{"id":1304,"date":"2019-04-13T17:09:29","date_gmt":"2019-04-13T17:09:29","guid":{"rendered":"http:\/\/34.65.207.89\/?page_id=1304"},"modified":"2020-05-08T23:40:18","modified_gmt":"2020-05-08T20:40:18","slug":"palo-alto-blogs-posts","status":"publish","type":"page","link":"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-blogs-posts\/","title":{"rendered":"Palo Alto Blog&#8217;s Posts"},"content":{"rendered":"<p><section data-kc-fullwidth=\"content\" class=\"kc-elm kc-css-904967 kc_row\"><div class=\"kc-row-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-727067 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-70099 kc-animated kc-animate-eff-fadeInDown kc_shortcode kc_single_image\">\n\n        <img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2020\/05\/mainHeader_trainingV4.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-397149 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-388160 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-873953\" style=\"height: 77px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-975578 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-280390 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-799081 kc-blog-posts kc-blog-posts-3 kc-blog-grid kc_blog_masonry kc-image-align-both\">\n\t\n\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cortex-xdr-2-0\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/11\/image1-min.gif\"\n\t\t\t\t\t\t\t\t\t     alt=\"Introducing Cortex XDR 2.0\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cortex-xdr-2-0\/\">Introducing Cortex XDR 2.0<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cortex-xdr-2-0\/\">November 13, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0 Today at our annual Ignite Europe conference, chief product officer Lee Klarich unveiled Cortex XDR 2.0 \u2013\u00a0the next bold&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cortex-xdr-2-0\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/google-cloud-at-ignite-europe-19\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/YxK_t8049yg\"\n\t\t\t\t\t\t\t\t\t     alt=\"Google Cloud at Ignite Europe \u201819\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/google-cloud-at-ignite-europe-19\/\">Google Cloud at Ignite Europe \u201819<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/google-cloud-at-ignite-europe-19\/\">November 12, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Most enterprises have hybrid or multi-cloud deployments, and maintaining consistent security posture across all deployments is one of their top&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/google-cloud-at-ignite-europe-19\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/is-casb-alone-enough-long-live-sase\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/a18sZ70p1sA\"\n\t\t\t\t\t\t\t\t\t     alt=\"Is CASB Alone Enough? Long Live SASE\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/is-casb-alone-enough-long-live-sase\/\">Is CASB Alone Enough? Long Live SASE<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/is-casb-alone-enough-long-live-sase\/\">November 12, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Author: Matthew Chiodi, CSO Public Cloud\u00a0 Applications moving to the cloud and increased user mobility are changing the way networking&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/is-casb-alone-enough-long-live-sase\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/second-watch-an-initiative-to-help-veterans-find-a-new-mission-in-cybersecurity\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/11\/PAN-Second_Watch_Icon-01-scaled.jpg\"\n\t\t\t\t\t\t\t\t\t     alt=\"Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersecurity\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/second-watch-an-initiative-to-help-veterans-find-a-new-mission-in-cybersecurity\/\">Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersecurity<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/second-watch-an-initiative-to-help-veterans-find-a-new-mission-in-cybersecurity\/\">November 11, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By John Davis, vice president, federal chief security officer, retired U.S. Army major general The cybersecurity industry has a great&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/second-watch-an-initiative-to-help-veterans-find-a-new-mission-in-cybersecurity\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/new-and-enhanced-palo-alto-networks-support-offerings-elevate-the-customer-experience\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/gY6y5iZM5gI\"\n\t\t\t\t\t\t\t\t\t     alt=\"New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer Experience\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/new-and-enhanced-palo-alto-networks-support-offerings-elevate-the-customer-experience\/\">New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer Experience<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/new-and-enhanced-palo-alto-networks-support-offerings-elevate-the-customer-experience\/\">November 08, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By Ed Metcalf, Director, Product Marketing, Services, Support, Education & Success Tools Palo Alto Networks is known for our technological&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/new-and-enhanced-palo-alto-networks-support-offerings-elevate-the-customer-experience\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/container-security-vulnerability-management-from-build-to-run\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/11\/image5.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Container Security: Vulnerability Management from Build to Run\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/container-security-vulnerability-management-from-build-to-run\/\">Container Security: Vulnerability Management from Build to Run<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/container-security-vulnerability-management-from-build-to-run\/\">November 07, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Author: Keith Mokris, Product Marketing Manager, Container Security Today\u2019s enterprises have embraced containers for their simplicity and contribution to improved&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/container-security-vulnerability-management-from-build-to-run\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/the-next-generation-of-network-security-is-cloud-delivered\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/9QEzdWRBYgU\"\n\t\t\t\t\t\t\t\t\t     alt=\"The Next Generation of Network Security Is Cloud-Delivered\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/the-next-generation-of-network-security-is-cloud-delivered\/\">The Next Generation of Network Security Is Cloud-Delivered<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/the-next-generation-of-network-security-is-cloud-delivered\/\">November 06, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By Nir Zuk,\u00a0Palo Alto Networks founder and CTO Applications moving to the cloud and increased user mobility are changing the&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/the-next-generation-of-network-security-is-cloud-delivered\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/a-firewall-admins-introduction-to-serverless-security\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/TFLJlx896II\"\n\t\t\t\t\t\t\t\t\t     alt=\"A Firewall Admin\u2019s Introduction to Serverless Security\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/a-firewall-admins-introduction-to-serverless-security\/\">A Firewall Admin\u2019s Introduction to Serverless Security<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/a-firewall-admins-introduction-to-serverless-security\/\">November 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Ron Harnik, Senior Product Marketing Manager, Serverless Security One of the most interesting things about working at Palo Alto Networks&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/a-firewall-admins-introduction-to-serverless-security\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-sustainable-digital-economy-not-fear-but-trust-connects\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/XoFnLj0KelU\"\n\t\t\t\t\t\t\t\t\t     alt=\"Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear, but Trust Connects\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-sustainable-digital-economy-not-fear-but-trust-connects\/\">Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear, but Trust Connects<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-sustainable-digital-economy-not-fear-but-trust-connects\/\">November 01, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Canon Book Review:\u00a0\u201cA Sustainable Digital Economy: Not Fear, but Trust Connects\u201d (2018), by Ad Krikke Book Reviewed By: Fred&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-sustainable-digital-economy-not-fear-but-trust-connects\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-data-center-interconnect-links\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/HZqa63PIgVw\"\n\t\t\t\t\t\t\t\t\t     alt=\"Protecting Data Center Interconnect Links\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-data-center-interconnect-links\/\">Protecting Data Center Interconnect Links<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-data-center-interconnect-links\/\">October 31, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By\u00a0Christer Swartz, Worldwide Consulting Engineer, Data Center, Virtualization, Service Provider Data centers are changing. The elastic nature of modern application&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-data-center-interconnect-links\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-named-a-leader-in-the-forrester-ztx-wave\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/11\/2019Q4_Zero-Trust-eXtended-Ecosystem-Platform-Providers_146875.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Palo Alto Networks Named a Leader in The Forrester ZTX Wave\u2122\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-named-a-leader-in-the-forrester-ztx-wave\/\">Palo Alto Networks Named a Leader in The Forrester ZTX Wave\u2122<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-named-a-leader-in-the-forrester-ztx-wave\/\">October 29, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust, from the beginning, has always had the potential to drive significant impact in the security industry. As a&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-named-a-leader-in-the-forrester-ztx-wave\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/a-year-of-wins-for-the-palo-alto-networks-lgbtqia-employee-network\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/11\/LGBTQIA-image-4.jpeg\"\n\t\t\t\t\t\t\t\t\t     alt=\"A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/a-year-of-wins-for-the-palo-alto-networks-lgbtqia-employee-network\/\">A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/a-year-of-wins-for-the-palo-alto-networks-lgbtqia-employee-network\/\">October 25, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By Maryn Eisenhart, president of Palo Alto Networks\u2019 LGBTQIA+ Employee Network I would never have dreamed of how much the&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/a-year-of-wins-for-the-palo-alto-networks-lgbtqia-employee-network\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-data-driven-computer-security-defense-the-computer-security-defense-you-should-be-using\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/X26-v0hC-Uc\"\n\t\t\t\t\t\t\t\t\t     alt=\"Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-data-driven-computer-security-defense-the-computer-security-defense-you-should-be-using\/\">Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-data-driven-computer-security-defense-the-computer-security-defense-you-should-be-using\/\">October 25, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Canon Book Review:\u00a0\u201cA Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using,\u201d 2017, by Roger A.&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-candidate-book-review-a-data-driven-computer-security-defense-the-computer-security-defense-you-should-be-using\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-statement-regarding-tariffs\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/MtMgotWn0y8\"\n\t\t\t\t\t\t\t\t\t     alt=\"Palo Alto Networks Statement Regarding Tariffs\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-statement-regarding-tariffs\/\">Palo Alto Networks Statement Regarding Tariffs<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-statement-regarding-tariffs\/\">October 25, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Palo Alto Networks is a US-based manufacturer that relies on a global supply chain. Some components we import for final&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/palo-alto-networks-statement-regarding-tariffs\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cloud-managed-prisma-access\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/11\/image1-2.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Introducing Cloud Managed Prisma Access!\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cloud-managed-prisma-access\/\">Introducing Cloud Managed Prisma Access!<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cloud-managed-prisma-access\/\">October 23, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Introducing Cloud Managed Prisma Access! Prisma Access gives you protection at scale, with global coverage for all your users\u2013at headquarters,&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/introducing-cloud-managed-prisma-access\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/ssl-tls-decryption-can-help-with-gdpr-compliance\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/5aJiwUDKk7o\"\n\t\t\t\t\t\t\t\t\t     alt=\"SSL\/TLS Decryption Can Help with GDPR Compliance\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/ssl-tls-decryption-can-help-with-gdpr-compliance\/\">SSL\/TLS Decryption Can Help with GDPR Compliance<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/ssl-tls-decryption-can-help-with-gdpr-compliance\/\">October 19, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By John Harrison, Regional Product Marketing Manager, EMEA, and Fred Streefland, Regional Chief Security Officer You might be surprised to&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/ssl-tls-decryption-can-help-with-gdpr-compliance\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/the-zero-trust-approach-for-the-cloud\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/eFH3CLyNZj8\"\n\t\t\t\t\t\t\t\t\t     alt=\"The Zero Trust Approach for the Cloud\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/the-zero-trust-approach-for-the-cloud\/\">The Zero Trust Approach for the Cloud<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/the-zero-trust-approach-for-the-cloud\/\">September 06, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>By\u00a0Evin Safdia, Technical Marketing Manager, Prisma \u00a0 The term \u201cZero Trust\u201d has been around for almost 10 years, but it&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/the-zero-trust-approach-for-the-cloud\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/recognizing-our-nextwave-global-partners-of-the-year\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/09\/Global-Partners-500x253.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Recognizing Our NextWave Global Partners of the Year\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/recognizing-our-nextwave-global-partners-of-the-year\/\">Recognizing Our NextWave Global Partners of the Year<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/recognizing-our-nextwave-global-partners-of-the-year\/\">September 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>I am incredibly proud to recognize our Global NextWave Partner Award winners for 2019. This recognition is presented to an&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/recognizing-our-nextwave-global-partners-of-the-year\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-book-review-hacks-that-shocked-the-world\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/X5kbIDe5FSQ\"\n\t\t\t\t\t\t\t\t\t     alt=\"Cyber Canon Book Review: Hacks that Shocked the World\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-book-review-hacks-that-shocked-the-world\/\">Cyber Canon Book Review: Hacks that Shocked the World<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-book-review-hacks-that-shocked-the-world\/\">September 04, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>We modeled the\u00a0Cybersecurity Canon\u00a0after the Baseball Hall of Fame and the Rock & Roll Hall of Fame, except for cybersecurity&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cyber-canon-book-review-hacks-that-shocked-the-world\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-people-from-more-and-more-places\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/VEw1BFeTQ4U\"\n\t\t\t\t\t\t\t\t\t     alt=\"Protecting People from More and More Places\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-people-from-more-and-more-places\/\">Protecting People from More and More Places<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-people-from-more-and-more-places\/\">September 03, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Securing headquarters, data centers, branch offices and mobile users isn\u2019t easy \u2013 especially when organizations take a traditional approach toward&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/protecting-people-from-more-and-more-places\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/irelands-commitment-to-cybersecurity\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/qEvdxI3KNHk\"\n\t\t\t\t\t\t\t\t\t     alt=\"Ireland\u2019s Commitment to Cybersecurity\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/irelands-commitment-to-cybersecurity\/\">Ireland\u2019s Commitment to Cybersecurity<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/irelands-commitment-to-cybersecurity\/\">August 29, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>I recently visited Dublin, where I met with government and business leaders who are keen on innovating in cybersecurity. It&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/irelands-commitment-to-cybersecurity\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/launching-our-new-beacon-portal\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/beacon-process.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Launching our New Beacon Portal\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/launching-our-new-beacon-portal\/\">Launching our New Beacon Portal<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/launching-our-new-beacon-portal\/\">August 27, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019re excited to launch Beacon \u2013 our new digital platform that provides you with a fun, simple way to learn&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/launching-our-new-beacon-portal\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/seeking-opportunities-and-taking-risks\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/12Am6azMxk1GueQb7b8Kdi-ew.jpeg\"\n\t\t\t\t\t\t\t\t\t     alt=\"Seeking Opportunities and Taking Risks\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/seeking-opportunities-and-taking-risks\/\">Seeking Opportunities and Taking Risks<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/seeking-opportunities-and-taking-risks\/\">August 23, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>This piece was originally published July 31 on Diversity Unscripted. \u00a0 I started my career in pure sciences, specifically in&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/seeking-opportunities-and-taking-risks\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-vulnerable-to-denial-of-service-attacks\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/dn9JOboBnwI\"\n\t\t\t\t\t\t\t\t\t     alt=\"Kubernetes \u2013 Vulnerable to Denial-of-Service Attacks\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-vulnerable-to-denial-of-service-attacks\/\">Kubernetes \u2013 Vulnerable to Denial-of-Service Attacks<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-vulnerable-to-denial-of-service-attacks\/\">August 23, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>On Wednesday, the Kubernetes Product Security Committee disclosed two new vulnerabilities affecting all versions. The issues are related to eight&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-vulnerable-to-denial-of-service-attacks\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/uniting-dev-and-sec-teams-by-putting-security-first\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/bvfXx1TEhes\"\n\t\t\t\t\t\t\t\t\t     alt=\"Uniting Dev and Sec Teams by Putting Security First\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/uniting-dev-and-sec-teams-by-putting-security-first\/\">Uniting Dev and Sec Teams by Putting Security First<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/uniting-dev-and-sec-teams-by-putting-security-first\/\">August 23, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>From product teams to architects to developers, \u201cshift left\u201d security is becoming more an integral part of everyday vocabulary. It&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/uniting-dev-and-sec-teams-by-putting-security-first\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/build-a-rock-solid-business-case-for-detection-and-response\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/oiLlr2i0N3c\"\n\t\t\t\t\t\t\t\t\t     alt=\"Build a Rock Solid Business Case for Detection and Response\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/build-a-rock-solid-business-case-for-detection-and-response\/\">Build a Rock Solid Business Case for Detection and Response<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/build-a-rock-solid-business-case-for-detection-and-response\/\">August 22, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>In February, we unveiled Cortex XDR, the world\u2019s first detection and response app that breaks down security silos to stop&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/build-a-rock-solid-business-case-for-detection-and-response\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/tech-docs-put-prisma-access-1-4-in-charge-for-consistent-security\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/tech-docs-1-500x281.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Tech Docs: Put Prisma Access 1.4 in Charge for Consistent Security\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/tech-docs-put-prisma-access-1-4-in-charge-for-consistent-security\/\">Tech Docs: Put Prisma Access 1.4 in Charge for Consistent Security<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/tech-docs-put-prisma-access-1-4-in-charge-for-consistent-security\/\">August 19, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Prisma Access (formerly GlobalProtect cloud service) has a new name and introduces new features that you can use for consistent&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/tech-docs-put-prisma-access-1-4-in-charge-for-consistent-security\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/galdeleon-2-500x333.jpg\"\n\t\t\t\t\t\t\t\t\t     alt=\"Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft\/\">Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft\/\">August 16, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Palo Alto Networks is proud that Microsoft has recognized our Unit 42 global threat intelligence team with multiple awards for&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/unit-42-named-top-zero-day-vulnerability-contributor-by-microsoft\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/retailers-store-digital-transformation-means-upping-your-cybersecurity-game\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/ByezVxTXriY\"\n\t\t\t\t\t\t\t\t\t     alt=\"Retailers: Store Digital Transformation Means Upping your Cybersecurity Game\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/retailers-store-digital-transformation-means-upping-your-cybersecurity-game\/\">Retailers: Store Digital Transformation Means Upping your Cybersecurity Game<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/retailers-store-digital-transformation-means-upping-your-cybersecurity-game\/\">August 16, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>E-commerce is growing steadily worldwide, yet seven out of ten retail purchases are still made in stores. This does not&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/retailers-store-digital-transformation-means-upping-your-cybersecurity-game\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/north-dakotas-big-cybersecurity-vision\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/North-Dakota-cyber-stats-1024x558.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"North Dakota\u2019s Big Cybersecurity Vision\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/north-dakotas-big-cybersecurity-vision\/\">North Dakota\u2019s Big Cybersecurity Vision<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/north-dakotas-big-cybersecurity-vision\/\">August 14, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>This piece was originally published August 6 on Security Roundtable. The people of North Dakota have a lot to be&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/north-dakotas-big-cybersecurity-vision\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-are-having-an-automation-awakening\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/SOAR2520Report2520Blog2520Screenshot25201.png3Fwidth3D95526name3DSOAR2520Report2520Blog2520Screenshot25201.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Security Teams Are Having an Automation Awakening\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-are-having-an-automation-awakening\/\">Security Teams Are Having an Automation Awakening<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-are-having-an-automation-awakening\/\">August 13, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>This piece was originally published August 7 on the Demisto blog. For the third annual report on the state of&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-are-having-an-automation-awakening\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/xdr-gains-traction-as-customers-analysts-vendors-embrace-new-category\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/1WBF86nv8zc\"\n\t\t\t\t\t\t\t\t\t     alt=\"XDR Gains Traction as Customers, Analysts, Vendors Embrace New Category\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/xdr-gains-traction-as-customers-analysts-vendors-embrace-new-category\/\">XDR Gains Traction as Customers, Analysts, Vendors Embrace New Category<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/xdr-gains-traction-as-customers-analysts-vendors-embrace-new-category\/\">August 12, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Palo Alto Networks founder Nir Zuk last year called for radically transforming the security market by creating a new product&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/xdr-gains-traction-as-customers-analysts-vendors-embrace-new-category\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-penetration-test-report-insights-and-twistlock-response\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/CHbVDa1WgZY\"\n\t\t\t\t\t\t\t\t\t     alt=\"Kubernetes Penetration Test Report: Insights and Twistlock Response\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-penetration-test-report-insights-and-twistlock-response\/\">Kubernetes Penetration Test Report: Insights and Twistlock Response<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-penetration-test-report-insights-and-twistlock-response\/\">August 09, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>The Cloud Native Computing Foundation (CNCF) late last year commissioned a penetration test to identify unknown security vulnerabilities and design&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/kubernetes-penetration-test-report-insights-and-twistlock-response\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/from-devops-vs-secops-to-devsecops\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/QGN6RxoNFz4\"\n\t\t\t\t\t\t\t\t\t     alt=\"From \u2018DevOps vs. SecOps\u2019 to DevSecOps\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/from-devops-vs-secops-to-devsecops\/\">From \u2018DevOps vs. SecOps\u2019 to DevSecOps<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/from-devops-vs-secops-to-devsecops\/\">August 09, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>DHI Group runs 100% in AWS. We provide a job recruiting platform for technical candidates and businesses in the United&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/from-devops-vs-secops-to-devsecops\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-bps-test-palo-alto-networks-earns-recommended-rating\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/0hSgdz3ijBY\"\n\t\t\t\t\t\t\t\t\t     alt=\"NSS Labs 2019 BPS Test: Palo Alto Networks Earns \u2018Recommended\u2019 Rating\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-bps-test-palo-alto-networks-earns-recommended-rating\/\">NSS Labs 2019 BPS Test: Palo Alto Networks Earns \u2018Recommended\u2019 Rating<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-bps-test-palo-alto-networks-earns-recommended-rating\/\">August 07, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Palo Alto Networks achieved a \u201cRecommended\u201d rating in the 2019 NSS Labs Breach Prevention Systems (BPS) test, the highest rating&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-bps-test-palo-alto-networks-earns-recommended-rating\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/8-tips-for-surviving-black-hat-and-other-hostile-networks\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/T8zKTdR6mLE\"\n\t\t\t\t\t\t\t\t\t     alt=\"8 Tips for Surviving Black Hat and Other Hostile Networks\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/8-tips-for-surviving-black-hat-and-other-hostile-networks\/\">8 Tips for Surviving Black Hat and Other Hostile Networks<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/8-tips-for-surviving-black-hat-and-other-hostile-networks\/\">August 06, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>For the third year in a row, Palo Alto Networks will collaborate with other top security vendors and experts who&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/8-tips-for-surviving-black-hat-and-other-hostile-networks\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/sega-europe-you-cannot-protect-what-you-cannot-see-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/cfVvq6J3nC4\"\n\t\t\t\t\t\t\t\t\t     alt=\"SEGA Europe: You Cannot Protect What You Cannot See\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/sega-europe-you-cannot-protect-what-you-cannot-see-2\/\">SEGA Europe: You Cannot Protect What You Cannot See<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/sega-europe-you-cannot-protect-what-you-cannot-see-2\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>As a prolific game developer and publisher with six studios across four countries, SEGA Europe needed greater visibility into\u00a0 vulnerabilities&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/sega-europe-you-cannot-protect-what-you-cannot-see-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/change-healthcares-road-to-cloud-compliance-is-paved-with-lessons-learned\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/6OLNDuFoxe4\"\n\t\t\t\t\t\t\t\t\t     alt=\"Change Healthcare\u2019s  Road to Cloud Compliance is Paved with Lessons Learned\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/change-healthcares-road-to-cloud-compliance-is-paved-with-lessons-learned\/\">Change Healthcare\u2019s  Road to Cloud Compliance is Paved with Lessons Learned<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/change-healthcares-road-to-cloud-compliance-is-paved-with-lessons-learned\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Traditionally, Change Healthcare operated in a legacy data center environment. That is until about 5 years ago when we set&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/change-healthcares-road-to-cloud-compliance-is-paved-with-lessons-learned\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/two-weapons-to-help-u-s-govt-combat-cyberthreats-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/luBsuZcpKTU\"\n\t\t\t\t\t\t\t\t\t     alt=\"Two Weapons to Help U.S. Govt Combat Cyberthreats\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/two-weapons-to-help-u-s-govt-combat-cyberthreats-2\/\">Two Weapons to Help U.S. Govt Combat Cyberthreats<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/two-weapons-to-help-u-s-govt-combat-cyberthreats-2\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Federal agencies face a conundrum: They are the targets of relentless cyberattacks yet lack enough skilled personnel to combat them.&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/two-weapons-to-help-u-s-govt-combat-cyberthreats-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/advantages-of-cloud-delivered-security-for-u-s-govt-agencies-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/GyGa0TV_KhY\"\n\t\t\t\t\t\t\t\t\t     alt=\"Advantages of Cloud-Delivered Security for U.S. Govt Agencies\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/advantages-of-cloud-delivered-security-for-u-s-govt-agencies-2\/\">Advantages of Cloud-Delivered Security for U.S. Govt Agencies<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/advantages-of-cloud-delivered-security-for-u-s-govt-agencies-2\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Last year, three-quarters of the U.S. federal government\u2019s IT budget were spent on supporting and maintaining legacy systems. Combined with&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/advantages-of-cloud-delivered-security-for-u-s-govt-agencies-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/how-the-girl-scouts-and-palo-alto-networks-are-creating-opportunity\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/Lindsey_1-500x667.jpg\"\n\t\t\t\t\t\t\t\t\t     alt=\"How the Girl Scouts and Palo Alto Networks Are Creating Opportunity\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/how-the-girl-scouts-and-palo-alto-networks-are-creating-opportunity\/\">How the Girl Scouts and Palo Alto Networks Are Creating Opportunity<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/how-the-girl-scouts-and-palo-alto-networks-are-creating-opportunity\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Lindsey Sanford is the Global Employer Brand Program Manager at Palo Alto Networks. She lives in Reno, Nevada, and has&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/how-the-girl-scouts-and-palo-alto-networks-are-creating-opportunity\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/4-practical-steps-for-shift-left-security\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/Shift-Left.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"4 Practical Steps for \u2018Shift Left\u2019 Security\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/4-practical-steps-for-shift-left-security\/\">4 Practical Steps for \u2018Shift Left\u2019 Security<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/4-practical-steps-for-shift-left-security\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Since the beginning of modern computing, security has largely been divorced from software development. Recent vulnerability research confirms this. Consider&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/4-practical-steps-for-shift-left-security\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/how-to-help-soc-analysts-fight-alert-fatigue\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/Mitre-blog-illustration-01-1.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"How to Help SOC Analysts Fight \u2018Alert Fatigue\u2019\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/how-to-help-soc-analysts-fight-alert-fatigue\/\">How to Help SOC Analysts Fight \u2018Alert Fatigue\u2019<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/how-to-help-soc-analysts-fight-alert-fatigue\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Palo Alto Networks survey data shows that SOC analysts are only able to handle 14% of alerts generated by security&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/how-to-help-soc-analysts-fight-alert-fatigue\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/seven-guiding-principles-to-selecting-the-right-cloud-security-solution\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/08\/allan-kristensen.jpeg\"\n\t\t\t\t\t\t\t\t\t     alt=\"Seven Guiding Principles to Selecting the Right Cloud Security Solution\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/seven-guiding-principles-to-selecting-the-right-cloud-security-solution\/\">Seven Guiding Principles to Selecting the Right Cloud Security Solution<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/seven-guiding-principles-to-selecting-the-right-cloud-security-solution\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Allan Kristensen, Sr. Director, Systems Engineering, Public Cloud at Palo Alto Networks.I recently had the opportunity to chat with Palo&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/seven-guiding-principles-to-selecting-the-right-cloud-security-solution\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-ngfw-group-test-highest-security-effectiveness-score\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/r61tu8hBVDg\"\n\t\t\t\t\t\t\t\t\t     alt=\"NSS Labs 2019 NGFW Group Test: Highest Security Effectiveness Score\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-ngfw-group-test-highest-security-effectiveness-score\/\">NSS Labs 2019 NGFW Group Test: Highest Security Effectiveness Score<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-ngfw-group-test-highest-security-effectiveness-score\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>We are excited to announce that Palo Alto Networks has achieved the highest Security Effectiveness score among all twelve products&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/nss-labs-2019-ngfw-group-test-highest-security-effectiveness-score\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/how-western-asset-management-is-mitigating-cloud-threats\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/7WUCuMqnslU\"\n\t\t\t\t\t\t\t\t\t     alt=\"How Western Asset Management Is Mitigating Cloud Threats\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/how-western-asset-management-is-mitigating-cloud-threats\/\">How Western Asset Management Is Mitigating Cloud Threats<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/how-western-asset-management-is-mitigating-cloud-threats\/\">August 05, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Banking, investment management and FinTech have continually invested in technology upgrades, data analytics and differentiated product offerings in an increasingly&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/how-western-asset-management-is-mitigating-cloud-threats\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/XDR-1-500x282.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Security Teams Deserve a Better Approach to Detection and Response\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response-2\/\">Security Teams Deserve a Better Approach to Detection and Response<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>For many organizations, security teams are the first line of defense against all known and unknown threats. The core function&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/fig1-container-sec-500x215.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Runc and CVE- 2019-5736: A Container Security Triad Love Story\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story-2\/\">Runc and CVE- 2019-5736: A Container Security Triad Love Story<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>If you\u2019ve been putting off addressing container security, today might be the day to make it a priority. In the&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/ZT-Defines-NS-500x281.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"You Want Network Segmentation, But You Need Zero Trust\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust-2\/\">You Want Network Segmentation, But You Need Zero Trust<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>In this blog series, I\u2019ve been giving sufficient commentary on Zero Trust in order to dispel much of the mythology&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/when-scripts-attack-wildfire-protects-2\/\">When Scripts Attack, WildFire Protects<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/when-scripts-attack-wildfire-protects-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Adversaries look for fast and easy ways to steal data. Among the many techniques in their playbooks, using scripts is&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/when-scripts-attack-wildfire-protects-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/2122.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment-2\/\">Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Over the past several months, customers have been asking for the ability to run a Best Practice Assessment (BPA) more&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/Machine-Learning_1.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Machine Learning: Your Unfair Advantage Against Attackers\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers-2\/\">Machine Learning: Your Unfair Advantage Against Attackers<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>In the never-ending arms race between threat actors and defenders, automation and machine learning have become your ultimate weapons. Today,&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/cybersecuity-canon-blog-600x260.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Cybersecurity Canon Candidate Book Review: \u201cAbundance: The Future Is Better Than You Think\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think-2\/\">Cybersecurity Canon Candidate Book Review: \u201cAbundance: The Future Is Better Than You Think<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>We modeled the\u00a0Cybersecurity Canon\u00a0after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you-2\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/Picture1-2.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you-2\/\">Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity needs you. Beginning a new career path in cybersecurity can be daunting, especially if you don\u2019t know what to&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/understanding-illicit-cryptocurrency-mining-threats-and-best-practices-for-prevention-2\/\">Understanding Illicit Cryptocurrency Mining: Threats and Best Practices for Prevention<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/understanding-illicit-cryptocurrency-mining-threats-and-best-practices-for-prevention-2\/\">May 02, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Anything that has significant monetary value eventually attracts criminal activity. Such is the case with cryptocurrency, which since its earliest&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/understanding-illicit-cryptocurrency-mining-threats-and-best-practices-for-prevention-2\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/all-layers-are-not-created-equal\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/Old-Layer-3-500x281.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"All Layers Are Not Created Equal\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/all-layers-are-not-created-equal\/\">All Layers Are Not Created Equal<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/all-layers-are-not-created-equal\/\">May 01, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0 How the Principles of Journalism Help Define Zero Trust Policy Everyone knows that in order for a news article,&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/all-layers-are-not-created-equal\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/XDR-1-500x282.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Security Teams Deserve a Better Approach to Detection and Response\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response\/\">Security Teams Deserve a Better Approach to Detection and Response<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response\/\">February 20, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>For many organizations, security teams are the first line of defense against all known and unknown threats. The core function&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/fig1-container-sec-500x215.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Runc and CVE- 2019-5736: A Container Security Triad Love Story\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story\/\">Runc and CVE- 2019-5736: A Container Security Triad Love Story<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story\/\">February 12, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>If you\u2019ve been putting off addressing container security, today might be the day to make it a priority. In the&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/runc-and-cve-2019-5736-a-container-security-triad-love-story\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/ZT-Defines-NS-500x281.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"You Want Network Segmentation, But You Need Zero Trust\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust\/\">You Want Network Segmentation, But You Need Zero Trust<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust\/\">January 17, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>In this blog series, I\u2019ve been giving sufficient commentary on Zero Trust in order to dispel much of the mythology&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/you-want-network-segmentation-but-you-need-zero-trust\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/when-scripts-attack-wildfire-protects\/\">When Scripts Attack, WildFire Protects<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/when-scripts-attack-wildfire-protects\/\">January 16, 2019<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Adversaries look for fast and easy ways to steal data. Among the many techniques in their playbooks, using scripts is&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/when-scripts-attack-wildfire-protects\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/2122.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment\/\">Build Confidence in Your Security Controls with a Self-Service Best Practice Assessment<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment\/\">November 07, 2018<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Over the past several months, customers have been asking for the ability to run a Best Practice Assessment (BPA) more&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/build-confidence-in-your-security-controls-with-a-self-service-best-practice-assessment\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/Machine-Learning_1.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Machine Learning: Your Unfair Advantage Against Attackers\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers\/\">Machine Learning: Your Unfair Advantage Against Attackers<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers\/\">October 26, 2018<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>In the never-ending arms race between threat actors and defenders, automation and machine learning have become your ultimate weapons. Today,&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/machine-learning-your-unfair-advantage-against-attackers\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/cybersecuity-canon-blog-600x260.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Cybersecurity Canon Candidate Book Review: \u201cAbundance: The Future Is Better Than You Think\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think\/\">Cybersecurity Canon Candidate Book Review: \u201cAbundance: The Future Is Better Than You Think<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think\/\">September 26, 2018<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>We modeled the\u00a0Cybersecurity Canon\u00a0after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/cybersecurity-canon-candidate-book-review-abundance-the-future-is-better-than-you-think\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/Picture1-2.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you\/\">Get Your Copy of the Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you\/\">September 25, 2018<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity needs you. Beginning a new career path in cybersecurity can be daunting, especially if you don\u2019t know what to&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/get-your-copy-of-the-cybersecurity-career-guide-who-works-in-cybersecurity-how-we-got-started-why-we-need-you\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/understanding-illicit-cryptocurrency-mining-threats-and-best-practices-for-prevention\/\">Understanding Illicit Cryptocurrency Mining: Threats and Best Practices for Prevention<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/understanding-illicit-cryptocurrency-mining-threats-and-best-practices-for-prevention\/\">September 19, 2018<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>Anything that has significant monetary value eventually attracts criminal activity. Such is the case with cryptocurrency, which since its earliest&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/understanding-illicit-cryptocurrency-mining-threats-and-best-practices-for-prevention\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div class=\"post-grid grid-3\">\n\t\t\t\t\t<div class=\"kc-list-item-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/define-a-protect-surface-to-massively-reduce-your-attack-surface\/\" class=\"entry-thumb-link\">\n\t\t\t\t\t\t\t\t<div class=\"entry-thumb-wrapper\">\n\t\t\t\t\t\t\t\t\t<img src=\"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/04\/thought_1.png\"\n\t\t\t\t\t\t\t\t\t     alt=\"Define a Protect Surface to Massively Reduce Your Attack Surface\"\/>\n\t\t\t\t\t\t\t\t\t<div class=\"entry-thumb-overlay\"><\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t<h2 class=\"post-title-alt\"><a\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/define-a-protect-surface-to-massively-reduce-your-attack-surface\/\">Define a Protect Surface to Massively Reduce Your Attack Surface<\/a>\n\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"kc-post-author\"><a\n\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/author\/admin\/\"\n\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Posts by admin\"\n\t\t\t\t\t\t\t\t\t\t\t\trel=\"author\">admin<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-date\"><a\n\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.ideus.com.tr\/index.php\/define-a-protect-surface-to-massively-reduce-your-attack-surface\/\">September 04, 2018<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"entry-cats\"><a href=\"https:\/\/www.ideus.com.tr\/index.php\/category\/paloalto-blog\/\" rel=\"category tag\">PaloAlto Blog<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"entry-excerpt\">\n\t\t\t\t\t\t\t\t\t<p>In cybersecurity, one of the things people tend to focus on the least is defining what they\u2019re trying to protect.&hellip;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ideus.com.tr\/index.php\/define-a-protect-surface-to-massively-reduce-your-attack-surface\/\"\n\t\t\t\t\t\t\t   class=\"kc-post-2-button\">Read more <i\n\t\t\t\t\t\t\t\t\tclass=\"fa fa-angle-right\" aria-hidden=\"true\"><\/i><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\n<\/div>\n<\/div><\/div><\/div><\/div><\/section><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-king-composer.php","meta":{"spay_email":""},"_links":{"self":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/1304"}],"collection":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=1304"}],"version-history":[{"count":13,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/1304\/revisions"}],"predecessor-version":[{"id":8583,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/1304\/revisions\/8583"}],"wp:attachment":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=1304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}