Introducing Cortex XDR 2.0

Introducing Cortex XDR 2.0

  Today at our annual Ignite Europe conference, chief product officer Lee Klarich unveiled Cortex XDR 2.0 – the next bold…

Read more
Google Cloud at Ignite Europe ‘19

Google Cloud at Ignite Europe ‘19

Most enterprises have hybrid or multi-cloud deployments, and maintaining consistent security posture across all deployments is one of their top…

Read more
Is CASB Alone Enough? Long Live SASE

Is CASB Alone Enough? Long Live SASE

Author: Matthew Chiodi, CSO Public Cloud  Applications moving to the cloud and increased user mobility are changing the way networking…

Read more
Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersecurity

Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersecurity

By John Davis, vice president, federal chief security officer, retired U.S. Army major general The cybersecurity industry has a great…

Read more
New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer Experience

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer Experience

By Ed Metcalf, Director, Product Marketing, Services, Support, Education & Success Tools Palo Alto Networks is known for our technological…

Read more
Container Security: Vulnerability Management from Build to Run

Container Security: Vulnerability Management from Build to Run

Author: Keith Mokris, Product Marketing Manager, Container Security Today’s enterprises have embraced containers for their simplicity and contribution to improved…

Read more
The Next Generation of Network Security Is Cloud-Delivered

The Next Generation of Network Security Is Cloud-Delivered

By Nir Zuk, Palo Alto Networks founder and CTO Applications moving to the cloud and increased user mobility are changing the…

Read more
A Firewall Admin’s Introduction to Serverless Security

A Firewall Admin’s Introduction to Serverless Security

Ron Harnik, Senior Product Marketing Manager, Serverless Security One of the most interesting things about working at Palo Alto Networks…

Read more
Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear, but Trust Connects

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear, but Trust Connects

Cyber Canon Book Review: “A Sustainable Digital Economy: Not Fear, but Trust Connects” (2018), by Ad Krikke Book Reviewed By: Fred…

Read more
Protecting Data Center Interconnect Links

Protecting Data Center Interconnect Links

By Christer Swartz, Worldwide Consulting Engineer, Data Center, Virtualization, Service Provider Data centers are changing. The elastic nature of modern application…

Read more
Palo Alto Networks Named a Leader in The Forrester ZTX Wave™

Palo Alto Networks Named a Leader in The Forrester ZTX Wave™

Zero Trust, from the beginning, has always had the potential to drive significant impact in the security industry. As a…

Read more
A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network

A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network

By Maryn Eisenhart, president of Palo Alto Networks’ LGBTQIA+ Employee Network I would never have dreamed of how much the…

Read more
Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using

Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using

Cyber Canon Book Review: “A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using,” 2017, by Roger A.…

Read more
Palo Alto Networks Statement Regarding Tariffs

Palo Alto Networks Statement Regarding Tariffs

Palo Alto Networks is a US-based manufacturer that relies on a global supply chain. Some components we import for final…

Read more
Introducing Cloud Managed Prisma Access!

Introducing Cloud Managed Prisma Access!

Introducing Cloud Managed Prisma Access! Prisma Access gives you protection at scale, with global coverage for all your users–at headquarters,…

Read more
SSL/TLS Decryption Can Help with GDPR Compliance

SSL/TLS Decryption Can Help with GDPR Compliance

By John Harrison, Regional Product Marketing Manager, EMEA, and Fred Streefland, Regional Chief Security Officer You might be surprised to…

Read more
The Zero Trust Approach for the Cloud

The Zero Trust Approach for the Cloud

By Evin Safdia, Technical Marketing Manager, Prisma   The term “Zero Trust” has been around for almost 10 years, but it…

Read more
Recognizing Our NextWave Global Partners of the Year

Recognizing Our NextWave Global Partners of the Year

I am incredibly proud to recognize our Global NextWave Partner Award winners for 2019. This recognition is presented to an…

Read more
Cyber Canon Book Review: Hacks that Shocked the World

Cyber Canon Book Review: Hacks that Shocked the World

We modeled the Cybersecurity Canon after the Baseball Hall of Fame and the Rock & Roll Hall of Fame, except for cybersecurity…

Read more
Protecting People from More and More Places

Protecting People from More and More Places

Securing headquarters, data centers, branch offices and mobile users isn’t easy – especially when organizations take a traditional approach toward…

Read more
Ireland’s Commitment to Cybersecurity

Ireland’s Commitment to Cybersecurity

I recently visited Dublin, where I met with government and business leaders who are keen on innovating in cybersecurity. It…

Read more
Launching our New Beacon Portal

Launching our New Beacon Portal

We’re excited to launch Beacon – our new digital platform that provides you with a fun, simple way to learn…

Read more
Seeking Opportunities and Taking Risks

Seeking Opportunities and Taking Risks

This piece was originally published July 31 on Diversity Unscripted.   I started my career in pure sciences, specifically in…

Read more
Kubernetes – Vulnerable to Denial-of-Service Attacks

Kubernetes – Vulnerable to Denial-of-Service Attacks

On Wednesday, the Kubernetes Product Security Committee disclosed two new vulnerabilities affecting all versions. The issues are related to eight…

Read more
Uniting Dev and Sec Teams by Putting Security First

Uniting Dev and Sec Teams by Putting Security First

From product teams to architects to developers, “shift left” security is becoming more an integral part of everyday vocabulary. It…

Read more
Build a Rock Solid Business Case for Detection and Response

Build a Rock Solid Business Case for Detection and Response

In February, we unveiled Cortex XDR, the world’s first detection and response app that breaks down security silos to stop…

Read more
Tech Docs: Put Prisma Access 1.4 in Charge for Consistent Security

Tech Docs: Put Prisma Access 1.4 in Charge for Consistent Security

Prisma Access (formerly GlobalProtect cloud service) has a new name and introduces new features that you can use for consistent…

Read more
Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft

Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft

Palo Alto Networks is proud that Microsoft has recognized our Unit 42 global threat intelligence team with multiple awards for…

Read more
Retailers: Store Digital Transformation Means Upping your Cybersecurity Game

Retailers: Store Digital Transformation Means Upping your Cybersecurity Game

E-commerce is growing steadily worldwide, yet seven out of ten retail purchases are still made in stores. This does not…

Read more
North Dakota’s Big Cybersecurity Vision

North Dakota’s Big Cybersecurity Vision

This piece was originally published August 6 on Security Roundtable. The people of North Dakota have a lot to be…

Read more
Security Teams Are Having an Automation Awakening

Security Teams Are Having an Automation Awakening

This piece was originally published August 7 on the Demisto blog. For the third annual report on the state of…

Read more
XDR Gains Traction as Customers, Analysts, Vendors Embrace New Category

XDR Gains Traction as Customers, Analysts, Vendors Embrace New Category

Palo Alto Networks founder Nir Zuk last year called for radically transforming the security market by creating a new product…

Read more
Kubernetes Penetration Test Report: Insights and Twistlock Response

Kubernetes Penetration Test Report: Insights and Twistlock Response

The Cloud Native Computing Foundation (CNCF) late last year commissioned a penetration test to identify unknown security vulnerabilities and design…

Read more
From ‘DevOps vs. SecOps’ to DevSecOps

From ‘DevOps vs. SecOps’ to DevSecOps

DHI Group runs 100% in AWS. We provide a job recruiting platform for technical candidates and businesses in the United…

Read more
NSS Labs 2019 BPS Test: Palo Alto Networks Earns ‘Recommended’ Rating

NSS Labs 2019 BPS Test: Palo Alto Networks Earns ‘Recommended’ Rating

Palo Alto Networks achieved a “Recommended” rating in the 2019 NSS Labs Breach Prevention Systems (BPS) test, the highest rating…

Read more
8 Tips for Surviving Black Hat and Other Hostile Networks

8 Tips for Surviving Black Hat and Other Hostile Networks

For the third year in a row, Palo Alto Networks will collaborate with other top security vendors and experts who…

Read more
SEGA Europe: You Cannot Protect What You Cannot See

SEGA Europe: You Cannot Protect What You Cannot See

As a prolific game developer and publisher with six studios across four countries, SEGA Europe needed greater visibility into  vulnerabilities…

Read more
Change Healthcare’s  Road to Cloud Compliance is Paved with Lessons Learned

Change Healthcare’s Road to Cloud Compliance is Paved with Lessons Learned

Traditionally, Change Healthcare operated in a legacy data center environment. That is until about 5 years ago when we set…

Read more
Two Weapons to Help U.S. Govt Combat Cyberthreats

Two Weapons to Help U.S. Govt Combat Cyberthreats

Federal agencies face a conundrum: They are the targets of relentless cyberattacks yet lack enough skilled personnel to combat them.…

Read more
Advantages of Cloud-Delivered Security for U.S. Govt Agencies

Advantages of Cloud-Delivered Security for U.S. Govt Agencies

Last year, three-quarters of the U.S. federal government’s IT budget were spent on supporting and maintaining legacy systems. Combined with…

Read more
How the Girl Scouts and Palo Alto Networks Are Creating Opportunity

How the Girl Scouts and Palo Alto Networks Are Creating Opportunity

Lindsey Sanford is the Global Employer Brand Program Manager at Palo Alto Networks. She lives in Reno, Nevada, and has…

Read more
4 Practical Steps for ‘Shift Left’ Security

4 Practical Steps for ‘Shift Left’ Security

Since the beginning of modern computing, security has largely been divorced from software development. Recent vulnerability research confirms this. Consider…

Read more
How to Help SOC Analysts Fight ‘Alert Fatigue’

How to Help SOC Analysts Fight ‘Alert Fatigue’

Palo Alto Networks survey data shows that SOC analysts are only able to handle 14% of alerts generated by security…

Read more
Seven Guiding Principles to Selecting the Right Cloud Security Solution

Seven Guiding Principles to Selecting the Right Cloud Security Solution

Allan Kristensen, Sr. Director, Systems Engineering, Public Cloud at Palo Alto Networks.I recently had the opportunity to chat with Palo…

Read more
NSS Labs 2019 NGFW Group Test: Highest Security Effectiveness Score

NSS Labs 2019 NGFW Group Test: Highest Security Effectiveness Score

We are excited to announce that Palo Alto Networks has achieved the highest Security Effectiveness score among all twelve products…

Read more
How Western Asset Management Is Mitigating Cloud Threats

How Western Asset Management Is Mitigating Cloud Threats

Banking, investment management and FinTech have continually invested in technology upgrades, data analytics and differentiated product offerings in an increasingly…

Read more
Security Teams Deserve a Better Approach to Detection and Response

Security Teams Deserve a Better Approach to Detection and Response

For many organizations, security teams are the first line of defense against all known and unknown threats. The core function…

Read more
Runc and CVE- 2019-5736: A Container Security Triad Love Story

Runc and CVE- 2019-5736: A Container Security Triad Love Story

If you’ve been putting off addressing container security, today might be the day to make it a priority. In the…

Read more
You Want Network Segmentation, But You Need Zero Trust

You Want Network Segmentation, But You Need Zero Trust

In this blog series, I’ve been giving sufficient commentary on Zero Trust in order to dispel much of the mythology…

Read more

When Scripts Attack, WildFire Protects

Adversaries look for fast and easy ways to steal data. Among the many techniques in their playbooks, using scripts is…

Read more
Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment

Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment

Over the past several months, customers have been asking for the ability to run a Best Practice Assessment (BPA) more…

Read more
Machine Learning: Your Unfair Advantage Against Attackers

Machine Learning: Your Unfair Advantage Against Attackers

In the never-ending arms race between threat actors and defenders, automation and machine learning have become your ultimate weapons. Today,…

Read more
Cybersecurity Canon Candidate Book Review: “Abundance: The Future Is Better Than You Think

Cybersecurity Canon Candidate Book Review: “Abundance: The Future Is Better Than You Think

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25…

Read more
Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You

Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You

Cybersecurity needs you. Beginning a new career path in cybersecurity can be daunting, especially if you don’t know what to…

Read more

Understanding Illicit Cryptocurrency Mining: Threats and Best Practices for Prevention

Anything that has significant monetary value eventually attracts criminal activity. Such is the case with cryptocurrency, which since its earliest…

Read more
All Layers Are Not Created Equal

All Layers Are Not Created Equal

  How the Principles of Journalism Help Define Zero Trust Policy Everyone knows that in order for a news article,…

Read more
Security Teams Deserve a Better Approach to Detection and Response

Security Teams Deserve a Better Approach to Detection and Response

For many organizations, security teams are the first line of defense against all known and unknown threats. The core function…

Read more
Runc and CVE- 2019-5736: A Container Security Triad Love Story

Runc and CVE- 2019-5736: A Container Security Triad Love Story

If you’ve been putting off addressing container security, today might be the day to make it a priority. In the…

Read more
You Want Network Segmentation, But You Need Zero Trust

You Want Network Segmentation, But You Need Zero Trust

In this blog series, I’ve been giving sufficient commentary on Zero Trust in order to dispel much of the mythology…

Read more

When Scripts Attack, WildFire Protects

Adversaries look for fast and easy ways to steal data. Among the many techniques in their playbooks, using scripts is…

Read more
Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment

Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment

Over the past several months, customers have been asking for the ability to run a Best Practice Assessment (BPA) more…

Read more
Machine Learning: Your Unfair Advantage Against Attackers

Machine Learning: Your Unfair Advantage Against Attackers

In the never-ending arms race between threat actors and defenders, automation and machine learning have become your ultimate weapons. Today,…

Read more
Cybersecurity Canon Candidate Book Review: “Abundance: The Future Is Better Than You Think

Cybersecurity Canon Candidate Book Review: “Abundance: The Future Is Better Than You Think

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25…

Read more
Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You

Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You

Cybersecurity needs you. Beginning a new career path in cybersecurity can be daunting, especially if you don’t know what to…

Read more

Understanding Illicit Cryptocurrency Mining: Threats and Best Practices for Prevention

Anything that has significant monetary value eventually attracts criminal activity. Such is the case with cryptocurrency, which since its earliest…

Read more
Define a Protect Surface to Massively Reduce Your Attack Surface

Define a Protect Surface to Massively Reduce Your Attack Surface

In cybersecurity, one of the things people tend to focus on the least is defining what they’re trying to protect.…

Read more