Palo Alto Networks (NYSE: PANW), today launched a rapid response program to help SolarWinds Orion customers navigate risks from cyberattacks. SolarWinds Orion products are currently being...
The shift in the delivery of digital healthcare has been accelerated by the pandemic. Remote workers, increased telemedicine, connected medical devices (IoMT) and the rapid adoption of digital tools to communicate are just a few of the current trends reshaping healthcare. This transition has brought with it additional risks, compliance considerations and attack surface concerns that requires a new mindset for security.
What emerging security trends have been exposed in healthcare? What key insights and principles of cybersecurity can be applied to foster resiliency? And, how can you create an adaptive and agile cybersecurity culture to prevent modern threats?
Please join MK Palmore for a keynote discussion that will draw from his experiences and perspective, offering thoughts on challenges and opportunities in securing today’s digital healthcare organizations.
M.K. Palmore, Vice President, Field CSO - Americas
These days, having an incident and response plan is no longer a "nice to have." It has become crucial to create clear steps, stakeholders, external resources, and more ahead of time so that all the prep work is in place for when an incident occurs.
In this session we will walk you through how VM-Series virtual next-generation firewalls from Palo Alto Networks augment network security in NSX environments to deliver Zero Trust.
In this session Palo Alto Networks Consulting Engineer Jack Parks will walk you through the two primary ways to protect workloads in a vSphere environment using VM-Series virtual NGFWs to enforce L3 and L2 segmentation.
Introducing Managed Services (MS) Supercharged, bundles that enable you to supercharge your customers’ security in a world where working from home is the new normal.
Introducing Managed Services (MS) Supercharged, bundles that enable you to supercharge your customers’ security in a world where working from home is the new normal.
Moving to the cloud isn't just about pulling expensive equipment out of a data center. Going with a cloud provider involves its own set of costs. However, a cloud strategy offers other business benefits, some that can be calculated on a dollar basis and others that are on the softer side.
As 2021 looms, the conversation is no longer about securing the remote workforce now. It’s about how we will collaborate and form teams in the future – and the architectural shifts necessary to make it so.
Hybrid cloud is becoming even more important allowing companies to have local presence for their most critical compute providing low latency applications and data access.
Phishing emails are unfortunately a pernicious problem because they are easy to execute and can be a gateway to harmful attacks like ransomware. It’s also a time sink to deal with these attacks.
Watch this virtual session showcasing a day in the life of our SOC team and see how they’re protecting the world’s largest cybersecurity company every day. We’ll share a unique view of how we built and operate the Palo Alto Networks SOC including a deep dive into our security stack and processes.
Join our on-demand webinar featuring a candid discussion with Palo Alto Networks field CTO and former Forrester analyst Josh Zelonis as he presents the case for moving to XDR today
Watch the on-demand technical webcast and learn about the latest techniques adversaries are using to deliver ransomware and compromise vulnerable organizations.
Watch on-demand webinar with Zeus Kerravala of ZK Research and learn how to choose the next-gen SD-WAN that’s right for your organization – one that delivers speed, lower TCO, and a rich set of security and network services from the cloud.
In this fireside chat, industry experts from Wipro and Palo Alto Networks will share ideas and strategies to overcome challenges in the wake of the current pandemic.
In this talk we introduce the “Cloud Security Automation Stack”, which is a framework for representing all aspects of infrastructure and security as code, coupled with automation, applied throughout the build, deploy and run phases.
Protecting industrial enterprises and critical infrastructure from cyberattacks requires full visibility into the operational technology (OT) networks to minimize the risks that threats pose to availability, reliability, and safety. However, full visibility is exceedingly difficult to attain due to the prevalence of proprietary protocols, legacy systems, and unfamiliar OT assets.
Watch industry expert Tanner Johnson, senior cybersecurity analyst at OMDIA – the global technology research powerhouse – along with Mitchell Bezzina and Kalyan Siddam.
Unit 42 researchers Jay Chen, Senior Cloud Vulnerability and Exploit Researcher, Public Cloud Security and Nathaniel “Q” Quist, Senior Threat Researcher, Public Cloud Security host a unique opportunity to delve into the depths of the latest Unit 42 Cloud Threat Report.