Article

Managing Risks and Resources to Lower Your Cybersecurity TCO

The role vendors, people and time have in lowering cybersecurity TCO.
By Andy Elder

For most organizations, determining total cost of ownership (TCO) for cybersecurity is no easy task. In fact, lowering cybersecurity costs while simultaneously reducing risks can be even harder. However, there is a way forward for leaders who are working to optimize their investments—and it’s all about managing risks, resources and time.

Read more
Article

Expanding IoT Visibility Without Increasing Burden

98% of IoT device traffic is unencrypted, but that doesn’t mean IoT has to be a security risk.

By Anand Oswald

Read more
ransomware ready unit42
THREAT INTEL

Get Ransomware-Ready with Unit 42

Prepare your people, processes and technologies to mitigate ransomware threats.

Learn how
impact of pandemic
REPORT

The Impact of the Pandemic on Cloud Security

Unit 42 shares insights on COVID-19’s impact on the cloud threat landscape.

Read more
AutoNation
CUSTOMER CASE STUDY

AutoNation drives high performance and millions in savings with Palo Alto Networks Prisma SD-WAN

See how unparalleled bandwidth goes a long way toward growing the business for the US’s largest automobile retailer.

Learn more
software based approach
REPORT

Revisiting A Software-Based Approach To Network Security

Analyst firm ESG shares insight on how virtual and containerized firewalls can support the adoption of hybrid, multi-cloud environments

Read more
sd-wan
ARTICLE

Why Secure SD-WAN Should Be Delivered From the Cloud

SD-WAN isn’t just about network access. It’s a pathway toward digital transformation.

By Kumar Ramachandran

Read more
quote icon
To properly leverage machine learning and automation, a single-vendor platform is key.
Nir Zuk
Nir Zuk
Founder and CTO
Read Nir’s POV
cyber time paradox
Video

Managing the Cyber Time Paradox

What is the "cyber time paradox"? Listen as EMEA CSO, Greg Day, shares his unique perspective on a growing business issue.

Watch
Keys to Building
ARTICLE

Keys to Building a Successful Cloud Security Strategy

Securing workloads in the cloud is not the same as securing workloads on-premises.

By Matt Chiodi

Read more
best practices
video

Supply Chain Best Practices

Sergej Epp shares five things every business leader should know about supply chain security.

Watch
things to do
Article

Things to Do Now to Ensure Your Cloud Posture and Preparedness

Cloud strategy is a top priority for nearly every organization today.

By Vinay Venkataraghavan

Read more
eliminating weekend war
article

Eliminating Weekend War Rooms - The Shift from Reactive to Proactive Security Operations

By M.K. Palmore

Read more
making shift
Article

Shifting Your Organizations Mindset to Work Well With Developers

By Ashley Ward

Read more
forrester tei
REPORT

The Total Economic Impact™ of Palo Alto Networks Prisma Cloud

Take an in-depth look at the study to see how Forrester calculated the cost savings and business benefits enabled by Prisma Cloud.

Learn more
OTHER THOUGHT LEADERS
innovations
SECURITY ROUNDTABLE

2 Innovations That Can Tip the Balance in Cybersecurity

How these two key innovations can help level the playing field.

Read more
implementing zero trust
VIDEO

Implementing Zero Trust Throughout your Infrastructure

Moving beyond the buzzword to a practical implementation of Zero Trust.

Watch
talent shortage
SECURITY ROUNDTABLE

How Can CISOs Tackle the SOC Talent Shortage?

Modernizing your SOC can make all the difference to your processes and your people.

Read more
quote
The @Unit42_Intel Cloud Threat Report finds cryptojacking affects at least 23% of organizations globally. Check out the risk factors.
FROM THE BLOG
BLOG

Building Your Cybersecurity Team: A Generalist’s Point of View

How a surprising skill set may define the next generation of cybersecurity professionals.

Read more
BLOG

The Ransomware Threat: Bigger, Greedier, Attacking the Most Vulnerable

Learn more about how Unit 42 can help thwart vicious ransomware attacks.

Read more
BLOG

Networks Are Becoming Cloud-centric. Network Security Must Adapt.

How network security is evolving to support our increasingly digital businesses.

Read more
50 Expert Viewpoints.
1 Cybersecurity Guide.
Get the e-book today