By Topic
- Network Security (415)
- Cloud Security (332)
- Security Operations (236)
- Threat Detection and Prevention (232)
- Security Operating Platform (173)
- Public Cloud Security (137)
- Secure access service edge (SASE) (111)
- Network Security Management (106)
- Private Cloud Security (79)
- Security Ecosystem (78)
- + Show More
By Industry
By Type
By Product Category
Education and Professional Services
Displaying 61 - 90 of 5529
Unit 42
IAM Your Defense Against Cloud Threats: The Latest Unit 42 Cloud Threat Research
We present research highlights and recommendations for defense against cloud threats from Unit 42’s Cloud Threat Report: IAM the First Line of Defense
Unit 42,
Research Reports
2022 Cortex Xpanse Attack Surface Threat Report
Every organization’s attack surface is different. Get insights on exposures and risks that look very similar to those in your industry. Download the 2022 Cortex Xpanse Attack Surface Threat Report to learn more.
Research Reports
Executive Summary: Unit 42 Cloud Threat Report Volume 6
Palo Alto Networks Unit 42 cloud threat researchers wanted to understand who targets cloud infrastructure, how they carry out those attacks, and what they target.
Research Reports
Unit 42 Cloud Threat Report Volume 6
In this edition of the Unit 42 Cloud Threat Report, Palo Alto Networks cloud threat researchers explore how overly permissive Identity and Access Management (IAM) policies open the door for Cloud Threat Actors to target an organization’s cloud infrastructure. Download the report for the latest insights concerning.
Article
Establishing a SaaS Security Approach
SaaS apps enhance collaboration and productivity, but they come with risks. Learn the key requirements to create your SaaS security solution.
Article
What Is Firewall as a Service?
A firewall in a computer network (hardware, software or both) acts as a barrier to prevent unauthorized access to the network.
Webinar
2022 Unit 42 Ransomware Threat Report Webinar
As ransomware groups continue to disrupt business operations, hear directly from Unit 42 experts about the latest trends, insights and best practices to help you prevent, detect, respond to and recover from ransomware threats.
Article
What is XDR?
XDR is a new approach to threat detection and response, a key element of defending an organization’s infrastructure and data from damage and misuse.
Article
What Is a Cloud VPN?
A cloud VPN (aka a virtual private network as a service or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.
Unit 42
New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns
A new version of SolarMarker malware appears to upgrade evasion abilities and demonstrates that the infostealer and backdoor continues to evolve.
Shimi Cohen, Inbal Shalev, Irena Damsky,
Article
An Overview of FedRAMP and Why You Should Care About It
FedRAMP was created to minimize cybersecurity risk for federal agencies as they move to the cloud. U.S federal agencies are making security a priority
Article
How to Safely Enable Microsoft Apps on the Network
A natively integrated next-generation security platform can help secure Microsoft applications through safe enablement and prevention of threats.
Article
10 Things to Know About Machine Learning
Machine learning dynamically improves the accuracy and efficiency of threat prevention in cybersecurity. These are 10 valuable points to remember about machine learning.
Article
The Evolution of Firewalls: From Packet Filtering to Machine Learning-Powered NGFWs
Firewalls have evolved from reactive devices that control access to internal resources to proactive tools that use machine learning to enforce security policies.
Article
What is Machine Learning?
Machine learning refers to the use of artificial intelligence to give computers the ability to learn and make predictions.
Article
What is the Difference between FISMA and FedRAMP?
To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
Datasheet
Prisma Access, a FedRAMP Authorized Service
Rapidly connect remote users and branches with Prisma Access, a FedRAMP Authorized service
Article
Cloud Incident Response
Cloud incident response is the process of responding to cyberattacks in cloud environments. Learn how to manage your cloud incidents with Unit 42 experts.
Guide
SOC Guide to Attack Surface Management
Teams inside security operation centers (SOCs) have a lot on their plate. To effectively handle challenges like these, one proactive tactic SOCs have implemented is attack surface management (ASM). Read this whitepaper to learn how SOC teams can leverage ASM to take on the fiercest adversaries while focusing team resources on the most critical needs.
Article
What Is CIEM or Cloud Infrastructure and Entitlement Management?
Cloud Infrastructure and Entitlement Management (CIEM) is a relatively recent term that was introduced by Gartner in 2020 as part of the Hype Cycle for Cloud Security, 2020 research collection
Article
What Is Cloud Native Security?
Cloud native technologies have rendered traditional models of software development obsolete, doing away with monolithic application architecture
Article
What is IaC Security?
Infrastructure as code (IaC) presents an incredible opportunity to embed consistent and scalable cloud security coverage.
Article
What Is Web Application and API Protection?
Web application and API (Application Program Interfaces) protection is a set of development, integration, and deployment practices that reduces the exposure to known vulnerabilities and denial-of-service attacks.
Article
What's the Difference Between Agent-Based and Agentless Security?
In cybersecurity, agents represent specialized software components that are installed on devices for performing security-related "actions."
Article
Simplified Healthcare Compliance and Risk Management with Prisma Cloud
Reduce compliance costs, empower scale, and gain assurance you are protecting sensitive workloads by using the comprehensive HIPAA/HITRUST compliance controls offered by Prisma Cloud.
Article
What Is Least Privilege Access?
A basic best practice when configuring roles and permissions for any software environment is to apply least privilege access.
Article
Endpoint Protection
Helping visitors to understand Endpoint Protection, the various options, and how the market has progressed to provide the most robust protection from modern threats.
Article
Understanding the MITRE ATT&CK Evaluations and Framework
MITRE has identified hundreds of different techniques adversaries use to execute cyberattacks. ATT&CK organizes them into a framework to help security practitioners.
Article
What is Zero Trust Network Security?
Zero Trust Network Security is a pillar of Zero Trust based on continuously validating every digital interaction within the security infrastructure instead of trusting users based on where they are relative to the network.
Article
Data Loss Prevention – Protecting Your Sensitive Enterprise Data
Data loss prevention (DLP) is the practice of detecting and preventing data breaches or destruction of sensitive data. Explore Palo Alto Networks DLP Solution Offerings.
Displaying 61 - 90 of 5529