Palo Alto Networks Blog

Description:

Palo Alto Networks Blog

URL:

http://researchcenter.paloaltonetworks.com/

Catalog:

Technology → Security
Tech → Bezpečnost

Publishes:

4.2 items/week

Channel Scoop – May 17, 2019

17.May
We hope you’ve enjoyed reading the Channel Scoop each week. We are now launching the Channels Weekly with the same great content. The post Channel Scoop – May 17, 2019 appeared first on Palo Alto Networks Blog .

Four Cloud Security Concerns (and How to Address Them)

16.May
When it comes to cloud security today, there are many issues that organizations are trying to sort through. Here are a few I hear the most and how I suggest addressing them The post Four Cloud Security Concerns (and How to Address Them) appeared first on Palo Alto Networks Blog .

Cyber Canon Book Review: Digital Resilience

15.May
We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except this canon is for cybersecurity books. The post Cyber Canon Book Review: Digital Resilience appeared first on Palo Alto Networks Blog .

How Are You Tackling Cloud Compliance?

14.May
Can you demonstrate cloud compliance without overworking your teams in the process? The post How Are You Tackling Cloud Compliance? appeared first on Palo Alto Networks Blog .

The Greatest Risk Is Not Doing a Risk Assessment

13.May
Effective cybersecurity requires a holistic strategy that begins with creating a risk assessment. The post The Greatest Risk Is Not Doing a Risk Assessment appeared first on Palo Alto Networks Blog .

Channel Scoop – May 10, 2019

10.May
Check out the latest Channel Scoop. The post Channel Scoop – May 10, 2019 appeared first on Palo Alto Networks Blog .

Set It and Forget It? Not for Cloud Security

10.May
In public clouds like AWS, Azure and GCP you need to ensure that security is continuous to match the dynamic nature of the cloud. There is no “set it and forget it” mode. The post Set It and Forget It? Not for Cloud Security appeared first on Palo Alto Networks Blog .

Unit 42 Sees Surge in Attacks by Nigerian Cybercriminals

9.May
Unit 42 has closely followed Silver Terrier since the threat research group was set up in 2014, analyzing some 1.1 million attacks to document how Nigerian cybercriminals have grown in sophistication and effectiveness over the past four years. The post Unit 42 Sees Surge in Attacks by Nigerian Cybercriminals appeared first on Palo Alto Networks Blog .

JSAC 2019: Moving Toward Whole-of-Nation Cybersecurity

8.May
We were honored to host cybersecurity leaders across military, government, academia, and industry at this year’s Joint Service Academy Cybersecurity Summit (JSAC) at the U.S. Air Force Academy. The post JSAC 2019: Moving Toward Whole-of-Nation Cybersecurity appeared first on Palo Alto Networks Blog .

Using Legislation to Your Advantage

6.May
Why regulation may not be the inhibitor you think to evolving your cybersecurity. A while back, I remember chatting with some fellow researchers about how, one day, there would be more lawyers than cybersecurity experts, as the definition of what is commercial remote administration software versus malicious backdoor software was in debate. Thankfully, that reality hasn’t come to pass. However, in an increasingly regulated society, we have seen a raft of new requirements come into force impact...
© 2000-2019 ANNECA s.r.o., Klíšská 977/77, 400 01 Ústí nad Labem, Tel: +420 478571021, Email: info@pravednes.cz, Twitter: @pravednes