Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research

How Eight Organizations Transformed Their Security Operations with Cortex

SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
See more

Zero Trust Security to Protect All OT Environments

Learn how a Zero Trust strategy provides protection across OT assets and networks, remote operations, and 5G networks.
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Book (71)
  • Guide (4)
  • White Paper (3)
By Product Category

By Product Category

By Industry

By Industry

  • Healthcare (3)
  • Federal Government (3)
  • Manufacturing (2)
  • Technology (1)
  • Education (1)
  • State & Local Government (1)
  • Retail (1)
  • Financial Services (1)
  • + Show More
By Topic

By Topic

  • Network Security (17)
  • Cloud Security (13)
  • Secure Access Service Edge (SASE)  (7)
  • Public Cloud Security (6)
  • Amazon Web Services (5)
  • Zero Trust (5)
  • Private Cloud Security (5)
  • Security Operating Platform (4)
  • Google Cloud (3)
  • Saas Security (3)
  • Microsoft Azure (3)
  • Threat Detection and Prevention (3)
  • Data Center (3)
  • Network Security Management (2)
  • Security Ecosystem (2)
  • Mobile Security (2)
  • Attack Surface Management (1)
  • Security Operations (1)
  • Remote Workforce (1)
  • Compliance (1)
  • Secure Remote Workforce (1)
  • + Show More
Displaying 1 - 30 of 86
Pagination
  • 1
  • 2
  • 3

Book

Customer Spotlight — Eliminate Misconfigurations

Reduce misconfigurations in the cloud with guidance from top organizations that improved their security posture with insights and industry practices in this e-book.
September 20, 2023

Book

Customer Spotlight — Visibility and Compliance

Improve cloud security posture management (CSPM) with insights from organizations that gained centralized visibility and achieved cloud compliance and business goals.
September 20, 2023

Book

Customer Spotlight — Multicloud Security

Improve the security posture of your multi-cloud environment with guidance from leading organizations that use Prisma Cloud to identify and eliminate security risks.
September 20, 2023

Book

A Guide to CSPM Tools and Strategies

Multicloud CSPM Strategy: Master robust security with our e-book on multifunctional platforms, addressing challenges, components, and functionalities for multicloud security.
September 6, 2023

Book

eBook: Cloud NGFW

Cloud NGFW eBook: Best-in-Class Security, Unparalleled Simplicity on AWS | Palo Alto Networks
August 6, 2023

Book

Software Firewalls for Dummies

Special Edition: Software Firewalls for Dummies - Palo Alto Networks
July 25, 2023

Book

Cortex XSIAM: The Machine-Led, Human-Empowered Security Platform

Discover Cortex XSIAM, an integrated security platform combining the strength of SIEM (Security Information and Event Management), AI (Artificial Intelligence), ML (machine learning) advanced automation, SOAR (Security Orchestration, Automation, and Response), and identity threat detection. Revolutionize your organization's cybersecurity with enhanced threat detection, proactive incident response, and comprehensive visibility across your digital environment. Stay one step ahead of evolving cyber threats with Cortex XSIAM's powerful analytics, real-time monitoring, and streamlined workflows. Protect your critical assets and safeguard your business with this advanced security solution.
June 23, 2023

Book

Defending Against Modern Web-Based Threats

Learn about the right methodology to detect evasive and unknown threats, and understand how Prisma Access Cloud SWG can help.
June 13, 2023

Book

Zero Trust Security to Protect All OT Environments

Learn how a Zero Trust strategy provides protection across OT assets and networks, remote operations, and 5G networks.
May 21, 2023

Book

Ahead for SLED: Conversations with Security Leaders in State and Local Government

State, local, and education (SLED) organization’s IT and security teams face challenges with implementing security solutions while often dealing with limited budgets and staffing. Additionally, they must navigate rules and regulations at state and local levels, as well as federal regulations and requirements. This e-book showcases real-world conversations with SLED security leaders who discuss how Cortex XDR, Cortex XSOAR, and Cortex Xpanse help minimize those challenges via automation, analytics, and machine learning to transform their security operations.
April 18, 2023

References and Case Studies

How Eight Organizations Transformed Their Security Operations with Cortex

SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
April 17, 2023

Book

Elements of Security Operations

The Elements of SecOps book outlines the fundamental strategies, tools, and processes for building a modern security operations team that is effective, efficient, scalable, and able to meet the needs of the business.
April 5, 2023

Book

The Complete Guide to Kubernetes Security

Kubernetes security guide to design a security strategy to reinforce Kubernetes-based processes and implement automated, scalable solutions to address vulnerabilities.
February 9, 2023

Book

Cloud Security and Compliance for Dummies Guide

Evaluate your cloud security and compliance options. Read the pivotal step-by-step guide on how to secure your cloud, now and in the future.
February 2, 2023

Book

Stages of a Ransomware Attack: How to Weather the Storm and Emerge Stronger than Before

Don’t let threat actors exploit your organization with ransomware. Learn the stages of a ransomware attack and how to improve ransomware incident readiness now.
February 1, 2023

Book

2023 Benchmark Report on IoT Security

Learn how top-performing organizations use advanced IoT security to protect network-connected devices from known and unknown threats.
January 29, 2023

Book

The Healthcare CISO's Guide to Medical IoT Security

Learn the six steps to medical IoT security which ensures that all digital transactions are secure and validated to thwart cyber threats and protect data.
January 29, 2023

Book

Closing security gaps for connected devices in healthcare

This ebook breaks down these risks and shows how an automated Zero Trust approach to connected device security can close the gaps.
January 29, 2023

Book

Enterprise Buyer's Guide to IoT Security

Learn the five steps to IoT security which ensures that all digital transactions are secure and validated to thwart cyber threats and protect data.
January 29, 2023

Book

The 6 Key Requirements for Multicloud Security

Multicloud Security: Discover 6 requirements to optimize security across cloud environments and empower cloud admin and DevSecOps teams with our actionable e-book.
October 26, 2022

Book

Unleash the Full Power of Your Palo Alto Networks Technology

For decades, technology companies have placed the primary responsibility of installing, managing, adopting, maintaining and ultimately extracting the maximum value of solutions on customers.
October 17, 2022

Book

Monetizing 5G Security: Moving from Cost Center to Profit Center

The reliability and performance of 5G are why organizations find it key to their digital transformations.
October 6, 2022

Book

How Six Organizations Transformed Their Networking and Security with Prisma SASE

Learn how six organizations have transformed their networking and security with Prisma SASE in this ebook.
October 4, 2022

Book

The SMB Guide to Affordable, Enterprise-Grade Security

Read this ebook to learn the right combination of skills, tools, and tactics to dramatically improve your business' security posture.
September 29, 2022

Book

Advanced Threats Require Advanced Defenses

This eBook provides information about the evolving threat landscape; where adversaries are taking advantage of defensive gaps; and security capabilities required as part of modern defense.
September 27, 2022

Book

The Essential Guide to MITRE ATT&CK Round 4

For the fourth round of the MITRE ATT&CK Evaluations, 30 vendors participated to see how their solutions stacked up to protect and defend against the tactics, techniques and procedures leveraged by two very relevant and sophisticated threat groups Wizard Spider and Sandworm. This e-book will help you understand the results from the evaluations, providing an objective look at how the vendors performed, with guidance on how to explore the results further.
August 16, 2022

Book

The Essential Guide to XDR for Government Security Operations

Government agencies face unique security challenges, including the need for tools that provide visibility and enhanced operational efficiency over large, federated, geographically distributed networks. Read this Essential Guide to XDR to learn about XDR, its applications and use cases, and how investing in it today can protect you against tomorrow’s threats. See why XDR has emerged as a market category that integrates network, cloud and endpoint data to help you detect and eliminate threats before the damage is done.
August 16, 2022

Book

The Essential Guide to XDR

Read this Essential Guide to XDR to learn about XDR, its applications and use cases, and how investing in it today can protect you against tomorrow’s threats. See why XDR has emerged as a market category that integrates network, cloud and endpoint data to help you detect and eliminate threats before the damage is done.
August 16, 2022

Book

Top Ten Questions to Ask a Digital Experience Monitoring Vendor

By 2026, at least 60% of I&O leaders will use digital experience monitoring to measure application, services and endpoint performance from the user’s viewpoint, according to Gartner’s Market Guide for Digital Experience Monitoring. As employees increasingly work from home and remote locations, the demand for smoother, consistent, experiences to the critical applications they rely on increases in order to ensure optimal productivity and business results.
August 10, 2022

Book

Transform Your Security Strategy

Learn how to transform your security strategy with a threat-informed approach. Read our e-book.
July 26, 2022
Displaying 1 - 30 of 86
Pagination Bottom
  • 1
  • 2
  • 3

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved