Article

Securing Your Cloud Supply Chain

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions— Cyber Risk Exposure

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions—Cyber Risk Mitigation Plan

Read more
Article

Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

Artificial intelligence (AI) and machine learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in service of their goals.

By Matt Kraning

Read more
Article

Connectivity and Cloud: A Chance for Zero Trust

Advice on how moving to the cloud provides new opportunities to create Zero Trust architectures.

By Sergej Epp

Read more
Article

The Evolution of Enterprise Data Security

By Mario Espinoza

Learn more
Article

Security Models of Tomorrow for Work from Anywhere

By Sean Duca

Read more
Article

5 Cybersecurity Questions Boards Need to Address in COVID Era

By Haider Pasha

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions—Cyber Due Diligence

By LeeAnne Pelzer

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions— Regulatory Compliance Requirements

By LeeAnne Pelzer

Read more
Article

Doing More with Less: The Case for SOC Consolidation

By Niall Browne

Read more
Article

Advice on Establishing Trust with Your Board

By David Faraone

Read more
Beyond the Cyber Buzzwords

What Executives Should Know About Zero Trust

By Zachary Malone

Read more
Beyond the Cyber Buzzwords

What Executives Should Know About SASE

By Zachary Malone

Read more
quote icon
The time for assessing what works, what doesn’t, and what’s next is here.
Jason Georgi
Field CTO, Prisma Access
Read more
CUSTOMER CASE STUDY

AutoNation drives high performance and millions in savings with Palo Alto Networks Prisma SD-WAN

See how unparalleled bandwidth goes a long way toward growing the business for the US’s largest automobile retailer.

Learn more
Article

Things to Do Now to Ensure Your Cloud Posture and Preparedness

Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that have to be managed.

Read more
Article

Why Secure SD-WAN Should Be Delivered From the Cloud

SD-WAN isn’t just about network access. It’s a pathway toward digital transformation.

By Kumar Ramachandran

Read more
quote icon
To properly leverage machine learning and automation, a single-vendor platform is key.
Nir Zuk
Founder and CTO
Read Nir’s POV
Article

Extracting Greater Value from the Data You Have

Collecting data and having the right people, process and technology, help improve cybersecurity outcomes.

By Sean Duca

Learn how
Article

Keys to Building a Successful Cloud Security Strategy

Securing workloads in the cloud is not the same as securing workloads on-premises.

By Matt Chiodi

Read more
Article

Expanding IoT Visibility Without Increasing Burden

98% of IoT device traffic is unencrypted, but that doesn’t mean IoT has to be a security risk.

By Anand Oswald

Read more
OTHER THOUGHT LEADERS
innovations
SECURITY ROUNDTABLE

2 Innovations That Can Tip the Balance in Cybersecurity

How these two key innovations can help level the playing field.

Read more
implementing zero trust
VIDEO

Implementing Zero Trust Throughout your Infrastructure

Moving beyond the buzzword to a practical implementation of Zero Trust.

Watch
talent shortage
SECURITY ROUNDTABLE

How Can CISOs Tackle the SOC Talent Shortage?

Modernizing your SOC can make all the difference to your processes and your people.

Read more
quote
The @Unit42_Intel Cloud Threat Report finds cryptojacking affects at least 23% of organizations globally. Check out the risk factors.
FROM THE BLOG
BLOG

2022 Predictions for Hybrid Work

Insights into what to expect in hybrid work for 2022.

Read more
BLOG

The Ransomware Threat: Bigger, Greedier, Attacking the Most Vulnerable

Learn more about how Unit 42 can help thwart vicious ransomware attacks.

Read more
BLOG

Networks Are Becoming Cloud-centric. Network Security Must Adapt.

How network security is evolving to support our increasingly digital businesses.

Read more
50 Expert Viewpoints.
1 Cybersecurity Guide.
Get the e-book today