Date

Education and Professional Services

Displaying 31 to 60 of 3194

Cybersecurity Academy Curriculum

The Palo Alto Networks Cybersecurity Academy is a university program to help educate the next generation of cybersecurity experts. This document is a list of the curriculum associated with the program.
  • 3
  • 1616

‘Shift left’ prevents missteps that lead to 90% of breaches in cloud computing

Lugging workloads from on-premises to public cloud is straining when done with flimsy security policies.
  • 0
  • 179

Outcomes of Implementing Zero Trust

John Kindervag, founder of Zero Trust and Field CTO at Palo Alto Networks, discusses the evolution and positive outcomes of implementing a Zero Trust method.
  • 0
  • 42

What is Malware Protection?

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 1
  • 153

What is Malware Protection?

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 0
  • 55

What Are Fileless Malware Attacks and “Living Off the Land”? Unit 42 Explains

For many, the cryptocurrency phenomenon is intriguing but complicated, involving “blockchain,” “distributed ledgers” and other jargon. Ryan Olson, VP of Threat Intelligence Unit 42, explains one of the hidden threats of the cryptocurrency boom — cryptomining attacks.
  • 0
  • 80

How Cryptocurrency Is Driving Cyber Risk: Executive Summary

The report is based on groundbreaking research and analysis from Unit 42, the global threat intelligence team at Palo Alto Networks.
  • 1
  • 0

Large U.S. Government Agency Improves Network Security and Performance

Growing amounts of SSL/TLS encrypted traffic can be hiding threats. Decrypting and inspecting encrypted traffic can add latency, costs and management overhead. Read how this federal agency chose Palo Alto Networks next-generation firewalls to decrypt traffic inline and whitelist applications, reducing risk, increasing performance and simplifying security management.
  • 0
  • 4

12 Best Practices to Make Your AWS Configuration More Secure

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.
  • 0
  • 371

The Future of Cryptocurrency Mining

There are a few things that you should look for in the future of cryptomining, as well.
  • 0
  • 0

The Shift from Ransomware to Cryptocurrency Mining

The transition that we've been seeing from ransomware to these cryptomining attacks is really driven by the attackers themselves and sort of the requirements that they have around making money.
  • 1
  • 0

What Are Cryptomining Attacks?

There’s really two types. First, we see browser-based cryptomining attacks, where an attacker has found a way to inject some JavaScript into a website.
  • 1
  • 0

WildFire Datasheet

WildFire Datasheet
  • 8
  • 29668

Secure Microsoft Azure with RedLock

RedLock for Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 0
  • 6420

Secure Amazon Web Services with RedLock

RedLock for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 0
  • 6437

Professional Services Traps Implementation

The cyberthreat landscape continues to evolve rapidly and is becoming increasingly complex as new technologies emerge. Ensuring your organization is properly protected on the endpoint requires not only the most capable security products but also the most capable people. With this in mind, we have developed a dedicated team of highly skilled experts to provide you with the best possible services to protect your endpoints.
Santa Clara, CA
  • 0
  • 15543

Secure Google Cloud with RedLock

RedLock for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 1
  • 138

Threat Assessment Service

Personalized traffic analysis with evidence based recommendations provided via the Threat Assessment Service for NGFW.
  • 0
  • 0

Three Steps to Automating Security in the Cloud

The brief highlights a three-phased approach to automating security across multi-cloud environments.
  • 0
  • 73

How Cryptocurrency Is Driving Cyber Risk

The report is based on groundbreaking research and analysis from Unit 42, the global threat intelligence team at Palo Alto Networks.
  • 0
  • 0

IPS as a Platform

Palo Alto Networks differs from traditional IPS by bringing together vulnerability protection, network anti-malware and anti-spyware into one service.
  • 0
  • 4092

Toyota Motor Europe

Toyota Motor Europe (TME) is the regional headquarter for the European branch of Toyota, Hein Vandenabeele, Security Engineer shares how they unified and standardized their European security network onto the Palo Alto Networks Security Operating Platform.
  • 0
  • 159

What’s Next for EDR? It’s Time to Rethink the “E” in EDR

Your security teams need visibility, but it shouldn’t come at a cost. Endpoint detection and response has long been positioned as the last line of defense against attacks, yet detection and response times continue to increase.
  • 1
  • 128

The Cybersecurity 202: Trump is getting tough on Chinese hacking. Will it work?

The Trump administration is prepping a slate of get-tough measures against Chinese government-linked hackers — including indictments, a naming and shaming campaign by multiple federal agencies and possible sanctions against hackers and the organizations that back them.
  • 0
  • 342

SSL Decryption - Why, Where and How

The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
  • 2
  • 97

49% of Cloud Databases Left Unencrypted

Businesses also leave information vulnerable in the cloud by failing to implement MFA and configure Kubernetes settings, new research reveals.
  • 0
  • 312

Common Cloud Attacks: An Inside Look at Unprotected MongoDB Instances

It can be challenging to secure your organization’s move to the cloud.
  • 0
  • 60

Common Cloud Attacks: An Inside Look at Unprotected Kubernetes Consoles

It can be challenging to secure your organization’s move to the cloud.
  • 0
  • 55

Common Cloud Attacks: An Inside Look at Open S3 Buckets

It can be challenging to secure your organization’s move to the cloud.
  • 0
  • 59

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.
  • 1
  • 3873
Displaying 31 to 60 of 3194