Traps “Recommended” in NSS Labs Advanced Endpoint Protection Test

Traps “Recommended” in NSS Labs Advanced Endpoint Protection Test

We are excited to announce that Palo Alto Networks Traps advanced endpoint protection has achieved a “Recommended” rating, and is positioned in the upper-right corner of the NSS Labs AEP Security Value Map (SVM), indicating outstanding protection and low total cost of ownership. Attackers must complete a certain sequence of events to successfully accomplish their objectives, [...]

See the Graph Security API in Action at RSA Conference 2018

See the Graph Security API in Action at RSA Conference 2018

Today, Microsoft announced the public preview of their Microsoft Graph Security API. The security API enables a single point of programmatic access to aggregated security insights from Microsoft and partner security solutions, as well as business information from other Microsoft Graph entities (Office 365, Azure Active Directory, Intune, and more) that can add high-value context to [...]

What the Skills Shortage Means for Existing Cybersecurity Practitioners

What the Skills Shortage Means for Existing Cybersecurity Practitioners

By now, most practitioners have heard (probably from a few different sources) that organizations struggle when it comes to finding, hiring and retaining the right resources for information security and/or cybersecurity professionals. There has been quite a bit written about this trend: the impact that it has on security efforts within enterprise, advice and guidance [...]

Digital Transformation Gets Easier When Security Just Works

Digital Transformation Gets Easier When Security Just Works

When I ask customers what they like about Palo Alto Networks, their answer is consistent: it just works. They can operate efficiently and prevent successful cyberattacks. Our Security Operating Platform is built for automation – it has to be easy to operate if we’re going to help our customers achieve digital transformation. You may not recognize the name “Security [...]

Two Steps to a Robust Security Culture

Two Steps to a Robust Security Culture

By Kwinton Scarbrough, CISSP In the midst of the business and technology merge, organizations of all industries have started their journey into the cognitive era of cybersecurity. In this era, it is essential for a business to have an IT security strategy to govern how the organization will protect itself from internal and external cyber [...]