Displaying 31 - 60 of 159
Whitepaper
Scale Your SOC with Cortex Xpanse and Cortex XSOAR - Federal Version
Integrating Cortex Xpanse attack surface management and Cortex XSOAR, a security orchestration, automation and response (SOAR) platform helps federal agencies automate attack surface remediation workflows to drastically reduce their mean time to detect and mean time to respond.
Article
What is the Difference between FISMA and FedRAMP?
To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
Article
SunOrcalマルウェアの新たな亜種の標的の拡大
Unit 42は、このところReaverと呼ばれる新しいマルウェア ファミリの調査を行っています。弊社が2016年後半にその活動を確認して以来、Reaverに目立った動きはなく、特定された固有のサンプル数はごく少数にとどまっています。
Article
ボットネットとは
ボットは、コンピュータに感染し、攻撃者のリモート コントロールによってコマンドを実行するマルウェアです。
Webinar
Lessons Learned on the Zero Trust Journey
During this webinar, you will learn how to, Establish the criteria for defining an agency's most sensitive and valuable data, Delineate elements of the network, including third-party access, to be addressed in a zero trust architecture, Define the role of strong identity management and its role in zero trust, Identify all applications used by the networks for continuous monitoring
Whitepaper
Protect Your Cloud Journey in the Public Sector
MMIS and IES are complex in-service modules that reside on large-scale IT infrastructure.
Book
Operationalizing DevSecOps
Continuous Authority to Operate (cATO) requires visibility of cybersecurity activities, monitoring of RMF controls, real-time response to cyberthreats, and DevSecOps.
Webinar
Reducing the Attack Surface in Government Agencies
The increasing pressure by hostile nation-states and other bad actors who are relentlessly probing the networks of federal, state and local governments underlines the importance of effective attack surface management.
Webinar
GovExec Zero Trust CyberSmart TV Series
Adopting a Zero Trust architecture is certainly not a new concept, but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyberthreats, a permanently expanded perimeter defining the next normal and increased support from the current administration to prioritize Zero Trust advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s attacks. Join Nextgov and Route Fifty in this episode to explore the efforts made since the Biden administration’s Executive Order on Improving the Nation's Cybersecurity and the path forward for Zero Trust.
Datasheet
Prisma Access, a FedRAMP Authorized Service
Rapidly connect remote users and branches with Prisma Access, a FedRAMP Authorized service
Webinar
Cloud Native Application Protection for DOE and NASA
Prisma Cloud enables you to secure your cloud native infrastructure and cloud native applications using a single dashboard.
Webinar
Defining Moments: The Future of the Workforce
MeriTalk's Defining Moments explores events that are having profound effects on government and IT. Palo Alto Networks Senior Vice President of Public Sector Dana Barnes kicks off the new series with an examination of how the global pandemic inspired a new working world.
Webinar
Scaling and Securing Cloud Management for Defense Applications
Reliance on legacy networking architectures has seen DOD leaders across the globe contending with scalability, performance and usability constraints across their cloud access points.
Datasheet
5G-Native Security At a Glance
Learn how 5G-Native Security protects all facets of the 5G infrastructure, including the user communications, applications, and data of business-critical enterprises, governments, as well as consumers.
Webinar
Extended Detection and Response: The Swiss Army Knife of SOC
If you had to choose between a standard utility knife and a Swiss Army knife, which one would you pick? Most people would choose the latter because it can do more.
Webinar
Cybersecurity Threats in the Cloud Software Supply Chain
High-profile software supply chain attacks, such as SolarWinds and Kaseya VSA, have shed a glaring light on the disparity between agencies’ perceptions of security within their cloud infrastructure and the reality of supply chain threats that can impact business catastrophically.
Webinar
Effectively Monitoring and Managing Internet Operations is Not Optional
The SolarWinds hack, increasing pressure on U.S. networks by foreign incursions and software vulnerabilities underline the importance of effective internet operations management.
Webinar
Implementing Zero Trust Architecture in the National Laboratories and DOE Sites
You may already have the majority of building blocks to implement a Zero Trust Architecture. Learn how to take the next step.
Podcast
NSA and CISA Guidance Helps Agencies Minimize Kubernetes Risks
The advent of containerized software services – and the emergence of Kubernetes to deploy and manage them – have played crucial roles in modernizing applications.
Webinar
Unit 42 by Palo Alto Networks
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization.
Whitepaper
Palo Alto Zero Trust: From Code to Cloud
Palo Alto Networks offers a fully secure, end-to-end, Zero Trust–enabled cloud security architecture to meet the goals of the federal government’s application modernization and cloud migration requirements.
References and Case Studies
US Federal Agency Boosts Security
Discover how a key U.S. federal government agency boosts security with Cortex® Xpanse™. Read this case study to learn more.
Datasheet
Automate Incident Response Reporting with Cortex XSOAR
Security orchestration connects disparate security tools,
teams, and infrastructures for seamless, process-based
security operations and incident response.
Video
FCW Roundtable Webcast: Zero Trust: The Foundation of a Modern Cybersecurity Strategy
Since the pandemic began more than a year and a half ago, government agencies and their workforces, just like their private sector business counterparts
Video
ATARC TIC 3.0 Summit
Following our 1st session with Kevin Mitnick, you’re now asking: What's next? How can I protect my organization?
Video
GovExec Future of Work Summit: Reimagining Government for the Next Crisis
As vaccines have become widely available and mask restrictions eased, the federal government is poised to undergo another transformation in where, when and how its workforce operates.
Video
SNG Live - Zero Trust
Gone are the days of agencies trusting everything on their networks. It’s proven that malicious attacks are just as likely to come from inside a network as they are from outside
Video
CDM Central: The Age of Cyber Defenders
Are the high-profile hacks of late 2020 and early 2021 a catalyst to rethink federal cyber security?
Video
Demystifying the Technology Modernization Fund
To help agencies understand how to access and leverage Technology Modernization Fund (TMF) resources
Video
Investing in FedRAMP: An Industry Perspective on Securing the U.S. Government
This replay examines new FedRAMP policy developments, challenges agencies still face in reusing authorizations and efforts to pass legislation to put FedRAMP requirements into law.
Displaying 31 - 60 of 159