Adjusting to the DevOps Mindset


There is no question about it, DevOps is coming to the forefront in enterprise. A 2014 survey from Rackspace found that 79 percent of those they surveyed plan to implement DevOps practices or approaches by the end of 2015. Meaning, most shops now are DevOps shops. For ISACA members, this can have a significant impact—security, [...]

Unit 42: Top Takeaways from Black Hat USA 2015

Unit 42: Top Takeaways from Black Hat USA 2015

With another Black Hat USA in the books, here’s what members of our Unit 42 threat intelligence team highlighted as key discussions from the week, including the importance of information sharing, mobile threats and securing the Internet of Things: For more on Palo Alto Networks at this year’s Black Hat USA, watch our on-the-scene recapand [...]

Slideshow: How Enterprises Can Break the Cyber Attack Lifecycle

Slideshow: How Enterprises Can Break the Cyber Attack Lifecycle

The Cyber Attack Lifecycle is a sequence of events that an attacker must go through to successfully infiltrate a network and exfiltrate data from it. Check out this recent eWEEK slideshow to understand how to anticipate what attackers will do and protect data wherever it resides. Want to learn more? Download this whitepaper, “Breaking the Cyber Attack [...]