Palo Alto Networks added a marketplace to its security orchestration, automation, and response (SOAR) platform where customers can browse product integrations, security playbooks, and reports among other “content packs” to help them solve security use cases and protect against threats.
The cybersecurity industry is at a turning point.
Traditional security approaches were already struggling to deal with rising cyberattacks, a shift to cloud and explosive growth in Internet of Things (41.6 billion IoT devices by 2025, anyone?).
A security team from Palo Alto Networks’ Unit 42 has unearthed six containers that were housed on Docker Hub that, once instantiated, were activated by unknown parties to mine the Monero cryptocurrency.
From the industry’s first next-gen firewall for Kubernetes to gaining visibility into never-before-seen IoT devices, here are five new Palo Alto Networks tools that leverage machine learning to keep customers safe.
Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time.
D-Link has released a firmware update to fix three out of six security vulnerabilities reported for the DIR-865L wireless router model for consumers. One flaw is rated critical, others are high-severity.
From enabling multifactor authentication and extending protection beyond virtual machines to establishing rules around log analysis and remediation, here’s how businesses can get the most out of Azure Security Center.
From misconfigured storage buckets and excess privileges to Infrastructure as Code (IoC) templates and automated attacks, here’s a look at 12 of the biggest cloud threats technical experts are worried about this year.
Managed threat hunting services can help take some of the pressure off security operations centres and help ensure potential breaches don’t escalate into something far worse. We explore one such case with a happy ending
During these unprecedented times, organizations across all sectors are facing the same issue: enabling remote “business as usual” while facing extraordinary challenges of scale and secure connectivity.
Displaying 1 - 30 of 1815
Be the first to know.
As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.