Advisory and viewpoints for leaders from the global leader in cybersecurity, Palo Alto Networks.
There are robust strategies cybersecurity leaders can use to support the delivery of secure, high-quality, modern healthcare.
The best is yet to come…join us for a vital discussion on how cybersecurity coupled with AI will change the rules of the game. Hard truth? More and more attacks will utilize AI.
6 recommendations organizations can follow to develop a more practical approach to maintaining secure control over infrastructure. Learn more today.
CIOs must rethink how they approach and allocate budgets to protect the cloud. Blind spots must be eliminated in 2024.
Zero Trust provides a foundation for creating a stronger security posture in 2024.
Securing applications can only be achieved with a platform approach where developers and security teams share the same single source of truth.
AI allows organizations to embrace digital transformation and customize platformization to visualize total infrastructure and manage security threats in real-time—meeting the potential challenges of 2024.
Advanced threats are often highly persistent and can rapidly pivot when encountering roadblocks. Keen insights uncover threat actors’ ability to perform deep reconnaissance to understand their targeted environments thoroughly. Learn more today.
Exposing Muddled Libra's meticulous tactics with Kristopher Russo & David Moulton.
It’s on everyone’s mind: How will AI benefit threat actors?
As I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.
As organizations grapple with new cybersecurity challenges, the need for an efficient, effective, modern-day SOC is imperative.
Our industry has no choice but to embrace and leverage AI to fight constant threats if we are to stand any hope of defending our environments effectively.
Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way.
While securing OT systems can seem overwhelming…the task is not impossible. The power of attack surface management provides the technology needed to lock down assets in your organization.
Focus on these three disciplines to help your security and developer teams build modern, secure, and scalable engineering ecosystems in the cloud.
The cyber skills shortage is not going away anytime soon, despite the progress we are making as an industry to attract new talent. Per the latest “ISC2 Cybersecurity Workforce Study,” we added more than 460,000 warm bodies over the past y....
With CNAPPs, a single platform can protect applications at runtime while also integrating security into development workflows to identify and fix flaws early in the application lifecycle.
CISOs need a simplified approach to security solutions. The good news: cybersecurity platforms help solve the issue.
By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC - Many things challenge how we practice cybersecurity these days. Digital transformation has brought significant adoption of new technology and business m....
By Zachary Malone, SE Academy Manager at Palo Alto Networks - Next in our Beyond the Cyber Buzzwords series, this article focuses on shift-left security. Protect your next great idea by establishing a strong security posture—from code to cloud.
By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks - While mobile technology has been around for decades, the current generation, 5G, is increasingly being recognized for the exciting new benefits it brings to en....
By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks - Some economists predict that we could soon face a global recession. Looking at history, this does not bode well for levels of cybercri....
By Tapan Mehta, Global Healthcare Solutions Executive at Palo Alto Networks - Healthcare’s digital transformation has created so many new opportunities — not only for patients and care providers but also for bad actors. This article discu....
By Christian Aboujaoude, chief technology officer at Keck Medicine, USC - In the pre-pandemic days, security solutions could be more basic. Securing the perimeter could be likened to locking the door of your house. But with remote workers taking devi....
Medical IoT devices help to improve human healthcare every day. Just like humans need to do the right things to stay healthy, it’s essential for medical IoT devices to remain healthy too. Learn more about how to secure medical IoT devices.
By Ravi Balwada - From the CTO of Guitar Center, learn about how cybersecurity is better enabling their employees to provide exemplary customer experiences.
By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks - By definition, critical infrastructure is vital. It needs to be operationally resilient, be able to reduce the potential attack surface, and minimize the new o....
By John Davis, Retired U.S. Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks - In the face of increasing cyber threats, learn about two key innovations that can help keep ahead of bad actors and keep you....
Unit 42 is Palo Alto Networks' world-renowned threat intelligence and security consulting team. Executive summary of the latest Unit 42 threat research on cloud threats.
By Michael Loggins, award-winning executive IT leader - While the possibilities of Industry 4.0 are extraordinary, there is still so much to learn between IT and the factory floor. Read more ...
By Ashok Rutthan, Chief information security officer at Massmart - The significant challenges ransomware present for retail and 5 considerations for ransomware defense strategies.
By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox - Dr. May Wang shares what's missing in most risk management and the keys to creating a better strategy to....
By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox - Why has machine learning become so vital in cybersecurity? This article answers that and explores several cha....
By Keith O’Brien, Chief Technology Officer for the Service Provider line of business at Palo Alto Networks - With each successive generation, advances in mobile technology have trained us to expect ever-faster mobile speeds and the ability of t....
By Liia Sarjakoski, Principal Product Marketing Manager, 5G Security, for Palo Alto Network Security - Governments, organizations, and businesses are readily embracing transformation at the edge of mobile networks these days. Mobile edge – with....
By Tarun Khandelwal, an executive security advisor to the financial services industry and the former Head of Security Architecture at CIBC, and a Palo Alto Networks customer - Weu2019ve all seen movies and TV shows where SWAT teams or military forces....
By Derrick Lowe, Chief Information Security Officer at Orlando Health, a Palo Alto Networks customer - On the surface, cybersecurity in healthcare may not seem all that different from cybersecurity in other verticals such as financial services, retai....
By Matt Chiodi, Chief Security Officer, Public Cloud, Palo Alto Networks - Supply chain security has become top-of-mind for many leaders, as incident after incident has revealed supply chain vulnerabilities that expose significant organizational risk....
By Niall Browne, CISO - The traditional security operations center (SOC) is based on a model that has persisted for decades, yet itu2019s no longer effective. Too much has shifted in organizations and in the threat landscape for the u201cold waysu201....
By Sean Duca, Regional CSO, Palo Alto Networks - Itu2019s not about collecting everything. Itu2019s about collecting what you need and having the right people, process and technology to help improve cybersecurity outcomes. Learn more about the steps....
By Kumar Ramachandran, SVP, Products - "Software-defined WAN, better known today as SD-WAN, is not the same technology that it was when it first got started. Learn more about how enabling reliable connectivity is still a key promise of SD-WAN a....
By David Faraone, Sr. Consulting Director, Unit 42 - A board of directors can and should be thought of as the fourth line of defense for an enterpriseu2019s security. Read more about how you can establish trust with your board and enable them to part....
By Vinay Venkataraghavan, CTO - Technology Partnerships, Palo Alto Networks - Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that have t....
By Matt Kraning, CTO, Cortex - Artificial Intelligence (AI) and Machine Learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in servic....
By Zachary Malone, SE Academy Manager at Palo Alto Networks - What is SASE? Read this article to help debunk some industry myths about one of the hottest topics in cybersecurity today: SASE.
By Sergej Epp, Chief Security Officer, EMEA - While Zero Trust is a term that is often misunderstood as well as misused, it is an approach that has real value in helping to reduce systematic cyber risk and improve resiliency. Read more about how movi....
By Mario Espinoza, Vice President of SaaS Security & Data Protection at Palo Alto Networks - Enterprise data security has always been about protecting sensitive data and ensuring that it doesnu2019t fall into the hands of unauthorized people. Le....
Digital transformation is accelerating with key shifts such as the expanding Hybrid Workforce and continued migration of applications and data to the cloud. As we make this transformation, Information Security teams have the opportunity to adopt a m....
By Zachary Malone, SE Academy Manager at Palo Alto Networks - Invented in 2010 by Forrester Research, Zero Trust is a cybersecurity model enterprises can leverage to remove risky, implicitly trusted interactions between users, machines and data. The ....
Sponsored Links