Date

Education and Professional Services

Displaying 31 - 60 of 4652

In The News

Minorities in cybersecurity face unique and lasting barriers

IT is facing renewed scrutiny into its lack of diversity. Explore the unique barriers minorities in cybersecurity face and why hiring approaches are ill equipped to address them.

Unit 42

Evolution of Valak, from Its Beginnings to Mass Distribution

Valak is an information stealer and malware loader that has become increasingly common in our threat landscape and is being mass distributed by an actor known as Shathak/TA551.
Brad Duncan,

In The News

Taking on the perfect storm in cybersecurity

The cybersecurity industry is at a turning point. Traditional security approaches were already struggling to deal with rising cyberattacks, a shift to cloud and explosive growth in Internet of Things (41.6 billion IoT devices by 2025, anyone?).

References and Case Studies

Yancey Bros. Case Study - Palo Alto Networks CloudGenix SD-WAN

Read this case study to learn why Yancey Bros. chose CloudGenix SD-WAN.

White Paper

Panorama at a Glance

Panorama reduces network complexity with logical, functional device groups, simplifies network management with easy, global policy control, and reduces the time that threats linger on your network with actionable data highlighting critical information for response prioritization.

Unit 42

OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory

We discovered a variant of an OilRig-associated tool that uses a novel email-based C2 channel with steganography to exfiltrate data.
Robert Falcone,

Video

IoT Security by Palo Alto Networks

Solving security issues in IoT is no longer an option when it comes to preventing cyber attacks. Watch this video to learn about how our industry-first cloud-delivered IoT Security solutionwas created from the ground up to discover, secure,and protectall the IoT devices in your network.

White Paper

Federal Cloud Journey

Helping to guide federal organizations as they continue to migrate to cloud environments.

Datasheet

Cortex XSOAR for MSSPs

Cortex™ XSOAR supercharges MSSP efficiency by unifying case management, automation, real-time collaboration, and native Threat Intel Management in the industry’s first extended security orchestration, automation, and response (SOAR) offering.

Datasheet

Cortex XDR Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TrustArc® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.

Unit 42

Threat Brief: Microsoft DNS Server Wormable Vulnerability CVE-2020-1350

We suggest mitigation actions to protect against exploitation of CVE-2020-1350 within the Microsoft Windows DNS Server.
Mike HarbisonBrandon Young,

White Paper

Questions CISOs Should Ask to Modernize Their Network Security Strategy

Here are six questions CISOs should ask to modernize their network security strategy.

White Paper

How Security Approaches Must Evolve to Address Modern Network Threats

Security approaches must evolve to address modern network threats. Learn what organizations should look for as they undertake digital transformation.

Article

How to Secure IoT Devices in the Enterprise

As connected devices continue to increase in numbers, it is increasingly challenging for enterprises to secure them and keep threats at bay.

Datasheet

QuickStart Service for Prisma Cloud Enterprise Edition

QuickStart Services for Prisma Cloud Enterprise Edition helps you get the most out of your Prisma Cloud deployment and investments by assisting with the planning and execution of your implementation. Our expert consultants will remotely configure and deploy Prisma Cloud into your environment.

Other

Executive Summary: The State of Cloud Native Security Report 2020

Get your copy of the Executive Summary of the research report for a quick overview of exclusive insights from security and DevOps leaders on the forefront of the cloud and cloud native security ecosystem as they unveil what’s happening in cloud native security today and what’s working best for organizations.

Datasheet

Prisma Cloud on Microsoft Azure

Prisma Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

Unit 42

3 Vulnerabilities Found on AvertX IP Cameras

Security cameras make up 5% of enterprise IoT devices but account for 33% of all security issues. We found three vulnerabilities in AvertX IP cameras.
Asher Davila,

Use Case

Pokémon Company International Uses Cortex XSOAR to Catch ’Em All

The Pokémon Company International needed a solution to help them navigate a fast-moving security environment. This case study highlights how Cortex XSOAR helped improve their security posture to introduce orchestration, automation, and response (SOAR) and gave them standardized, automated processes, and the common ‘sheet music’ as the other instruments in their security orchestra kept changing.

Video

GlobalProtect Demo PAN-OS 10.0

A Next Generation Security platform must have the advanced capabilities to not just stop malicious activity it sees at that moment, but must also take proactive measures to mitigate the risk of future security incidents and data loss from the compromised device.

Video

Cloud Visibility, Compliance, and Governance

Understand how enterprises and government organizations can gain visibility, achieve compliance, and accelerate governance in multi- and hybrid-cloud environments. See how Prisma Cloud enables cloud native security across AWS, GCP, Azure, and Alibaba Cloud.

Webinar

Closing : Virtual Cyberweek

Unit 42

Windows Server Containers Are Open, and Here’s How You Can Break Out

We demonstrate a complete technique to escalate privileges and escape Windows Server Containers.
Daniel Prizmant,

Article

What Is IoT Security?

IoT Security can be understood as a security strategy and protection mechanism that specifically safeguards IoT devices connected to the network and purposely built for a fixed set of functionalities.

Article

Microsoft Azure

Video

Expedition's Tools Promotional Video

Expedition's Tools Digital Learning Training

Video

Lightboard Series: VM-Series for Azure Overview

Lightboard Series: VM-Series for Azure Overview

Resource

Transit VPC with the VM-Series

Video

Advanced Threat Prevention

Our WildFire™ threat analysis service integrates with Prisma SaaS to provide advanced threat prevention to block known malware, and we are the only CASB to identify and block unknown malware.
Displaying 31 - 60 of 4652