We spent much of 2020 moving heaven and earth to enable “remote everything” - from work, government and healthcare to education, fitness and entertainment. Shelter-in-place orders and travel restrictions imposed in early 2020 forced enterprises to quickly revamp their IT operations to provide remote access to employees, partners and customers.
Cybersecurity stocks moved higher Friday morning on concerns that the suspected Russian hack could be far worse than feared. Microsoft called it a “moment of reckoning” which requires a “strong and coordinated global cybersecurity response.”
As digital transformation and COVID-19 rapidly shift users, devices, applications, services and data outside of the enterprise data center, here’s a look at 25 vendors capable of securing the Edge of tomorrow.
The 10 cybersecurity products making noise in the market have emphasized workflow automation, downtime minimization and incident remediation to better safeguard endpoints, mobile devices, OT environments and containers.
The recent surge in Egregor ransomware activity inspired Palo Alto’s Unit 42 to create a full visualization of the techniques used by the attack group and the relevant courses of action security teams can take to respond.
The Unit 42 research arm of Palo Alto Networks has published a report detailing how 22 application programming interfaces (APIs) across 16 different Amazon Web Services (AWS) platforms can be abused by cybercriminals to surface the identities of the members of the IT team that created them.
A pair of Baidu applications on the Google Play Store were recently leaking users’ sensitive data that could be used to track users’ location, according to Palo Alto Networks’ Unit 42 research published Tuesday.
Several apps available on the Google Play Store, including two made by Chinese Internet giant Baidu, leaked information about the phone's hardware and location without the user's knowledge, research finds.
Palo Alto Networks today introduced the industry’s first 5G-native security offering, bringing its expertise in securing networks, clouds and devices to the 5G world. This new offering enables service providers and enterprises to turn 5G networks into highly secure networks.
Knowing exactly who manages a certain cloud service can be valuable information for malicious hackers, and a cybersecurity company says it has found that kind of weakness in products run by one of the biggest cloud providers.