Protect Against Russia-Ukraine Cyber Activity
  • Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Incident Response
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Get Started

William Saito: Industry 4.0, IoT and Security By Design

During the World Economic Forum’s Annual Meeting of the New Champions, taking place this week in Tianjin, China, about 1,500 policy makers and experts from more than 90 countries are gathering to discuss Industry 4.0. William Saito, Vice Chairman, Japan, for Palo Alto Networks, explains in his latest column for the World Economic Forum that the potential for Industry 4.0 — specifically how technologies such as cloud computing and big data join with the Internet of Things and algorithms from machine learning to govern new processes — requires preventive security …
See more

William Saito: The G7’s Opportunity To Push Cybersecurity As A Business Enabler

G7 leaders are gathering this month in Japan, and the meeting is a huge opportunity to position cybersecurity as an enabler of business growth, writes William Saito, CSO and Vice Chairman, Japan, at Palo Alto Networks, in a new article for the World Economic Forum. G7 leaders, notes William, “must collaborate with stakeholders in business, academia and civil society to promote the secure expansion of ICT. It can enhance efficiency and productivity, as well as add value and real revenue growth – not only in developed countries but developing ones …
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Webinar (50)
  • Podcast (14)
  • Infographic (8)
  • Live Community (4)
  • Video (3)
  • Playbook (2)
  • Use Case (2)
  • Tool (2)
  • Research Reports (1)
  • + Show More
By Topic

By Topic

  • Cloud Security (84)
  • Zero Trust (80)
  • Amazon Web Services (19)
  • Network Security (19)
  • Secure access service edge (SASE) (14)
  • Mobile Security (14)
  • VMWare NSX (13)
  • Google Cloud (10)
  • Security Operating Platform (7)
  • Security Operations (6)
  • KVM (5)
  • Microsoft Azure (4)
  • Public Cloud Security (3)
  • Secure Remote Workforce (3)
  • Saas Security (2)
  • Professional Services (1)
  • + Show More
By Industry

By Industry

  • IoT (44)
  • Healthcare (42)
  • Financial Services (40)
  • Education (28)
  • Manufacturing (2)
  • Professional & Legal Services (1)
  • + Show More
By Product Category

By Product Category

  • Prisma Cloud (2)
By Features

By Features

By Technology

By Technology

By Services

By Services

By Audience

By Audience

By Language

By Language

Displaying 1 - 30 of 3404
  • 1
  • 2
  • …
  • 113
  • 114

Blogs

Get Ready for Best-in-Class Security Built for Oracle Cloud Workloads

Introducing the OCI Network Firewall, which has been designed to provide an easy way to prevent network-based threats while protecting Oracle Cloud workloads.
Anand Oswal, May 24, 2022

Blogs

FLEXWORK Evolved—Same Flexibility, Trust, Choice, No Office Mandates

We put employee choice and personalization first, and FLEXWORK evolved – employees choose where they work, the tools, benefits and training
Liane Hornsey, May 20, 2022

Blogs

How ZTNA 1.0 Violates the Principle of Least Privilege

The principle of least privilege access is foundational to a Zero Trust posture, claimed by ZTNA 1.0 providers as built-in to solutions. But, there's an architectural deficiency.
Kumar Ramachandran, May 18, 2022

Blogs

Zero Trust and SASE: Better Together for Financial Institutions

A Zero Trust cybersecurity model, enabled by a modern Secure Access Services Edge (SASE) architecture, gives financial institutions powerful tools to support new ways of working without compromising their ability to compete and innovate.
Lawrence Chin, May 17, 2022

Blogs

Palo Alto Networks Partners with BT to Offer Managed SASE

Palo Alto Networks has partnered with BT to provide a Managed SASE offering powered by Prisma SASE – the industry’s most complete SASE.
Anand Oswal, May 16, 2022

Blogs

The Zero Trust Enterprise — What We Learned on Our Own Journey

Zero Trust Enterprise introduces consistent controls, eliminating implicit trust. On our Zero Trust journey, we identified four steps to help organizations.
Niall Browne, May 12, 2022

Blogs

How Innovation Turns 5G Security from a Reactive to Proactive Tool

5G security for enterprise rides on the viability of enterprise-grade security that safeguards the new business-critical operations against cyber threats.
Keith O’Brien, May 12, 2022

Blogs

Why the World Needs ZTNA 2.0

Customers are struggling to get a handle on the risks with hybrid work. ZTNA 2.0 is a unified security product that solves the shortcomings of ZTNA 1.0.
Nir Zuk, May 11, 2022

Blogs

Palo Alto Networks Alignment to the UK NCSC Cyber Assessment Framework

The UK NCSC developed the Cyber Assessment Framework (CAF) – guidance aimed at organisations responsible for businesses' services and activities.
Viv Danks, May 6, 2022

Blogs

Try the Cloud NGFW Free Trial in AWS Marketplace

Learn how Cloud NGFW, our new managed cloud native service on AWS, provides best-in-class network security with cloud-native ease of use.
Greg Smith, May 3, 2022

Blogs

Next-Gen CASB & Gamma.AI

NG-CASB has quickly increased its coverage across newer age cloud collaboration applications and shifted further left by offering real-time ML-powered data protection capabilities.
Arpit Goel, Anand Oswal, April 27, 2022

Blogs

New FedRAMP Authorization Secures IoT Devices for Federal Agencies

Secure your federal agency’s IoT devices. Learn about FedRAMP certified IoT Security that exceeds the compliance mandates of the 2020 IoT Cybersecurity Act.
Minakshi Sehgal, April 21, 2022

Blogs

Proactive 5G Cybersecurity Strategy Enables Sustainable Growth

During the podcast, Redoble discussed why cybersecurity development must be parallel to developing a 5G strategy, and his best practices for designing a 5G cybersecurity strategy.
Shannon Galvin, April 20, 2022

Blogs

2022 ASM Threat Report

These are some of the key findings from the 2022 ASM Threat Report, based on observable data from 100+ organizations and not self-reported surveys.
Abhishek Anbazhagan, April 19, 2022

Blogs

Actionable Zero Trust for Higher Education

Your institution may be among those wondering how to make actionable Zero Trust, and how doing so can help you meet priorities outlined by EDUCAUSE in its 2022 Top 10 IT Issues list.
Hunter Ely, April 18, 2022

Blogs

Save the Date: Dive Into Cloud NGFW With Palo Alto Networks and AWS

Simple, best-in-class, public cloud security is here with the recently announced Cloud NGFW, a managed next-generation firewall service for AWS.
Navneet Singh, April 14, 2022

Blogs

A SASE Solution That’s as Flexible as Your Hybrid Workforce

Palo Alto Networks introduces the industry’s most flexible SASE solution, extending enterprise-grade security to your home network for your hybrid workforce.
Kumar Ramachandran, April 13, 2022

Blogs

Enhancing the Security of Software Development Environments

Two sets of guidance were released by NIST: the Secure Software Development Framework (SSDF) and the companion Software Supply Chain Security Guidance.
Coleman Mehta, Chandan B.N., April 6, 2022

Blogs

VM-Series High-Availability — Now Supported by IBM Cloud

IBM Cloud VPC now supports the industry leading Palo Alto Networks VM-Series firewall in Single availability zone, high-availability configuration.
Calvin Person, April 5, 2022

Blogs

Unit 42 IR Services a Strong Performer in the Forrester Wave™

Palo Alto Networks Unit 42 named a Strong Performer in The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2022.
Wendi Whitmore, April 4, 2022

Blogs

2022 MITRE Engenuity ATT&CK Evaluations Results

Cortex XDR delivered exceptional results in the 2022 MITRE Engenuity ATT&CK Evaluations, with 100% threat prevention in the protection phase of the evaluation, once again.
Peter Havens, March 31, 2022

Blogs

Cloud NGFW: Managed Next-Generation Firewall Service for AWS

Announcing Cloud NGFW: Best-in-class security made easy on AWS. Protect your AWS workloads with powerful network security from Palo Alto Networks.
Anand Oswal, March 30, 2022

Blogs

Russia-Ukraine Cyber Activity Makes Security Best Practices Imperative

U.S. officials note that evolving intelligence points to potentially destructive cyberattacks. We encourage organizations to review best practices now
Unit 42, March 29, 2022

Blogs

Wipro Joins the List in Palo Alto Networks CPSP Program

Bringing Wipro into our CPSP program will create even bigger opportunities to work together and enhance their experience to better serve our customers.
Daniel Rubiano, March 29, 2022

Blogs

Customers’ Choice: Prisma SD-WAN Rated High on Gartner Peer Insights

Prisma SD-WAN rated on Gartner Peer Insights VOC WAN Edge Infrastructure, again! See why we were honored with the Customers’ Choice distinction for our SD-WAN solution.
Kumar Ramachandran, March 28, 2022

Blogs

Prisma Cloud — A Leader in Forrester Wave™ for Cloud Workload Security

Prisma Cloud was named a Leader in the 2022 Forrester Wave: Cloud Workload Security report, validating market leadership and ability to help customers address cloud security needs.
Ankur Shah, March 24, 2022

Blogs

Ransomware Trends: Higher Ransom Demands, More Extortion Tactics

The 2022 Unit 42 Ransomware Threat Report documents trends observed in incident response case data and insights gleaned from dark web leak sites.
Ryan Olson, March 24, 2022

Blogs

Cortex Xpanse Assess Brings Best in Class ASM to SMBs

Xpanse Assess customers get point-in-time assessments. SMBs need the low-effort solution offering best in class ASM features from Cortex Xpanse.
Rohan Kar, March 21, 2022

Blogs

Securing the New Frontiers of Critical Infrastructure Networks

Help critical infrastructure networks better protect their Operational Technology and Critical Infrastructure (OT/CI) from cyberthreats.
Del Rodillas, March 18, 2022

Blogs

I Have Zero Trust Issues with ZTNA

I have Zero Trust issues because the market shifted from defining solutions as "Software Defined Perimeter" to "Zero Trust Network Access."
Riccardo Galbiati, March 17, 2022
Displaying 1 - 30 of 3404
  • 1
  • 2
  • …
  • 113
  • 114

Get the latest news, invites to events and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Tech Insider
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Newsroom
  • Careers
  • Contact Us
  • Product Certifications
  • Manage Email Preferences
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved