Education and Professional Services

Displaying 31 to 60 of 3979

Evasion of Security Policies by VPN Clients Poses Great Risk to Network Operators

Researchers with Palo Alto Networks Unit 42 investigated the tunneling software X-VPN, which uses various evasion techniques to bypass security and policy enforcement mechanisms. X-VPN is a type of Virtual Private Network (VPN) that can be used to bypass internet censorship and traffic policy enforcement points, which poses a great risk to network operators as well as VPN users.
Stefan AchleitnerMichael Huo,
  • 0

City of Mesa

The City of Mesa is also launching a smart city initiative, which will require securing diverse internet of things (IoT) devices. By deploying the Palo Alto Networks Security Operating Platform
  • 0
  • 57

Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks

The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.
  • 3
  • 153

The Problem With Containerization

Containerization offers plenty of benefits — including potentially smaller server costs — which tempts brands to containerize applications and adopt technologies such as Docker and Kubernetes.
  • 1
  • 132

Americans Want to Protect Their Information, but Don't Know How: Survey

Americans are keen on security, but do not necessarily understand it. This is the conclusion of a new survey of 1,300 Americans undertaken by YouGov, which basically suggests that attitudes towards cybersecurity exceed actions taken to ensure cybersecurity.
  • 0

Policy Optimizer

Policy Optimizer strengthens security by closing dangerous policy gaps left by legacy firewall policies. Policy Optimizer makes migration from port-based rules to App-ID based rules easy, fast, and accurate. Taking complexity out by removing scores of legacy rules reduces human error, which is a leading cause of data breaches.
  • 1

SSL Decryption

With Palo Alto Networks Next-Generation Firewalls, security teams can decrypt malicious traffic and preserve the privacy of sensitive traffic at the same time.
  • 1

TCP SACK Panics Linux Servers

The newly discovered Linux vulnerabilities, CVE-2019-11477, CVE-2019-11478, and CVE-2019-11479, affect all Linux operating systems newer than kernel 2.6.29 (released on March 2009) or above can cause a kernel panic to systems with services listening on TCP connection. This remote attack can put a server into Denial of Service (DoS) state, but remote code execution is not of concern.
Unit 42,
  • 0

Spotlight: Cherwell Software

Learn why Cherwell Software selected Cortex XDR and Traps to secure their enterprise.
  • 1
  • 92

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have supe-rior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading end-point detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.
  • 1
  • 143

Your Journey to the Cloud, Secured

In this session, join Jason Georgi, Field CTO for Cloud at Palo Alto Networks and learn how to secure your cloud initiatives
  • 1

Unit 42 Discovers 10 New Microsoft Vulnerabilities

Unit 42 discovered one new vulnerability addressed by the Microsoft Security Response Center (MSRC) as part of their June 2019 security update release, as well as nine additional vulnerabilities that were addressed in May 2019.
John Harrison,
  • 0

What Is Dynamic DNS?

Domain Name System (DNS) or Dynamic DNS? What's the difference and why should you care?
  • 1
  • 191

Electric Transmission Data Networks Use Case White Paper

Read this use case white paper based on real world designs to learn: How to better secure your Electric Transmission Data Networks from advanced cyberthreats How to more efficiently and comprehensively address your NERC CIP compliance obligations
  • 1
  • 767

The Big Cloud 5: Fundamentals for Enabling Holistic Cloud Security

In this 2 minute video, Matt Chiodi, Chief Security Officer of Public Cloud, discusses The Big Cloud 5: key fundamentals for building a holistic cloud security strategy.
  • 0

Prisma Public Cloud SLA

Prisma Public CloudService-Level Agreement
  • 1
  • 14736

ESG Infographic: "The Challenges of Managing Multiple Security Products"

The benefits of vendor consolidation include tighter product integration, increased automation, faster innovation, and improved security efficacy and efficiency.
  • 0

6 Top Cloud Security Threats To Know About In 2019 (And Beyond)

From compromised credentials to misconfigured containers to the excessive use of privileged accounts, here's a look at six of the biggest cloud security threats technical experts are worried about this year.
  • 2
  • 169

10 Network Security Requirements

Take a look at this fun, interactive infographic featuring the complete list of 10 key features and functionalities businesses need to prevent successful cyberattacks – today and tomorrow. It’s an informative way to quickly find out how to best protect your organization from cyberthreats.
  • 2

Palo Alto Networks Completes Acquisition of PureSec

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it has completed its acquisition of PureSec, a leader in serverless security, to extend its Prisma™ cloud...
Santa Clara, CA
  • 4
  • 377

Top 9 Biggest AWS Security Mistakes To Avoid

From failing to address the spread of shadow IT to losing or having credentials stolen to treating containers like traditional appliances or VMs, here are nine of the most common AWS security mistakes seen by technical experts.
  • 1
  • 154

Palo Alto Networks Reports Identify Container Security Concerns

A pair of reports published by Palo Alto Networks makes it apparent that the biggest issue in container security is not how secure the containers are, but rather how they are configured.
  • 2
  • 163

Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP

Executive Summary The Hide ‘N Seek botnet was first discovered in January 2018 and is known for its unique use of Peer-to-Peer communication between bots. Since its discovery, the malware family has seen a couple of upgrades, from the addition of persistence and new exploits, to targeting Android devices via the Android Debug Bridge (ADB).
Ruchna Nigam,
  • 0

7 Must-Have Cloud Security Certifications In 2019

Technical experts at seven of the world's leading cloud security firms provide their recommendations for which certifications they value most when making hiring decisions or mentoring subordinates.
  • 1
  • 146

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 6
  • 609

Public Cloud Security and Threat Defense for Higher Education

Learn about how Palo Alto Networks can help secure and manage your public cloud workloads
  • 2

VM-Series on Amazon Web Services
  • 4
  • 12613

Healthcare Use Case: Protect Medical Devices

Protect Medical Devices
  • 4
  • 1008

Best Practices for Network Security Consolidation in Government

Through network security consolidation, government agencies can achieve tighter integration between previously disparate systems while automating and simplifying the process for responding to and preventing malicious activity.
  • 4
  • 236

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 5
  • 503
Displaying 31 to 60 of 3979