To take full advantage of the automation and operational efficiencies of your ACI environment, you need to ensure that your security policies are enforced consistently and without compromise.
VM-Series firewalls on ACI bring next-generation security to ensure your environment is optimised.
In this webinar, you will learn:
* How to integrate physical and virtual Palo Alto Networks® firewalls into ACI environments.
* How to centralise management.
* Best practices when deploying firewalls with Palo Alto Networks Solutions.
Microsoft Azure provides a comprehensive set of cloud services that developers and IT professionals use to build, deploy, and manage applications through a global network of data centers.
Watch our webinar and you will learn how to complement the built-in security features of Microsoft Azure with VM-Series firewalls, and safely extend your application development and production workloads to the Microsoft Azure public cloud.
Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
In 2017, CBS Interactive’s Tech Pro Research surveyed ZDNet and TechRepublic readers in the United States to engage them about their current cloud security operations and future priorities. After gathering detailed insights into the concerns and plans of both C-level executives and endpoint, networking and DevOps professionals, CBS Interactive is proud to present “Protecting Your Clouds: Business and IT Considerations" with key industry analysts who can help you plan your IT strategy into the future.
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
Compliance and security are both top-of-mind issues for electric utilities. The NERC CIP standards mandate controls that protect against malware, provide device monitoring, and enable the detection and response to cyber incidents. This webinar will explore the application of one advanced solution to meet both compliance requirements and security objectives.
The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework. Its concepts around segmentation and least-privilege access were developed specifically for SCADA/control system applications. They are simple yet extremely powerful in helping to reduce the risk of compromised uptime and safety due to malicious or unintentional cyber incidents. Hear from ISA99 Managing Director Joe Weiss, Palo Alto Networks SCADA Product Marketing Manager, Del Rodillas, and an Oil & Gas SCADA security practitioner to learn about:
- The essential concepts prescribed by IEC 62443 including zones, conduits, and least-privilege access
- Real world use cases and cyber incidents that highlight the importance of segmentation and role-based access controls
- How to realize the benefits of the IEC62443 framework using the advanced segmentation capabilities of the Palo Alto Networks Security Platform
Today’s security deployments overwhelm security organizations with vast amounts of data. Presenting this data in a meaningful way and making it actionable is crucial in preventing successful cyber attacks.
Whether a Fortune 500, local municipality, or the neighborhood pizza spot, cyber threats from a range of actors and criminals are becoming more of a risk to organizations of every size and purpose. Similarly, whether you are a board member or functional leader within the organization, you have a responsibility to understand the threats and plan for them. Everyone knows cybersecurity is a major risk…but do you know where the real risks to your organization lie? And how to find and react to them?
Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats.
Unit 42 in conjunction with WeipTech, has identified 92 samples of a new iOS malware family that has been named KeyRaider. 225,000 valid Apple accounts with passwords were hacked, causing Unit 42 to believe this to be the largest known Apple account theft caused by malware.
Ryan discusses Operation Lotus Blossom and how the probable-espionage attacks were delivered via a customized backdoor, Elise. Learn how to recognize the difference between espionage and everyday malware, and find out how context, actionable data, and informed decisions can help keep your organization safe from targeted attacks.