Article

Security Models of Tomorrow for Work from Anywhere

In the early spring of 2020, as the world shifted to work remotely, security models used by many organizations were put to the test.

By Sean Duca

Read more
Managing the Cyber Time Paradox
VIDEO

Managing the Cyber Time Paradox

What is the "cyber time paradox"? Listen as EMEA CSO, Greg Day, shares his unique perspective on a growing business issue.

Watch
quote icon
The time for assessing what works, what doesn’t, and what’s next is here.
Jason Georgi
Jason Georgi
Field CTO, Prisma Access
Read more
5 Security Questions Boards Need to Address Post-COVID
Article

5 Security Questions Boards Need to Address Post-COVID

The post-pandemic period will be the time when companies move beyond just resilience to focus on the things that drive successful outcomes and innovation as the global economy recovers—and from now on managing risk will be a vital component of that.

By Haider Pasha

Read more
impact of pandemic
REPORT

The Impact of the Pandemic on Cloud Security

Unit 42 shares insights on COVID-19’s impact on the cloud threat landscape.

Read more
AutoNation
CUSTOMER CASE STUDY

AutoNation drives high performance and millions in savings with Palo Alto Networks Prisma SD-WAN

See how unparalleled bandwidth goes a long way toward growing the business for the US’s largest automobile retailer.

Learn more
software based approach
Article

Things to Do Now to Ensure Your Cloud Posture and Preparedness

Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that have to be managed.

Read more
sd-wan
ARTICLE

Why Secure SD-WAN Should Be Delivered From the Cloud

SD-WAN isn’t just about network access. It’s a pathway toward digital transformation.

By Kumar Ramachandran

Read more
quote icon
To properly leverage machine learning and automation, a single-vendor platform is key.
Nir Zuk
Nir Zuk
Founder and CTO
Read Nir’s POV
Extracting Greater Value from the Data You Have
Article

Extracting Greater Value from the Data You Have

Collecting data and having the right people, process and technology, help improve cybersecurity outcomes.

By Sean Duca

Learn how
Keys to Building
ARTICLE

Keys to Building a Successful Cloud Security Strategy

Securing workloads in the cloud is not the same as securing workloads on-premises.

By Matt Chiodi

Read more
Expanding IoT Visibility Without Increasing Burden
Article

Expanding IoT Visibility Without Increasing Burden

98% of IoT device traffic is unencrypted, but that doesn’t mean IoT has to be a security risk.

By Anand Oswald

Read more
things to do
Article

Managing Risks and Resources to Lower Your Cybersecurity TCO

For most organizations, determining total cost of ownership (TCO) for cybersecurity is no easy task.

By Andy Elder

Read more
eliminating weekend war
article

Eliminating Weekend War Rooms - The Shift from Reactive to Proactive Security Operations

By M.K. Palmore

Read more
making shift
Article

Shifting Your Organizations Mindset to Work Well With Developers

By Ashley Ward

Read more
OTHER THOUGHT LEADERS
innovations
SECURITY ROUNDTABLE

2 Innovations That Can Tip the Balance in Cybersecurity

How these two key innovations can help level the playing field.

Read more
implementing zero trust
VIDEO

Implementing Zero Trust Throughout your Infrastructure

Moving beyond the buzzword to a practical implementation of Zero Trust.

Watch
talent shortage
SECURITY ROUNDTABLE

How Can CISOs Tackle the SOC Talent Shortage?

Modernizing your SOC can make all the difference to your processes and your people.

Read more
quote
The @Unit42_Intel Cloud Threat Report finds cryptojacking affects at least 23% of organizations globally. Check out the risk factors.
FROM THE BLOG
BLOG

Building Your Cybersecurity Team: A Generalist’s Point of View

How a surprising skill set may define the next generation of cybersecurity professionals.

Read more
BLOG

The Ransomware Threat: Bigger, Greedier, Attacking the Most Vulnerable

Learn more about how Unit 42 can help thwart vicious ransomware attacks.

Read more
BLOG

Networks Are Becoming Cloud-centric. Network Security Must Adapt.

How network security is evolving to support our increasingly digital businesses.

Read more
50 Expert Viewpoints.
1 Cybersecurity Guide.
Get the e-book today