computing Risks with a Proactive, End-to-End Approach

Fast, frictionless, proactive and cost-competitive. These guiding principles have provided a foundation for Accenture’s public cloud security offerings since they were introduced in 2018. It’s long been mission-critical for both Accenture Security and Palo Alto Networks to empower security teams to deliver value to organizations by helping clear roadblocks and accelerate progress.

With the release of the Prisma® Cloud Darwin update, Palo Alto Networks dramatically simplifies risk...

Dec 07, 2023

Corporate Blogs

Master Cloud Computing Risks with a Proactive, End-to-End Approach
Fast, frictionless, proactive and cost-competitive. These guiding principles have provided a foundation for Accenture’s public cloud security offering...
Dec 07, 2023
This Is How We Do It — Season One Recap
Our blog and video series, “This is How We Do It,” offers a behind-the-scenes, candid exposé of how Palo Alto Networks protects its security operations center (SOC) using its own solutions. This series provides insights into...
Nov 09, 2023
Outmatch Adversaries with PAN-OS 11.1 Cosmos & Strata Cloud Manager
Today’s organizations need complete protection against new and existing threats. A proliferation of data and devices has been matched b...
Nov 08, 2023
Testing the Limits of Firewall Performance and Flexibility
Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat...
Nov 08, 2023
Prisma® SASE and Talon to Secure the Rising Risk of Unmanaged Devices
Modern organizations rely on a variety of workers, from full-time employees to contractors, to move their business forward. A recent st...
Nov 06, 2023
Navigating the Complex Threat Landscape — Key Takeaways for CISOs
Well, it looks like we cybersecurity defenders won’t be getting a break any time soon. Unit 42 consultants and intelligence analysts ha...
Nov 02, 2023
Navigating Cybersecurity in a Social-First Campaign
Introducing, “Cyber Talks” – our collection of videos that distill complex cybersecurity topics into simple to understand videos. Inspired by everyday life and the talk, because ba...
Oct 31, 2023
Palo Alto Networks + Dig Security
The digital landscape is undergoing a profound shift. Cloud native transformation and the fast pace of application development, driven by advances in generative AI, have led to a significant rise in data sprawl. As many large...
Oct 31, 2023

Network Security Blogs

Palo Alto Networks Outperforms Against Cobalt Strike Attacks
Palo Alto Networks is the leading vendor in preventing Cobalt Strike C2 communication. According to the recently published report by SecureIQlab, Palo Alto Networks is the only lea...
Nov 15, 2023
Palo Alto Networks Paves the Way with New OT Security Innovations
Earlier this year, Palo Alto Networks launched Zero Trust OT Security, a solution to help industrial asset owners and operators keep their operational...
Nov 29, 2023
Harden SaaS App Security Posture with SSPM
As enterprises have moved their data assets to the cloud, they depend on SaaS applications to conduct their business. Today, SaaS apps have evolved to become highly customizable, increasing the risk of misconfi...
Nov 14, 2023
Outmatch Adversaries with PAN-OS 11.1 Cosmos & Strata Cloud Manager
Today’s organizations need complete protection against new and existing threats. A proliferation of data and devices has been matched by increasingly...
Nov 08, 2023
Testing the Limits of Firewall Performance and Flexibility
Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat actors are evol...
Nov 08, 2023
Palo Alto Networks Medical IoT Security Named LEADER in Frost RADAR™
We are thrilled to announce that Palo Alto Networks' Medical IoT Security has been recognized as a LEADER in the inaugural Frost RADAR on Healthcare IoT Security. This recognition...
Nov 01, 2023
Always Innovating: Data Security for Enterprises
Welcome to the October 2023 edition of “Always Innovating in Network Security." This month, we dive deep into the innovations in Data Security through our Enterprise DLP solution. Safeguarding data stands at th...
Oct 27, 2023
ICS ‘23: Building cyber resilience through IT-OT security convergence
We face an unprecedented amount of change for industrial control systems/operational technology (ICS/OT) as IT, OT and AI all converge. This is an inflection point that supercharge...
Oct 16, 2023

SASE Blogs

Why Traditional DLP Fails to Protect Your Most Sensitive Data
Safeguarding your business's unique data is more crucial than ever. Traditional Data Loss Prevention (DLP) systems are struggling to keep up. Here’s a...
Dec 06, 2023
You vibe with SASE now—but are you ready for a long-term relationship?
The modern digital landscape is ever-evolving. This means that you don’t only need a robust approach to your security, but you must als...
Dec 05, 2023
Palo Alto Networks Natively Integrates RBI with SASE
Organizations must be able to absorb economic stress, recover quickly, and adjust to changing business circumstances to be successful....
Nov 29, 2023
Introducing Security for Interconnected SaaS
The rise of heavily interconnected SaaS applications has brought forward new challenges for enterprise security. As ease of integration...
Nov 28, 2023
SASE Converge ‘23 Showcases the Potential and Impact of AI-Powered SASE
The strong force of distributed resources is shaping today’s organizations – workers are h...
Nov 14, 2023
Harden SaaS App Security Posture with SSPM
As enterprises have moved their data assets to the cloud, they depend on SaaS applications to conduct their business. Today, SaaS apps have evolved to become highly customizable, i...
Nov 14, 2023
Prisma® SASE and Talon to Secure the Rising Risk of Unmanaged Devices
Modern organizations rely on a variety of workers, from full-time employees to contractors, to move their business forward. A recent st...
Nov 06, 2023
Seamless Branch to Cloud Connectivity: Prisma SD-WAN & AWS Cloud WAN
Palo Alto Networks has expanded its partnership with Amazon Web Services (AWS) by integrat...
Oct 31, 2023

Cloud Native Security Blogs

Master Cloud Computing Risks with a Proactive, End-to-End Approach
Fast, frictionless, proactive and cost-competitive. These guiding principles have provided a foundation for Accenture’s public cloud security offering...
Dec 07, 2023
Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashboards
For security professionals inundated with alerts and metrics, the one-size-fits-all approach to data monitoring and threat assessment leaves much to b...
Dec 05, 2023
Implement Zero Trust with Just-in-Time Access
Rapid migration to cloud services presents organizations with new security challenges. A common issue security teams encounter is the excessive granting of privileges to both user...
Nov 30, 2023
API Discovery Made Simple
Real-time APIs will execute more than 50% of all B2B transactions by the end of 2023,1 according to projections from the research firm, Gartner®. In addition to marking a pivotal shift in how organizations inte...
Nov 28, 2023
Enhanced Least-Privilege Recommendations from Prisma Cloud and AWS
Prisma Cloud’s integration with AWS Identity and Access Management (IAM) Access Analyzer provides users with accurate least-privileged access recommendations.
Nov 27, 2023
Designing Prisma Cloud to See Beyond
Throughout the hundreds of hours I spent meeting with customers, sales teams, and internal users of Prisma Cloud, I was struck by the complexity of feedback I received. Soon into the process, a few key themes emerged. Each theme centered on the user experience of the pr...
Nov 21, 2023
Abuse and Mitigation of Misconfigured SAS Tokens
An AI research team recently made a massive mistake when they published a bucket of open-source training data on GitHub that included terabytes of additional private data. This data contained a disk backup of e...
Nov 20, 2023
Critical Vulnerability in Confluence Data Center and Server CVE-2023-22515
In the dynamic realm of cybersecurity, certain vulnerabilities capture more attention than others. One such flaw is CVE-2023-22515, which affects the...
Nov 17, 2023

Security Operations Blogs

Bootstrap Your Threat Intel Management Program With Free Feeds and IOC Enrichers
Getting your threat intel management (TIM) program up and running might seem like a daunting task. Picking the right feeds and enrichers can be challe...
Dec 07, 2023
XSOAR Comes Up as the Leader in SOAR Comparisons
Reviews have become an integral part of our decision-making processes. From choosing gadgets and cars to selecting a trendy restaurant, we heavily rely on reviews in both our personal and professional lives. However, when it...
Nov 29, 2023
XSIAM 2.0: Continuing to Drive SOC Transformation
Security teams have an important and difficult job – protecting their organizations from a threat landscape that is constantly changing...
Nov 13, 2023
Playbook of the Week: Streamlining the management of XDR Incidents
The new Cortex XDR Lite - Incident Handling playbook is a new addition to the Palo Alto Networks Cortex XDR - Investigation and Respons...
Nov 09, 2023
This Is How We Do It — Season One Recap
Our blog and video series, “This is How We Do It,” offers a behind-the-scenes, candid exposé of how Palo Alto Networks protects its security operations center (SOC) using its own solutions. This series provides insights into...
Nov 09, 2023
Cortex XSIAM: A Leader and Outperformer in GigaOm Radar on Autonomous SOC
When Cortex XSIAM was released in October 2022, we set out to solve the core problem that SOC’s are facing - it takes too long to detec...
Nov 08, 2023
Earlier this year we announced our software as a service (SaaS) offering with the Cortex XSOAR 8 release. XSOAR 8 offers the benefits of tight integration with the industry-leading Cortex platform and its other cybersecurity...
Oct 30, 2023
Playbook of the Week: Unleash the Power of Identity Threat Intelligence with Automation
When it comes to detecting identity-related threats, security teams need to distinguish between suspicious but benign activity and truly malicious activity. This can be challenging...
Oct 24, 2023

Unit 42 Threat Research

company article
In three campaigns over the past 20 months, Russian APT Fighting Ursa has targeted over 30 organizations of likely strategic intelligence value using CVE-2023-2...
December 7, 2023
By  Unit 42
company article
A new toolset comprised of malware (Agent Raccoon and Ntospy) and a custom version of Mimikatz (Mimilite) was used to target organizations in the U.S., Middle E...
December 1, 2023
company article
A security risk discovered in the Google Cloud Platform domain-wide delegation feature allows a user to generate an access token to Google Workspace, granting u...
November 30, 2023
company article
Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage....
November 21, 2023
By  Unit 42
company article
We observed three Stately Taurus campaigns targeting entities South Pacific entities with malware, including the Philippines government....
November 17, 2023
By  Unit 42
company article
In July 2023, pro-Russian APT Storm-0978 targeted support for Ukrainian NATO admission with an exploit chain. Analysis of it reveals the new CVE-2023-36584....
company article
Clickbait articles are highlighted in this article. A jump in compromised sites exploiting CVE-2023-3169 stresses the danger of web-based threats....
company article
Cambodian government entities were targeted by a Chinese APT masquerading as cloud backup services. Our findings include C2 infrastructure and more. ...
November 7, 2023
By  Unit 42

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.