Date

By Industry

By Product Category

  • Prisma Cloud (2)

By Features

By Technology

By Services

By Audience

By Language

  • English (1)
Displaying 1 - 30 of 3210

Blogs

Palo Alto Networks a Leader in Forrester Enterprise Firewalls Report

We’re proud to receive the highest score in the Strategy category of The Forrester Wave™: Enterprise Firewalls Q3’20.
Anand Oswal,

Blogs

Automation Rising 2020: Join the Ultimate Playbook Building Challenge!

Test your security automation skills in the Automation Rising 2020 SOAR Hackathon: the ultimate playbook building challenge.
Emily Laufer,

Blogs

Australia’s 2020 Cyber Security Strategy

Australia’s 2020 Cyber Security Strategy plans a record investment to provide a more secure online world for all Australians.
Sarah Sloan,

Blogs

Introducing the Cortex XSOAR Marketplace

The Cortex XSOAR Marketplace provides a common framework and community for sharing playbooks and integrations to scale up security automation.
Scott Simkin,

Blogs

Do You Have Enough Cloud Security? Use CIS Controls to Assess Yourself

The top 20 CIS controls can be a good starting point to determine if you have enough cloud security.
Matthew Chiodi,

Blogs

CN-Series Firewalls: Comprehensive Network Security for Kubernetes

Palo Alto Networks CN-Series firewalls are now generally available. See how they tackle three big Kubernetes network security concerns.
Sudeep Padiyar,

Blogs

Block COVID-19 Phishing Emails at Machine Speed

Learn how Cortex XSOAR automated playbooks can help your organization protect against the deluge of COVID-19 phishing emails.
Kamil Imtiaz,

Blogs

PAN-OS 10.0 for the World’s First ML-Powered NGFW Now Available

We announce the general availability of PAN-OS 10.0, the operating system at the heart of the World's First ML-Powered NGFW.
Manda Mafy,

Blogs

COVID-19: The Cybercrime Gold Rush of 2020

Unit 42 has been tracking a cybercrime gold rush aimed at taking advantage of the pandemic. Learn best practices to help avoid exploitation.
Ryan Olson,

Blogs

Zero Trust for Cloud Users and Environments

Maintaining Zero Trust for cloud can get complicated, especially in multi-cloud environments, but there are tools that can help.
Jonathan Bregman,

Blogs

The Ohio State University Assumes Leadership of Cybersecurity Canon

The 2020 Cybersecurity Canon Hall of Fame induction marks the passing of leadership for the project from Palo Alto Networks to Ohio State University.
Kathi WhitbeySue Pendleton,

Blogs

Why Most Zero Trust Network Access Solutions Are Too Trusting

It's important to make sure that Zero Trust Network Access solutions don't implicitly trust users once they've connected.
Ben Forster,

Blogs

Palo Alto Networks Expands Cortex, Prisma Cloud Hosting to Singapore

A Singapore cloud hosting location for Cortex and Prisma Cloud helps address customers’ data sovereignty, security and performance needs.
Phil Vasic,

Blogs

Virtual JSAC: DoD’s Need to Maintain Mission-Critical Remote Work

A distinguished group of DoD and cybersecurity leaders joined the JSAC virtual series to discuss secure access for the remote warfighter.
John Davis,

Blogs

Join the Adventures of the Cloud Defenders

The cloud defenders are on a quest to secure the realm – are you prepared to join as they battle for cloud native security?
Dan MacKenzie,

Blogs

Bringing High-Fidelity Threat Intelligence to Prisma Cloud

We've integrated high-fidelity threat intelligence into Prisma Cloud through AutoFocus, providing intelligence, analytics and context.
Jonathan Bregman,

Blogs

Palo Alto Networks Expands Cloud Hosting Locations to the UK

Our new UK cloud hosting location helps UK customers address their data residency and regulatory requirements.
Kasey Cross,

Blogs

The Ultimate Guide to the MITRE ATT&CK Round 2 Evaluation

For security teams seeking to evaluate EDR and XDR vendors, we've put together The Ultimate Guide to the MITRE ATT&CK Round 2 Evaluation.
Mark Brozek,

Blogs

Cloud Native Security: Intention vs. Practice

Comparing the results of our State of Cloud Native Security Report with threat research from Unit 42 reveals three interesting parallels.
Matthew Chiodi,

Blogs

5 Reasons Why You Should Consider Cloud-delivered Managed Security

A cloud-delivered managed security solution can be a good option for organizations that need to reduce costs while maintaining strong security.
Francisca Segovia Garcia,

Blogs

How to Start Threat Hunting

Four tips for how to start threat hunting from the panelists of our recent Inside the Hunt Virtual Threat Hunting Summit.
Mark Brozek,

Blogs

NIST Highlights Palo Alto Networks Supply Chain Best Practices

Governments should promote the adoption of supply chain best practices to foster a resilient ICT ecosystem.
Coleman Mehta,

Blogs

Palo Alto Networks Moves to Virtual Events Model Through 2020

The virtual events model includes online versions of Ignite, Federal Ignite and EMEA Ignite.
Linda Shanley,

Blogs

Build Endpoint Security into Your Zero Trust Strategy

A proper Zero Trust strategy should be consistent and coordinated, extending beyond network to include endpoint security.
Kasey Cross,

Blogs

Improve Your Cybersecurity Skills: Free Digital Learning

Bridge the cybersecurity skills gap with free educational resources, learning paths and industry-leading certifications tailored to real-world cybersecurity jobs.
Prameet Chhabra,

Blogs

Mapping the Cloud Native Security Genome

We examine the cloud native security genome, informed by in-depth primary research.
Rahul Sood,

Blogs

Multi-Cloud Networking Advances as Palo Alto Networks and Alkira Team Up

Palo Alto Networks and Alkira work to embed VM-Series virtual firewalls into a networking-as-as-a-service platform for better multi-cloud networking.
Mukesh Gupta,

Blogs

How to Bolster Your Business Case for XDR

New customer testimonials, test results and product reviews can all help you make a powerful business case for XDR in your organization.
Mark Brozek,

Blogs

Announcing CN-Series: The Industry’s First NGFW for Kubernetes

CN-Series helps keep cloud native applications nimble and secure with deep layer 7 container traffic visibility and control.
Mukesh Gupta,

Blogs

Announcing IoT Security: No Organization Is Protected Without It

IoT security raises unique challenges for organizations. Machine learning can play a key role in the IoT security lifecycle.
Anand Oswal,
Displaying 1 - 30 of 3210