Date

Education and Professional Services

Displaying 1 to 30 of 4270

Palo Alto Networks to Present at Upcoming Investor Conference

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that members of its management team will be presenting at the following financial community event: Morgan Stanley...
Santa Clara, CA
  • 0

Wireshark Tutorial: Examining Qakbot Infections

Brad Duncan is back with a new Wireshark tutorial. This one examines a recent infection of Qakbot (AKA Qbot), which is an information stealer, so security pros can better understand its traffic patterns for detecting and investigating in the future.
Brad Duncan,
  • 0

Prisma Cloud Licensing and Editions Guide

This guide defines a workload within the scope of the solution and provides a feature comparison between the Enterprise Edition and Business Edition.
  • 1
  • 5237

What is a Public Cloud Firewall?

Public cloud firewalls - sometimes referred to as virtual firewalls - are virtual network security devices deployed in public cloud environments.
  • 1
  • 108

Cortex XDR™ 2.0 Webinar - Hong Kong

Stay Up to Date on Your Upgrade ProcessWe recently announced Cortex XDR™ 2.0, a significant advancement that unifies Traps™ endpoint protection and Cortex XDR into one platform for unrivaled security and operational efficiency.
  • 0

21st Century SCADA Security with Mario Chiock (WP)

SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks. However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors. The need for improved security in ICS has never been higher and has become a board-level issue for many organizations. In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
  • 6
  • 5058

The time I sabotaged my editor with ransomware from the dark web.

As you may be aware, there’s money to be made on the internet. The question, of course, is how. Not everyone has the reality-distortion skills to start their own tech unicorn, or the Stanford connections to become an early employee there, or the indifference to sunlight necessary to become a world-class Fortnite gamer.
  • 0
  • 128

The 20 Coolest Cloud Security Companies Of The 2020 Cloud 100

Here’s a look at 20 cloud security vendors that have taken on the migration, compliance and governance challenges in the cloud computing space.
  • 0
  • 117

US Agency Hit With N. Korean-Themed Phishing: Report

A spear-phishing campaign targeted a U.S. government agency for several months last year using emails with content about North Korea geopolitics as a lure, according to an analysis from Palo Alto Networks' Unit 42.
  • 0
  • 136

Unit 42 CTR: Leaked Code from Docker Registries

This post is based on additional findings from the Unit 42 Cloud Threat Report which shows how misconfigured Docker registries could leak confidential data, lead to a full-scale compromise, and interrupt the business operations.
Jay Chen,
  • 0

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data
  • 3
  • 16072

Unit 42 CTR: Sensitive Data Exposed in GitHub

Unit 42's detailed analysis of sensitive data exposed in GitHub repositories and the immediate need to shift how teams within enterprises discover and remediate issues earlier.
Nathaniel Quist,
  • 0

DevOps Summary: Unit 42 Cloud Threat Report: Spring 2020

Executive summary for the Spring 2020 Cloud Threat Report details insecure IaC templates, unencrypted databases, and logging issues. Read for details.
  • 0

Executive Summary: Unit 42 Cloud Threat Report: Spring 2020

Executive summary for the Spring 2020 Cloud Threat Report details insecure IaC templates, unencrypted databases, and logging issues. Read for details.
  • 0
  • 218

Palo Alto Networks Report Finds Poor Security Hygiene Leads to Escalating Cloud Vulnerabilities

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today released research showing how vulnerabilities in the development of cloud infrastructure are creating significant security...
Santa Clara, CA
  • 0
  • 443

Unit 42 Cloud Threat Report: Spring 2020

The Unit 42 Cloud Threat Report: Spring 2020 provides threat intelligence collected from public and proprietary data to shed light on the common security missteps and how to avoid them.
Unit 42,
  • 0

How Zero Trust and SASE Can Work Together

Combine Zero Trust Network Access principles with Secure Access Service Edge (SASE) for a single cloud-based solution for complete network visibility and control.
  • 0
  • 53

Protecting Data with a SASE Solution

Organizations must protect data of all forms, no matter its location. Current solutions don’t cut it so organizations must consider cloud DLP and a SASE approach.
  • 0

Palo Alto Networks to Announce Fiscal Second Quarter 2020 Financial Results on Monday, February 24, 2020

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal second quarter 2020, ended January 31, 2020, after U.S....
Santa Clara, CA
  • 0
  • 85

Actors Still Exploiting SharePoint Vulnerability to Attack Middle East Government Organizations

Our largest victim notification we've ever done: Threat actors are still exploiting SharePoint vulnerability CVE-2019-0604 to attack Middle Eastern governments
Robert Falcone,
  • 0

Artificial Intelligence and Machine Learning in the Security Operations Center

Provides an overview of how Palo Alto Networks solutions for the SOC use artificial intelligence and machine learning to find important security events without generating low-value alerts that require analyst time, attention, and manual remediation.
  • 0

Threat Hunting 101 Webinar - on-demand

Highly skilled attackers can break into the most well-protected organizations. They can trick users, compromise hosts and devise other under-handed schemes to infiltrate targeted networks. Your mission is to find these adversaries and root them out fast--before the damage is done.
  • 1

APP-ID WITH POLICY OPTIMIZER WEBINAR - On-demand

App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies. Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.
  • 0

What is Data Loss Prevention (DLP)?

Data loss prevention (DLP) is the practice of protecting and securing a company’s data to prevent it from being lost, stolen, accessed, or misused by unauthorized individuals.
  • 3
  • 2667

What Is Cloud Data Protection?

Cloud data protection is the practice of protecting and securing all of a company’s data in a cloud environment, regardless of where that data is located, whether it’s at rest or in motion, or if it’s managed internally by the company or externally by a third party.
  • 3
  • 268

What Is SASE?

Secure Access Service Edge or SASE (pronounced sassy), is an emerging concept that Gartner recently described in their The Future of Network Security in the Cloud report, released in August 2019.
  • 3
  • 8388

Secure Access Service Edge (SASE) Key Requirements

It is important to understand what a Secure Access Service Edge solution encompasses as you look for vendors to help you on your cloud journey.
  • 2
  • 285

Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed

We found an additional 1,400 unsecured Docker hosts and outline in this research some of the common tactics and techniques being used by attackers in compromised Docker engines.
Jay Chen,
  • 0
  • 83

Lightboard Series: Managed Detection and Response (MDR), Powered by Cortex XDR

Check out this video to learn more about our partners' services powered by Cortex XDR.
  • 0
  • 65
Displaying 1 to 30 of 4270