Education and Professional Services

Displaying 1 to 30 of 3960

Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks

The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.
  • 0

The Problem With Containerization

Containerization offers plenty of benefits — including potentially smaller server costs — which tempts brands to containerize applications and adopt technologies such as Docker and Kubernetes.
  • 0

Prisma SaaS Privacy

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 2
  • 2610

Your Journey to the Cloud, Secured

In this session, join Jason Georgi, Field CTO for Cloud at Palo Alto Networks and learn how to secure your cloud initiatives
  • 0

Spotlight: Cherwell Software

Learn why Cherwell Software selected Cortex XDR and Traps to secure their enterprise.
  • 1

TCP SACK Panics Linux Servers

The newly discovered Linux vulnerabilities, CVE-2019-11477, CVE-2019-11478, and CVE-2019-11479, affect all Linux operating systems newer than kernel 2.6.29 (released on March 2009) or above can cause a kernel panic to systems with services listening on TCP connection. This remote attack can put a server into Denial of Service (DoS) state, but remote code execution is not of concern.
Unit 42,
  • 0

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have supe-rior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading end-point detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.
  • 0

Unit 42 Discovers 10 New Microsoft Vulnerabilities

Unit 42 discovered one new vulnerability addressed by the Microsoft Security Response Center (MSRC) as part of their June 2019 security update release, as well as nine additional vulnerabilities that were addressed in May 2019.
John Harrison,
  • 0

What Is Dynamic DNS?

Domain Name System (DNS) or Dynamic DNS? What's the difference and why should you care?
  • 0

Electric Transmission Data Networks Use Case White Paper

Read this use case white paper based on real world designs to learn: How to better secure your Electric Transmission Data Networks from advanced cyberthreats How to more efficiently and comprehensively address your NERC CIP compliance obligations
  • 1
  • 749

Prisma Public Cloud SLA

Prisma Public CloudService-Level Agreement
  • 0
  • 14683

The Big Cloud 5: Fundamentals for Enabling Holistic Cloud Security

In this 2 minute video, Matt Chiodi, Chief Security Officer of Public Cloud, discusses The Big Cloud 5: key fundamentals for building a holistic cloud security strategy.
  • 0

ESG Infographic: "The Challenges of Managing Multiple Security Products"

The benefits of vendor consolidation include tighter product integration, increased automation, faster innovation, and improved security efficacy and efficiency.
  • 0

6 Top Cloud Security Threats To Know About In 2019 (And Beyond)

From compromised credentials to misconfigured containers to the excessive use of privileged accounts, here's a look at six of the biggest cloud security threats technical experts are worried about this year.
  • 0
  • 56

10 Network Security Requirements

Take a look at this fun, interactive infographic featuring the complete list of 10 key features and functionalities businesses need to prevent successful cyberattacks – today and tomorrow. It’s an informative way to quickly find out how to best protect your organization from cyberthreats.
  • 0

Palo Alto Networks Completes Acquisition of PureSec

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it has completed its acquisition of PureSec, a leader in serverless security, to extend its Prisma™ cloud...
Santa Clara, CA
  • 1
  • 187

Top 9 Biggest AWS Security Mistakes To Avoid

From failing to address the spread of shadow IT to losing or having credentials stolen to treating containers like traditional appliances or VMs, here are nine of the most common AWS security mistakes seen by technical experts.
  • 0
  • 60

Palo Alto Networks Reports Identify Container Security Concerns

A pair of reports published by Palo Alto Networks makes it apparent that the biggest issue in container security is not how secure the containers are, but rather how they are configured.
  • 1
  • 74

Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP

Executive Summary The Hide ‘N Seek botnet was first discovered in January 2018 and is known for its unique use of Peer-to-Peer communication between bots. Since its discovery, the malware family has seen a couple of upgrades, from the addition of persistence and new exploits, to targeting Android devices via the Android Debug Bridge (ADB).
Ruchna Nigam,
  • 0

7 Must-Have Cloud Security Certifications In 2019

Technical experts at seven of the world's leading cloud security firms provide their recommendations for which certifications they value most when making hiring decisions or mentoring subordinates.
  • 0
  • 58

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 5
  • 587

Public Cloud Security and Threat Defense for Higher Education

Learn about how Palo Alto Networks can help secure and manage your public cloud workloads
  • 1

Healthcare Use Case: Protect Medical Devices

Protect Medical Devices
  • 4
  • 989

Maine Township High School District

Why Maine Township HS District 207 chose Palo Alto Networks Security Platform with Aruba ClearPass to secure network access for students, faculty and staff.
  • 2
  • 1263

Best Practices for Network Security Consolidation in Government

Through network security consolidation, government agencies can achieve tighter integration between previously disparate systems while automating and simplifying the process for responding to and preventing malicious activity.
  • 3
  • 223

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 3
  • 480

Making Containers More Isolated: An Overview of Sandboxed Container Technologies

Currently available container-based infrastructure has limitations because containers are not truly sandboxed and share the host OS kernel. The root of the problem is the weak separation between containers when the host OS creates a virtualized userland for each container. This blog covers four unique projects from IBM, Google, Amazon, and OpenStack, respectively, that use different techniques to achieve the same goal, creating stronger isolation for containers. The overview in this blog of state of the art research should help readers prepare for the upcoming transformation.
Jay Chen,
  • 0

New Mirai Variant Adds 8 New Exploits, Targets Additional IoT Devices

Our researchers have discovered a new Mirai variant that uses 8 new vulnerabilities and targets new IoT devices.
Ruchna Nigam,
  • 0

Misconfigured and Exposed: Container Services

The blog highlights the results from Unit 42’s research into misconfigured containers, methods for identifying services exposed to the public, and mitigation steps to secure container services. In this blog, we identify common misconfigurations in container services. This allows our readers to deploy their container platform structures in a more secure and private fashion, avoiding the methods of data gathering that we outline in this blog.
Nathaniel Quist,
  • 0

Guide to Securing G Suite for the Enterprise

Learn about the advantages and risks associated with G Suite and what your organization can do to securely use it to its fullest.
  • 0
Displaying 1 to 30 of 3960