With the release of the 3rd Generation Partnership Project’s (3GPP) Rel-16 standard, 5G networks are better positioned to address the critical communication needs of industries that operate and manage critical infrastructure. The digital revolution has enabled these private networks to develop as either physical, virtual, or hybrid systems, drawing governments and private sector companies’ interest.
A large automotive manufacturer needed to strengthen its defenses following a business email compromise, which exposed key gaps in their IR plan. They turned to the Unit 42 team for in-depth incident response planning customized to their environment and ongoing IR retainer services. Read the challenges, solutions, and final results of this case study now.
Enterprise networks are undergoing a tremendous transformation in response to the digital revolution. Global expansion, mobile workforces, work-from-home, and cloud computing are shifting the location of work-related applications, data, users, and even control system operations. These changes introduce new opportunities not just for traditional enterprise systems but for operational technologies as well; creating a set of cybersecurity risks that must be addressed by two different points of concern and reference.
This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk.
Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.
Toyota Motor Europe (TME) is the regional headquarter for the European branch of Toyota, Hein Vandenabeele, Security Engineer shares how they unified and standardized their European security network onto the Palo Alto Networks Security Operating Platform.
Zahlreiche Unternehmen vermarkten neue Anwendungsbereitstellungen mittlerweile nur noch über die Cloud. Durch ihrer Flexibilität, Skalierbarkeit und Leistungsfähigkeit sowie den beschleunigten Zugang zu innovativen Technologien bietet die Cloud Unternehmen einen Wettbewerbsvorteil. Daten und Anwendungen werden heute in vielfältigen Cloud-Umgebungen aus Infrastruktur-, Plattform- und Software-as-a-Service (IaaS, Paas bzw. SaaS) sowohl in Private als auch Public Clouds bereitgestellt.
Displaying 1 - 30 of 64
Get the latest news, invites to events, and threat alerts