Education and Professional Services

Displaying 1 to 30 of 4385

Building Secure Smart Cities in the Age of 5G and IoT

Smart cities are the next big thing and they’re going to take urban living to the next level. However, the interconnectivity in smart cities is not only their greatest strength but also their greatest weakness.
  • 0

What Is XDR?

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 1
  • 2757

Palo Alto Networks and Europol expand collaboration efforts on cybercrime to build a more secure future

Palo Alto Networks and Europol have today signed a memorandum of understanding (MoU) that expands their collaboration efforts to tackle cybercrime activity and improve security for citizens, businesses and governments across the EU.
The Hague, Netherlands
  • 0
  • 52

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 1)

Part 1 of a 3-part blog series that focuses on a practical approach to static analysis of PowerShell scripts and developing a platform-independent Python script to carry out this task.
Jeff White,
  • 0

Demystifying Data Center Security

Securing the modern center requires a uniform approach across physical, virtualized, and cloud environments. Christer Swartz the Consulting Engineer at Palo Alto Networks explains what you need to protect your data center in a hybrid cloud environment.
  • 0

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 6
  • 660

What Is MPLS?

Multiprotocol Label Switching (MPLS) is a networking technology that routes traffic using the shortest path based on “labels” rather than network addresses to handle forwarding over private wide area networks.
  • 0

What Is Firewall as a Service?

Firewalls were originally created to protect on-site company networks. But as more companies moved their applications and data to the cloud, firewalls also evolved to where they’re now being delivered as a service (Firewall as a Service (FWaaS)) as part of a company’s cloud infrastructure.
  • 0

Security Operations Workshop – Build and Evolve

Create a blueprint for your security operations build-out. Learn how by reading this data sheet.
  • 0

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 8
  • 88489

What is a Distributed Denial of Service Attack (DDoS)?

A Distributed Denial of Service (DDoS) attack is a variant of a DoS attack that employs very large numbers of attacking computers to overwhelm the target with bogus traffic.
  • 0
  • 5289

What Is DNS Tunneling?

DNS tunneling is one of the most damaging DNS attacks. What exactly is it, and how does it work?
  • 4
  • 1960

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 8
  • 95672

Seventy percent Asia-Pacific enterprises have misplaced confidence that cloud providers’ security is sufficient

Ovum research, commissioned by Palo Alto Networks, shows that large organisations in the Asia-Pacific region, those with over 200 employees, have misplaced confidence in cloud security.
  • 0

eBook: Cloud Security and Compliance Best Practices for Retail

Grab the eBook to learn the 6 guiding principles you’ll need to secure retail environments running on Google Cloud Platform (GCP).
  • 0

Leadership Ideas for CIOs and CISOs

Hear from top business executives on leading and achieving goals in an era of digital transformation. Understand how to better align the priorities and mindsets of IT and cybersecurity teams.
  • 0

As America Races to Deploy 5G, Cybersecurity Firms Try to Keep Up

Palo Alto Networks is working to keep up with this rapid deployment on the cybersecurity front. Scott Stevens, CTO of the Global Service Providers business at Palo Alto Networks, joined Cheddar to discuss.
  • 0

ESG Research Highlights: Leveraging DevSecOps to Secure Cloud-native Applications

ESG conducted a research survey with the intent to gain insight into the current and future processes involved in securing cloud-native applications, the challenges that arise when securing cloud-native applications, and the product requirements companies will demand as they continue to secure more cloud-native applications.
  • 0

BeyondCorp: A Step Towards Zero Trust for the Cloud

This eBook looks at BeyondCorp, how it works, its key principles, and how it applies towards implementing a comprehensive Zero Trust approach in the cloud.
  • 0

Detecting Attacks with Machine Learning

Attend this informative session to understand - Real-world examples of machine learning models used to detect attacks - The key shortcomings with today’s approaches to machine learning and how security best practices and the right tools can overcome them
  • 0

Docker Engineのコンテナで拡散する初めてのクリプトジャック(仮想通貨採掘)ワーム

Unit 42 has discovered a new cryptojacking worm we’ve named Graboid that's spread to more than 2,000 unsecured Docker hosts.
Jay Chen,
  • 0

Federal Civilian Security Reference Blueprint

The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
  • 0

Docker Containers Riddled with Graboid Crypto-Worm

A worm with a randomized propagation method is spreading via the popular container technology.
  • 0

Cryptojacking Worm Targets and Infects 2,000 Docker Hosts

Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.
  • 0

Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm

A new cryptojacking campaign was discovered using Docker images to deliver a worm that follows a seemingly erratic plan where the miner is active for about four minutes at a time on an infected host.
  • 0

'Graboid' Crypto-Jacking Worm Targets Docker Hosts

Palo Alto Networks’ security researchers have identified what appears to be the first crypto-jacking worm that spreads using Docker containers.
  • 0
Displaying 1 to 30 of 4385