- Cloud Security (21)
- Public Cloud Security (17)
- Network Security (16)
- Private Cloud Security (15)
- Secure Access Service Edge (SASE) (10)
- Threat Detection and Prevention (9)
- Security Operations (8)
- Google Cloud (4)
- Microsoft Azure (4)
- Amazon Web Services (4)
- Security Operating Platform (4)
- Zero Trust (3)
- Security Ecosystem (3)
- Data Center (3)
- Network Security Management (2)
- Secure Remote Workforce (2)
- Saas Security (1)
- Mobile Security (1)
- + Show More
By Product Category
Displaying 91 - 120 of 129
Unit 42 Cloud Threat Report, Vol. 5
This executive summary provides topline findings from the latest Unit 42 Cloud Threat Report, where researchers examined cloud infrastructure threats through the lens of identity and access management (IAM). Analysis from terabytes of data, thousands of cloud accounts, and more than 100,000 GitHub code repositories indicates that identity misconfigurations are prevalent across cloud accounts, representing a significant security risk to organizations.
Unit 42 Cloud Threat Report, Vol. 3
Learn How to Protect Your Cloud Accounts From IAM Misconfigurations. Cloud is now the dominant platform for enterprise application development. Based on data from the 2020 State of Cloud Native Security Report, up to 64% of enterprise workloads will be in the cloud in just the next 24 months.
Get the Latest Gartner Research on SOAR
Security operations teams can only take full advantage of security orchestration, automation and response (SOAR) tools if their security processes are ready.
The Connected Enterprise: IoT Security Report 2020
In an ongoing effort to shed light on security threats posed by the surge in internet of things (IoT) device deployment, Palo Alto Networks, the global cybersecurity leader, commissioned research company Vanson Bourne to conduct a survey on IoT security practices.
The State of Cloud Native Security 2020
Get exclusive industry stats in The State of Cloud Native Security 2020. Download today.
2020 Unit 42 IoT Threat Report
Read the report to better understand the scope of the risks to your enterprise and the steps you can take to develop an effective IoT strategy that prepares your business for the long term.
Securing the Enterprise in the Age of IoT
Nearly all sectors have IoT projects that call for embedding a variety of IoT endpoints into their network infrastructure. This business brief outlines the impact of security challenges on IoT adoption across industry segments and best practice to combat the challenges.
SANS Report: Detection and Response
As the modern threat landscape gets more and more sophisticated, security teams need a security solution that cuts through complexity and eliminates silos.
Gartner's Top 9 Security Trends in 2020
In response to the growing security skills gap and attacker trends, extended detection and response (XDR) tools, machine learning (ML), and automation capability are emerging to improve security operations productivity and detection accuracy.” – Gartner See the security trends Gartner believes are ripe to disrupt the industry, and get their recommendations on how to improve your organization’s resilience and defenses.
Security in Datacenter Transformation
Eric Hansleman Chief Analyst at 451 Research shares new approaches for keeping your rapidly changing data center and cloud environments secure.
How Enterprises Respond to the Incident Response Challenge
Dark Reading recently surveyed IT and cybersecurity professionals from a variety of businesses and organizations. According to their new report, 94% of enterprises feel the first 24 hours after discovering a cyberattack are the most critical. They also found that, despite increasing emphasis on the importance of effective and timely incident response, security teams may actually be overconfident in assessing their current IR capabilities.
NSS Labs AEP 2020 Test Results are In: Cortex XDR Achieves an “AA” Rating
NSS Labs’ Advanced Endpoint Protection (AEP) Test evaluated the prevention capabilities of leading endpoint security (EPP) products against more than 45,000 attack test cases across all tested products including malware, exploits, blended threats, unknown threats, evasions, handcrafted attacks and resistance to tampering. Cortex XDR received a very strong “AA” rating overall.
Unit 42 Cloud Threat Report, Vol. 2
Cloud threat researchers uncover vulnerabilities in infrastructure-as-code templates, deep dive into crypto operations and cybercrime trends. Read the full report.
Executive Summary: Unit 42 Cloud Threat Report
This executive summary highlights key findings from the February 2020 edition of the Unit 42 Cloud Threat Report. Data shows Data shows nearly 200k insecure IaC templates in use, 43% of cloud databases are not encrypted, and 60% of cloud storage services have logging disabled.
DevOps Summary: Unit 42 Cloud Threat Report
This summary for DevOps audiences highlights key findings from the February 2020 edition of the Unit 42 Cloud Threat Report. Data shows nearly 200k insecure IaC templates in use, 26% of insecure Kubernetes® configurations run containers with unrestricted permissions, and 27% of Terraform® SSH (port 22) resources are exposed to the internet.
Making Secure SD-WAN Manageable: Take an Integrated Approach
Learn how consolidating and integrating networking and security functions, as well as unifying management and monitoring with SD-WAN in the branch, can lead to more secure and efficient operations.
The 2019 State of SOAR Report
Every security team has its own set of security tools, competencies, common use cases and compliance requirements. One of the few common threads that weaves through all these elements is the steps for responding to a security incident. Demisto, now part of Palo Alto Networks, sponsored a study of security professionals around the world to delve deeper into their challenges across the incident response (IR) lifecycle, the tools they use and the capabilities they feel are missing from their tool stacks.
Secure Cloud Native Apps
ESG conducted a research survey with the intent to gain insight into the current and future processes involved in securing cloud-native applications, the challenges that arise when securing cloud-native applications, and the product requirements companies will demand as they continue to secure more cloud-native applications.
Impacts of Cyberattacks on IoT Devices
This paper discusses the modern IoT attack kill chain and the impact of these attacks on IoT devices.
8-TIME GARTNER MAGIC QUADRANT LEADER
Gartner’s 2019 Magic Quadrant for Network Firewalls Report recognizes Palo Alto Networks a Leader for the EIGHTH time in a row, with the highest position in ability to execute and furthest in completeness of vision.
5 Key Cloud Security Trends
This report highlights key learnings from these incidents along with research by Unit 42’s cloud research team to shed light on current and emerging trends. Moreover, it offers tips and best practices to help organizations ensure business-critical data across their public cloud environments – Google Cloud, AWS, and Azure – is secure.
Unit 42 Cloud Threat Report, Vol.1
This Unit 42 report highlights key learnings from public cloud security incidents and presents original research from the cloud-focused division of the Unit 42 threat research team.
NSS Labs NGFW Group Test Report on Palo Alto Networks PA-5220
In 1H 2019, NSS Labs performed an independent test of the Palo Alto Networks PA-5220. This comprehensive testing compared security effectiveness, performance and cost among 12 NGFW products. Palo Alto Networks achieved the highest security effectiveness score and a "Recommended" rating."
2019 Cybersecurity Insiders Report
Read the full report to learn more the current state and perception of cloud security.
Handbook: How to Create a Modern Ransomware Strategy
Read this handbook to gain insight and best practices from your peers and industry experts on creating a modern ransomware strategy.
2018 NSS Labs Next Generation Intrusion Prevention (NGIPS) Report
NSS Labs performed an independent test of the Palo Alto Networks PA-5220 PAN-OS 8.1.2. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation intrusion Prevention System (NGIPS) Test Methodology v4 and the NSS Labs Evasion Test Methodology v1.1. Testing was conducted free of charge and NSS did not receive any compensation in return for Palo Alto Network’s participation.
2018 NSS Labs NGFW Group Test Report
Palo Alto Networks® is focused on securing your business with a prevention-focused architecture you can easily deploy and operate. In its 2018 “Next Generation Firewall Group Test Report,” NSS Labs® recognized this and gave our NGFW a Recommended rating.
Protecting Your Clouds.
In this research report, we present the results of a recent Tech Pro Research survey, asking CBS Interactive’s readers about their current cloud activities, security operations, and priorities. You'll learn how IT departments are planning their implementation of private and hybrid cloud infrastructure, how they're dealing with concerns about insider threats, their perceptions of shadow IT, and how you can protect your organization in a challenging threat landscape.
Santa Clara, CA
Credential Theft: Shamoon 2
Credential theft is the oxygen of malicious activity: nearly always there, necessary, but never noticed. According to the 2016 Verizon® Data Breach Report, 63 percent of confirmed data breaches leveraged credentials, and the use of stolen credentials is the most common approach in web-app attacks. Credential theft is a staple in the playbooks of sophisticated attackers, like the Sofacy threat actor group, and unsophisticated attackers alike.
Displaying 91 - 120 of 129