The Elements of SecOps book outlines the fundamental strategies, tools, and processes for building a modern security operations team that is effective, efficient, scalable, and able to meet the needs of the business.
Whether your business was born in the cloud or is just starting its cloud journey, we’re excited to share with you the Prisma™ “Best of Cloud” video series, Volume 1. Check out the videos to get cloud security insights from customers, partners and advocates.
ESG conducted a research survey with the intent to gain insight into the current and future processes involved in securing cloud-native applications, the challenges that arise when securing cloud-native applications, and the product requirements companies will demand as they continue to secure more cloud-native applications.
The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
In this eBook you will learn how to begin addressing container security holistically, how to start embedding security across the entire container life cycle (i.e. DevSecOps), and how to gain full stack security awareness that will allow you to reduce, prioritize and automatically filter out alerts based on holistic, cloud context.
Join John Martinez, Director of Cloud Infrastructure at Palo Alto Networks and 451 Analyst, Fernando Montenegro to learn key requirements and best practices to ensure governance and compliance across multi-cloud environments, including AWS, Azure and GCP.
Aviv Sasson, a security researcher from the cloud division of Unit 42, has identified a critical vulnerability in a widespread cloud native registry called Harbor. The vulnerability allows attackers to take over Harbor registries by sending them a malicious request. The maintainers of Harbor released a patch that closes this critical security hole. Versions 1.7.6 and 1.8.3 include this fix. Unit 42 has found 1,300 Harbor registries open to the internet with vulnerable default settings, which are currently at risk until they’re updated.
Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.
Prisma Public Cloud for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk
This report highlights key learnings from these incidents along with research by Unit 42’s cloud research team to shed light on current and emerging trends. Moreover, it offers tips and best practices to help organizations ensure business-critical data across their public cloud environments – Google Cloud, AWS, and Azure – is secure.
This reference document links the technical design aspects of the Google Cloud Platform with Palo Alto Networks solutions and then explores several technical design models. The design models include a model with all instances in a single project to enterprise-level operational environments that span across multiple projects using Shared VPC.
Describes how you can use automation along with the elements of the Palo Alto Networks Security Operating Platform to increase the speed, consistency, quality, and reliability of the tasks they perform
Prisma Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.