Palo Alto Networks Inc. today introduced a new version of its Prisma Cloud cybersecurity platform that incorporates the technologies the company gained through its high-profile series of recent startup acquisitions.
Unit 42, the threat intelligence team at Palo Alto Networks, has released research on a proof of concept for what the company claims might be the most severe Docker copy command (“docker cp”) vulnerability yet to be discovered.
CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 which cybersecurity technologies they're most excited to see come to fruition and how customers and solution providers will benefit.
In the fifty years since our nation responded to an audacious call to put a man on the moon, we’ve come to idealize not just the achievement itself but how it was achieved—against impossible odds and through force of will and collective action.
A new and free cybersecurity training and certification program called Second Watch has been launched today by Palo Alto Networks to help U.S. veterans find new careers in cybersecurity after their military service is over.
Palo Alto Networks is working to keep up with this rapid deployment on the cybersecurity front. Scott Stevens, CTO of the Global Service Providers business at Palo Alto Networks, joined Cheddar to discuss.
Drawing on three years of investigatory work, researchers have assembled a detailed playbook on PKPLUG, a suspected Chinese threat actor targeting Asians with an assortment of malware used for cyber espionage purposes.
In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.