Advisory and viewpoints for leaders from the global leader in cybersecurity, Palo Alto Networks.
AI allows organizations to embrace digital transformation and customize platformization to visualize total infrastructure and manage security threats in real-time—meeting the potential challenges of 2024.
Advanced threats are often highly persistent and can rapidly pivot when encountering roadblocks. Keen insights uncover threat actors’ ability to perform deep reconnaissance to understand their targeted environments thoroughly. Learn more today.
Exposing Muddled Libra's meticulous tactics with Kristopher Russo & David Moulton.
It’s on everyone’s mind: How will AI benefit threat actors?
The cyber skills shortage is not going away anytime soon, despite the progress we are making as an industry to attract new talent. Per the latest “ISC2 Cybersecurity Workforce Study,” we added more than 460,000 warm bodies over the past y....
With CNAPPs, a single platform can protect applications at runtime while also integrating security into development workflows to identify and fix flaws early in the application lifecycle.
CISOs need a simplified approach to security solutions. The good news: cybersecurity platforms help solve the issue.
As I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.
Our industry has no choice but to embrace and leverage AI to fight constant threats if we are to stand any hope of defending our environments effectively.
Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way.
As organizations grapple with new cybersecurity challenges, the need for an efficient, effective, modern-day SOC is imperative.
While securing OT systems can seem overwhelming…the task is not impossible. The power of attack surface management provides the technology needed to lock down assets in your organization.
Focus on these three disciplines to help your security and developer teams build modern, secure, and scalable engineering ecosystems in the cloud.
Many things challenge how we practice cybersecurity these days. Digital transformation has brought significant adoption of new technology and business models, including cloud solutions, e-commerce platforms, smart devices, and a significantly more di....
While Zero Trust is a term that is often misunderstood as well as misused, it is an approach that has real value in helping to reduce systematic cyber risk and improve resiliency. Organizations of all sizes understand that they require a resilient cy....
Next in our Beyond the Cyber Buzzwords series, this article focuses on shift-left security. Protect your next great idea by establishing a strong security posture—from code to cloud.
As cyber threats intensify, security and finance professionals need to align on strategies now more than ever.
Why has machine learning become so vital in cybersecurity? This article answers that and explores several challenges that are inherent when applying machine learning.
Healthcare’s digital transformation has created so many new opportunities — not only for patients and care providers but also for bad actors. This article discusses the challenges and opportunities of security in healthcare.
Medical IoT devices help to improve human healthcare every day. Just like humans need to do the right things to stay healthy, it’s essential for medical IoT devices to remain healthy too. Learn more about how to secure medical IoT devices.
By definition, critical infrastructure is vital. It needs to be operationally resilient, be able to reduce the potential attack surface, and minimize the new or expanding risks. Explore insights on how to secure critical infrastructure.
While the impact of cybersecurity risks is undeniable, too many organizations fail to build their cybersecurity strategies and tactics around the concept—and realities—of risk. Read more to learn why and insights on establishing a better ....
Unit 42 is Palo Alto Networks' world-renowned threat intelligence and security consulting team. Executive summary of the latest Unit 42 threat research on cloud threats.
While the possibilities of Industry 4.0 are extraordinary, there is still so much to learn between IT and the factory floor. Read more ...
Dr. May Wang shares what's missing in most risk management and the keys to creating a better strategy to reduce security risks.
Digital transformation is accelerating with key shifts such as the expanding Hybrid Workforce and continued migration of applications and data to the cloud. As we make this transformation, Information Security teams have the opportunity to adopt a mo....
The cloud supply chain can be complex, considering all the different layers, components and sources. While complex, cloud supply chain security can be managed with a four-step strategic approach.
Many organizations moved their SOC staff to remote work within days of coronavirus being declared a pandemic. Read about how this shift to remote work has put a spotlight on three inter-related issues for business and cybersecurity leaders in moderni....
The move toward Zero Trust has been one of the more significant shifts in how business approaches security. Before adopting a Zero Trust mindset, most companies tried to manage security as a gated function. Read more about what Zero Trust is, and imp....
What is SASE? Read this article to help debunk some industry myths about one of the hottest topics in cybersecurity today: SASE.
Now is the time for a change to enable a modern SOC—taking on SOC consolidation to achieve better outcomes, with faster remediation, reduced risk and overall stronger security posture.
Outline the key elements/drivers that are placing 5G security at the forefront of the connected enterprise in some surprising ways and places. We have identified five critical forces at work that require the attention of service providers and the ent....