Education and Professional Services

Displaying 1 to 30 of 4259

Lightboard Series: Managed Detection and Response (MDR), Powered by Cortex XDR

Check out this video to learn more about our partners' services powered by Cortex XDR.
  • 0

The Most Devastating Attacks and How to Prevent Them

Sign up now to learn the steps you can take to defeat the most dangerous cyber adversaries.
  • 0

Hacking becoming a profession: Palo Alto Networks CEO

Palo Alto Networks CEO Nikesh Arora argues cyber threats will only get worse as there is increasing demand for user data, but that servers are more secure now than they were even a few years ago.
  • 0

U.S. Govt Agency Hit with New CARROTBALL Malware Dropper

A new malware called CARROTBALL, used as a second-stage payload in targeted attacks, was distributed in phishing email attachments delivered to a U.S. government agency and non-US foreign nationals professionally affiliated with current activities in North Korea.
  • 0

Hackers spearphished U.S. government agency with North Korea-related content last year

In the second half of 2019, a U.S. government agency was targeted by repeated spearphishing attempts that could be from a mysterious group that has evaded attribution for years, according to new research issued Thursday by security firm Palo Alto Networks.
  • 0

Internet routers running Tomato are under attack by notorious crime gang

Internet routers running the Tomato alternative firmware are under active attack by a self-propagating exploit that searches for devices using default credentials.
  • 0

U.S. Gov Agency Targeted With Malware-Laced Emails

The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.
  • 0

xHunt Campaign: New Watering Hole Identified for Credential Harvesting

New xHunt campaign activities show a Kuwaiti organization’s webpage used as an apparent watering hole.
Brittany AshRobert Falcone,
  • 0

What Is Cloud Native Security?

Cloud native security refers to tools and practices for managing dynamic application architectures. This summary discusses challenges and possible solutions.
  • 0

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 111
  • 278560

Video: Network Security’s Future Is in the Cloud

Prisma Access, a secure access service edge (SASE) platform, brings together industry-leading security and SD-WAN capabilities in the cloud.
  • 1

Data Center and Hybrid Cloud Security Best Practices

Watch this on-demand webcast, and you’ll learn the simple way to secure modern DCs and hybrid clouds and how to consistently secure all physical and virtual networks and cloud environments.
  • 0

Cortex XDR Endpoint Protection Overview

This paper provides a deeper look at the Cortex XDR agent features, functionality, and technical architecture.
  • 0
  • 90

Federal Government: Multi-Cloud Security, Governance and Compliance

The federal governments will use cloud as a new foundation to build more effective security capabilities across domains - including cyberspace. An explosion of government adoption of public, private, hybrid, and cloud services have introduced new ways to scale and deliver efficient operations across multiple cloud platforms. As federal agencies continue to transition and expand their footprint into the cloud, it is critical to ensure these systems are secure and vulnerabilities are addressed immediately.
  • 0

What Is a Transit Virtual Private Cloud (VPC)?

Transit VPC is an architecture that connects far-flung virtual private clouds (VPCs) or virtual networks (VNETS) to each other and remote networks.
  • 0

The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks

Unit 42 observed several malware families typically associated with the Konni Group primarily targetting a US government agency at the height of the US interacting with North Korea.
Adrian McCabe,
  • 0

Public Cloud as Outsourcing for Financial Services

Read this white paper to learn some common areas of interest shared by financial regulators over public cloud use by financial institutions.
  • 0

What Is Cloud Native?

Cloud native is an approach to designing, deploying and operating apps using cloud service providers. This article explores the relationship in detail.
  • 0

Palo Alto Networks Named a Best Place to Work for LGBTQ Equality

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today proudly announced it received a perfect score on the Human Rights Campaign Foundation's 2020 Corporate Equality Index (CEI)....
Santa Clara, CA
  • 0
  • 246

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
  • 3
  • 1094

Secure Access Service Edge (SASE) Key Requirements

It is important to understand what a Secure Access Service Edge solution encompasses as you look for vendors to help you on your cloud journey.
  • 2
  • 169

What Is SASE?

Secure Access Service Edge or SASE (pronounced sassy), is an emerging concept that Gartner recently described in their The Future of Network Security in the Cloud report, released in August 2019.
  • 2
  • 5484

What Is Cloud Data Protection?

Cloud data protection is the practice of protecting and securing all of a company’s data in a cloud environment, regardless of where that data is located, whether it’s at rest or in motion, or if it’s managed internally by the company or externally by a third party.
  • 2
  • 152

What is Data Loss Prevention (DLP)?

Data loss prevention (DLP) is the practice of protecting and securing a company’s data to prevent it from being lost, stolen, accessed, or misused by unauthorized individuals.
  • 2
  • 2080

Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices

Unit 42 discovered a new variant of the Muhstik botnet that now adds a scanner to attack Tomato routers for the first time by web authentication brute-forcing.
Cong ZhengYang JiAsher Davila,
  • 0

Deployment Guide for Azure - Transit VNet Design Model (Common Firewall Option)

Provides detailed guidance on the requirements and functionality of the Transit VNet design model (common firewall option) and explains how to successfully implement that design model option using Panorama and Palo Alto Networks® VM-Series firewalls on Microsoft Azure.
  • 0
  • 3056

Deployment Guide for Azure – Transit VNet Design Model

This reference document provides detailed guidance on the requirements and functionality of the Transit VNet design model and explains how to successfully implement that design model using Panorama and Palo Alto Networks® VM-Series firewalls on Microsoft Azure.
  • 1
  • 5441

Reference Architecture Guide for Azure

This reference document links the technical design aspects of Microsoft Azure with Palo Alto Networks solutions and then explores several technical design models. The design models include multiple options with all resources in a single VNet to enterprise-level operational environments that span across multiple VNets using a Transit VNet.
  • 3
  • 7405
Displaying 1 to 30 of 4259