Provides an overview of how Palo Alto Networks solutions for the SOC use artificial intelligence and machine learning to find important security events without generating low-value alerts that require analyst time, attention, and manual remediation.
Highly skilled attackers can break into the most well-protected organizations. They can trick users, compromise hosts and devise other under-handed schemes to infiltrate targeted networks. Your mission is to find these adversaries and root them out fast--before the damage is done.
App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies. Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.
Cloud data protection is the practice of protecting and securing all of a company’s data in a cloud environment, regardless of where that data is located, whether it’s at rest or in motion, or if it’s managed internally by the company or externally by a third party.
In the second half of 2019, a U.S. government agency was targeted by repeated spearphishing attempts that could be from a mysterious group that has evaded attribution for years, according to new research issued Thursday by security firm Palo Alto Networks.
A new malware called CARROTBALL, used as a second-stage payload in targeted attacks, was distributed in phishing email attachments delivered to a U.S. government agency and non-US foreign nationals professionally affiliated with current activities in North Korea.
The federal governments will use cloud as a new foundation to build more effective security capabilities across domains - including cyberspace. An explosion of government adoption of public, private, hybrid, and cloud services have introduced new ways to scale and deliver efficient operations across multiple cloud platforms. As federal agencies continue to transition and expand their footprint into the cloud, it is critical to ensure these systems are secure and vulnerabilities are addressed immediately.
Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
Displaying 31 - 60 of 4280
Be the first to know.
As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.