ESG conducted a research survey with the intent to gain insight into the current and future processes involved in securing cloud-native applications, the challenges that arise when securing cloud-native applications, and the product requirements companies will demand as they continue to secure more cloud-native applications.
In this eBook you will learn how to begin addressing container security holistically, how to start embedding security across the entire container life cycle (i.e. DevSecOps), and how to gain full stack security awareness that will allow you to reduce, prioritize and automatically filter out alerts based on holistic, cloud context.
Join John Martinez, Director of Cloud Infrastructure at Palo Alto Networks and 451 Analyst, Fernando Montenegro to learn key requirements and best practices to ensure governance and compliance across multi-cloud environments, including AWS, Azure and GCP.
Aviv Sasson, a security researcher from the cloud division of Unit 42, has identified a critical vulnerability in a widespread cloud native registry called Harbor. The vulnerability allows attackers to take over Harbor registries by sending them a malicious request. The maintainers of Harbor released a patch that closes this critical security hole. Versions 1.7.6 and 1.8.3 include this fix. Unit 42 has found 1,300 Harbor registries open to the internet with vulnerable default settings, which are currently at risk until they’re updated.
Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.
Prisma Public Cloud for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk
This report highlights key learnings from these incidents along with research by Unit 42’s cloud research team to shed light on current and emerging trends. Moreover, it offers tips and best practices to help organizations ensure business-critical data across their public cloud environments – Google Cloud, AWS, and Azure – is secure.
Describes how you can use automation along with the elements of the Palo Alto Networks Security Operating Platform to increase the speed, consistency, quality, and reliability of the tasks they perform
This reference document links the technical design aspects of the Google Cloud Platform with Palo Alto Networks solutions and then explores several technical design models. The design models include a model with all instances in a single project to enterprise-level operational environments that span across multiple projects using Shared VPC.
Prisma Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.
Prisma Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
Displaying 1 to 30 of 51
Be the first to know.
As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.