Date

Education and Professional Services

Displaying 61 - 90 of 4778

Article

What Is DevSecOps?

DevSecOps refers to the concept of making software security a core part of the overall software delivery process.

Article

Android Toast Overlay Attack

A vulnerability that affects Android devices running operating systems older than 8.0 Oreo leaves users at risk of an Android Toast Overlay attack.

Article

What is a Cloud-Native Security Platform (CNSP)?

This new approach brings a multitude of benefits, such as shorter time to market and faster delivery, but it also introduces security challenges

Article

What Is Platform as a Service?

PaaS is a cloud computing service model that allows users to rent hardware and software tools over the internet to create software and applications.

Article

What is a Data Center?

A data center is a facility that centralizes an organization’s shared IT operations and equipment for the purposes of storing and processing data

Article

What is an Intrusion Prevention System?

An IPS is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

Unit 42

Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2020-17496

We provide an analysis of CVE-2020-17496, proof of concept code to demonstrate the vulnerability and information on attacks we have observed.
Haozhe ZhangQi DengZhibin ZhangRuchna Nigam,

White Paper

Firewalls in the Modern Enterprise: A new SANS survey white paper

Read SANS recent survey on how organizations manage network security in hybrid deployments, including cloud computing, containers and virtualized systems.

References and Case Studies

Diamond Crystal Case Study - Palo Alto Networks CloudGenix SD-WAN

Read this Diamond Crystal case study to learn why they chose CloudGenix SD-WAN.

References and Case Studies

Yancey Bros. Case Study - Palo Alto Networks CloudGenix SD-WAN

Read this case study to learn why Yancey Bros. chose CloudGenix SD-WAN.

Article

What is Branch Office Network Security?

Branch office network security represents the means to secure internet traffic between branch offices, data centers and remote employees.

Article

What Is a Hybrid Data Center?

The hybrid data center enables greater IT efficiency, and automation, supporting the delivery of new application workloads across network fabric

Article

What Is a Cloud Access Security Broker?

Cloud access security brokers, or CASBs, are security policy enforcement points that sit between a cloud service provider and its users.

Article

What is a Software-Defined-Wide-Area-Network (SD-WAN)

Software-defined wide area network is a virtualized service that connects and extends enterprise networks over large geographic distances.

Article

What Is a Site-to-Site VPN?

A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network.

Article

What Is a SOC?

A security operations center, is a physical room or area in an organization’s office where cybersecurity analysts work to monitor enterprise systems

Article

What Is a Transit Virtual Private Cloud (VPC)?

A transit VPC is a gateway architecture used to connect geographically dispersed VPCs or VNets to each other and remote networks.

Article

What Is a Virtual Firewall?

A virtual firewall is a network security solution designed specifically for environments in which deploying hardware firewalls is difficult

Article

What is a VPN?

A virtual private network (VPN) allows you to safely connect to another network over the internet by encrypting the connection from your device.

Article

What is Zero Trust?

Zero Trust has become one of cybersecurity’s latest buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.

Article

What Is Zero Trust for the Cloud?

Zero Trust is an IT security model that eliminates the notion of trust to protect networks, applications and data, unlike the perimeter security model

Article

What is an Endpoint?

An endpoint is a remote computing device that communicates back and forth with a network to which it is connected.

Article

Ransomware Prevention: What Your Security Architecture Must Do

Ransomware brings operations to a halt – encrypting data and requiring payment to regain access. Architecture can make ransomware prevention real.

Article

Browser Cryptocurrency Mining

Cybercriminals have embraced the anonymous nature of cryptocurrency as a new preferred method of profit.

Article

What Is a Cloud VPN?

A cloud VPN (aka a virtual private network as a service or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.

Article

What is BeyondCorp?

BeyondCorp is a cybersecurity architecture developed at Google which shifts access control from traditional network perimeters to individual devices

Article

What Is Dynamic DNS?

Domain Name System (DNS) or Dynamic DNS? What's the difference and why should you care?

Article

What Is Cloud Data Protection?

Cloud data protection is the practice of securing a company’s data in a cloud environment, wherever that data is located.

Article

What Is Cloud Native?

Cloud native describes an approach to designing, implementing and operating applications while taking advantage of the products offered by CSPs

Article

What Is Cloud Native Security?

Cloud native technologies have rendered traditional models of software development obsolete, doing away with monolithic application architecture
Displaying 61 - 90 of 4778