• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Executive Summary: The State of Cloud Native Security 2022

The Executive Summary for The State of Cloud Native Security 2022 research report offers key insights gleaned from security and DevOps leaders at the forefront of the cloud native ecosystem.
See more

2022 SecureIQLab: Command and Control Comparative Report

The Palo Alto Networks Unit 42 threat research team has observed more than a 73% increase in the use of Red Team tools such as Cobalt Strike by threat actors (Source: Network Threat Trends report, pg. 18).
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Research Reports (129)
  • White Paper (2)
  • Article (1)
  • Infographic (1)
By Topic

By Topic

  • Cloud Security (21)
  • Public Cloud Security (17)
  • Network Security (16)
  • Private Cloud Security (15)
  • Secure Access Service Edge (SASE)  (10)
  • Threat Detection and Prevention (9)
  • Security Operations (8)
  • Google Cloud (4)
  • Microsoft Azure (4)
  • Amazon Web Services (4)
  • Security Operating Platform (4)
  • Zero Trust (3)
  • Security Ecosystem (3)
  • Data Center (3)
  • Network Security Management (2)
  • Secure Remote Workforce (2)
  • Saas Security (1)
  • Mobile Security (1)
  • + Show More
By Industry

By Industry

  • Financial Services (3)
  • Healthcare (2)
  • Federal Government (2)
  • State & Local Government (1)
  • Manufacturing (1)
  • Retail (1)
  • + Show More
By Product Category

By Product Category

  • + Show More
By Features

By Features

  • + Show More
By Technologies

By Technologies

  • + Show More
By Services

By Services

  • Managed Detection & Response (2)
By Audience

By Audience

By Language

By Language

  • English (21)
Displaying 91 - 120 of 129
Pagination
  • 1
  • 2
  • 3
  • 4
  • 5

Research Reports

Unit 42 Cloud Threat Report, Vol. 5

This executive summary provides topline findings from the latest Unit 42 Cloud Threat Report, where researchers examined cloud infrastructure threats through the lens of identity and access management (IAM). Analysis from terabytes of data, thousands of cloud accounts, and more than 100,000 GitHub code repositories indicates that identity misconfigurations are prevalent across cloud accounts, representing a significant security risk to organizations.
October 6, 2020

Research Reports

Unit 42 Cloud Threat Report, Vol. 3

Learn How to Protect Your Cloud Accounts From IAM Misconfigurations. Cloud is now the dominant platform for enterprise application development. Based on data from the 2020 State of Cloud Native Security Report, up to 64% of enterprise workloads will be in the cloud in just the next 24 months.
October 5, 2020

Research Reports

Get the Latest Gartner Research on SOAR

Security operations teams can only take full advantage of security orchestration, automation and response (SOAR) tools if their security processes are ready.
September 25, 2020

Research Reports

The Connected Enterprise: IoT Security Report 2020

In an ongoing effort to shed light on security threats posed by the surge in internet of things (IoT) device deployment, Palo Alto Networks, the global cybersecurity leader, commissioned research company Vanson Bourne to conduct a survey on IoT security practices.
September 15, 2020

Research Reports

The State of Cloud Native Security 2020

Get exclusive industry stats in The State of Cloud Native Security 2020. Download today.
June 24, 2020

White Paper

2020 Unit 42 IoT Threat Report

Read the report to better understand the scope of the risks to your enterprise and the steps you can take to develop an effective IoT strategy that prepares your business for the long term.
June 9, 2020

Research Reports

Securing the Enterprise in the Age of IoT

Nearly all sectors have IoT projects that call for embedding a variety of IoT endpoints into their network infrastructure. This business brief outlines the impact of security challenges on IoT adoption across industry segments and best practice to combat the challenges.
May 13, 2020

Research Reports

SANS Report: Detection and Response

As the modern threat landscape gets more and more sophisticated, security teams need a security solution that cuts through complexity and eliminates silos.
April 21, 2020

Research Reports

Gartner's Top 9 Security Trends in 2020

In response to the growing security skills gap and attacker trends, extended detection and response (XDR) tools, machine learning (ML), and automation capability are emerging to improve security operations productivity and detection accuracy.” – Gartner See the security trends Gartner believes are ripe to disrupt the industry, and get their recommendations on how to improve your organization’s resilience and defenses.
April 14, 2020

Research Reports

Security in Datacenter Transformation

Eric Hansleman Chief Analyst at 451 Research shares new approaches for keeping your rapidly changing data center and cloud environments secure.
March 31, 2020

Research Reports

How Enterprises Respond to the Incident Response Challenge

Dark Reading recently surveyed IT and cybersecurity professionals from a variety of businesses and organizations. According to their new report, 94% of enterprises feel the first 24 hours after discovering a cyberattack are the most critical. They also found that, despite increasing emphasis on the importance of effective and timely incident response, security teams may actually be overconfident in assessing their current IR capabilities.
March 25, 2020

Research Reports

NSS Labs AEP 2020 Test Results are In: Cortex XDR Achieves an “AA” Rating

NSS Labs’ Advanced Endpoint Protection (AEP) Test evaluated the prevention capabilities of leading endpoint security (EPP) products against more than 45,000 attack test cases across all tested products including malware, exploits, blended threats, unknown threats, evasions, handcrafted attacks and resistance to tampering. Cortex XDR received a very strong “AA” rating overall.
February 25, 2020

Research Reports

Unit 42 Cloud Threat Report, Vol. 2

Cloud threat researchers uncover vulnerabilities in infrastructure-as-code templates, deep dive into crypto operations and cybercrime trends. Read the full report.
February 24, 2020

Research Reports

Executive Summary: Unit 42 Cloud Threat Report

This executive summary highlights key findings from the February 2020 edition of the Unit 42 Cloud Threat Report. Data shows Data shows nearly 200k insecure IaC templates in use, 43% of cloud databases are not encrypted, and 60% of cloud storage services have logging disabled.
February 5, 2020

Research Reports

DevOps Summary: Unit 42 Cloud Threat Report

This summary for DevOps audiences highlights key findings from the February 2020 edition of the Unit 42 Cloud Threat Report. Data shows nearly 200k insecure IaC templates in use, 26% of insecure Kubernetes® configurations run containers with unrestricted permissions, and 27% of Terraform® SSH (port 22) resources are exposed to the internet.
February 5, 2020

Research Reports

Making Secure SD-WAN Manageable: Take an Integrated Approach

Learn how consolidating and integrating networking and security functions, as well as unifying management and monitoring with SD-WAN in the branch, can lead to more secure and efficient operations.
January 9, 2020

Research Reports

The 2019 State of SOAR Report

Every security team has its own set of security tools, competencies, common use cases and compliance requirements. One of the few common threads that weaves through all these elements is the steps for responding to a security incident. Demisto, now part of Palo Alto Networks, sponsored a study of security professionals around the world to delve deeper into their challenges across the incident response (IR) lifecycle, the tools they use and the capabilities they feel are missing from their tool stacks.
November 13, 2019

Research Reports

Secure Cloud Native Apps

ESG conducted a research survey with the intent to gain insight into the current and future processes involved in securing cloud-native applications, the challenges that arise when securing cloud-native applications, and the product requirements companies will demand as they continue to secure more cloud-native applications.
October 18, 2019

Research Reports

Impacts of Cyberattacks on IoT Devices

This paper discusses the modern IoT attack kill chain and the impact of these attacks on IoT devices.
October 16, 2019

White Paper

8-TIME GARTNER MAGIC QUADRANT LEADER

Gartner’s 2019 Magic Quadrant for Network Firewalls Report recognizes Palo Alto Networks a Leader for the EIGHTH time in a row, with the highest position in ability to execute and furthest in completeness of vision.
September 19, 2019

Research Reports

5 Key Cloud Security Trends

This report highlights key learnings from these incidents along with research by Unit 42’s cloud research team to shed light on current and emerging trends. Moreover, it offers tips and best practices to help organizations ensure business-critical data across their public cloud environments – Google Cloud, AWS, and Azure – is secure.
August 15, 2019

Research Reports

Unit 42 Cloud Threat Report, Vol.1

This Unit 42 report highlights key learnings from public cloud security incidents and presents original research from the cloud-focused division of the Unit 42 threat research team.
July 24, 2019

Research Reports

NSS Labs NGFW Group Test Report on Palo Alto Networks PA-5220

In 1H 2019, NSS Labs performed an independent test of the Palo Alto Networks PA-5220. This comprehensive testing compared security effectiveness, performance and cost among 12 NGFW products. Palo Alto Networks achieved the highest security effectiveness score and a "Recommended" rating."
July 17, 2019

Research Reports

2019 Cybersecurity Insiders Report

Read the full report to learn more the current state and perception of cloud security.
July 8, 2019

Research Reports

Handbook: How to Create a Modern Ransomware Strategy

Read this handbook to gain insight and best practices from your peers and industry experts on creating a modern ransomware strategy.
October 4, 2018

Research Reports

2018 NSS Labs Next Generation Intrusion Prevention (NGIPS) Report

NSS Labs performed an independent test of the Palo Alto Networks PA-5220 PAN-OS 8.1.2. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation intrusion Prevention System (NGIPS) Test Methodology v4 and the NSS Labs Evasion Test Methodology v1.1. Testing was conducted free of charge and NSS did not receive any compensation in return for Palo Alto Network’s participation.
September 20, 2018

Research Reports

2018 NSS Labs NGFW Group Test Report

Palo Alto Networks® is focused on securing your business with a prevention-focused architecture you can easily deploy and operate. In its 2018 “Next Generation Firewall Group Test Report,” NSS Labs® recognized this and gave our NGFW a Recommended rating.
July 17, 2018

White Paper

Forrester Traps TEI Study

Forrester Traps TEI Study
November 6, 2017

Research Reports

Protecting Your Clouds.

In this research report, we present the results of a recent Tech Pro Research survey, asking CBS Interactive’s readers about their current cloud activities, security operations, and priorities. You'll learn how IT departments are planning their implementation of private and hybrid cloud infrastructure, how they're dealing with concerns about insider threats, their perceptions of shadow IT, and how you can protect your organization in a challenging threat landscape.
Santa Clara, CAOctober 30, 2017

Research Reports

Credential Theft: Shamoon 2

Credential theft is the oxygen of malicious activity: nearly always there, necessary, but never noticed. According to the 2016 Verizon® Data Breach Report, 63 percent of confirmed data breaches leveraged credentials, and the use of stolen credentials is the most common approach in web-app attacks. Credential theft is a staple in the playbooks of sophisticated attackers, like the Sofacy threat actor group, and unsophisticated attackers alike.
Santa ClaraMay 9, 2017
Displaying 91 - 120 of 129
Pagination Bottom
  • 1
  • 2
  • 3
  • 4
  • 5

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved