This webinar will help. Designed with you in mind, it features our own Kasey Cross as well as Kerry Matre, author of Elements of Security Operations. Together, they’ll show you how you can cut down on repetitive tasks to spend more time investigating incidents and hunting for hidden threats.
Today’s cyber attackers utilize an increasingly sophisticated set of evasion tactics. Disjointed techniques and a fragmented security approach leave enterprises prone to risk. The volume of attacks is rising, applying strain on a limited population of security specialists. It is essential that defenders and security specialists understand the trends and distributions in the attack landscape. This paper takes a survey of the Palo Alto Networks Threat Data generated across the customer base.
Security Lifecycle Review (SLR) is a cloud-based application that analyzes the network traffic and reports on the business and security risks facing an organization to provide visibility into the network. SLR leverages the Palo Alto Networks Next Generation Firewall logs Cortex Data Lake data to identify the applications and threats exposing vulnerabilities in an organization’s security’s posture.
The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today.
The cybersecurity firm introduced an extended security orchestration, automation and response platform this week to provide capabilities for security analysts to deal with threats across the enterprise.
You know those mischievous bunnies in the movie “Peter Rabbit”? How about the heroic minifigs in “The LEGO Movie” or the fighting owls in “Legend of the Guardians: The Owls of Ga’Hoole”? Maybe the prancing penguins in “Happy Feet” had you dancing. Or perhaps “Alien: Covenant,” “Guardians of the Galaxy Vol. 2” or “The Great Wall” had you on the edge of your seat. If you’ve been amazed by the breathtaking visuals, compelling characters or memorable performances in any of these films, you can thank the creative wizardry of Animal Logic.
In this new review, “Transforming Detection and Response,” the SANS Institute offers an objective, third-party view of the product capabilities of Cortex XDR™. Learn why SANS believes the true power of Cortex XDR is its ability to help analysts not only contain and scope attacks, but ultimately prevent them from occurring in the future.
Unit 42's Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware.
In this eBook you will learn how to begin addressing container security holistically, how to start embedding security across the entire container life cycle (i.e. DevSecOps), and how to gain full stack security awareness that will allow you to reduce, prioritize and automatically filter out alerts based on holistic, cloud context.
In this edition of the threat review, we will follow the money with a dive into the world of banking malware and its growth into one of the most popular and lucrative avenues for professional hackers. We will take a closer look at Zeus, how it has evolved over time, and spawned a new generation of financial botnets that promise to cause even more damage. As always, we will cover the skills and intelligence you will need in order to protect your networks from these rapidly evolving threats.
Customers and prospects often ask if they should adopt the tools developed and provided by the cloud platforms themselves or invest in 3rd party solutions. Before jumping to technology decisions, it is wise to review both requirements and existing tools.
The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
SANTA CLARA, Calif. – September 6, 2018 – Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that KPIT has transformed its approach to cybersecurity by deploying Palo Alto Networks Security Operating Platform, including its firewalls and network security management.