Palo Alto Networks
Code42 and Palo Alto Networks Cortex XSOAR manage data risk beyond the corporate network
Code42, the leader in insider threat detection, investigation and response, is now integrated with Palo Alto Networks Cortex XSOAR (previously Demisto), the industry’s first …
Sixgill’s cyber threat intelligence solution integrates with Palo Alto Networks Cortex XSOAR
Sixgill, a leading cyber threat intelligence company, announced that its Deep and Dark Web Threat Intelligence Solution, an automated and contextual cyber threat intelligence …

Why we need to secure IoT connections sooner rather than later
IoT products offer many conveniences but there are massive amounts of data being transferred to and from these services vulnerable to attack if left unsecured. In this …

What is open threat intelligence and what is driving it?
In this podcast recorded at RSA Conference 2020, Todd Weller, Chief Strategy Officer at Bandura Cyber, discusses the modern threat intelligence landscape and the …
Palo Alto Networks unveils Cortex XSOAR, a security orchestration, automation and response platform
Palo Alto Networks, the global cybersecurity leader, introduced Cortex XSOAR, an extended security orchestration, automation and response platform that empowers security …
Trustwave releases consulting and managed security services for Palo Alto Networks Prisma Cloud
Trustwave unveiled a new portfolio of consulting and managed security services for Palo Alto Networks Prisma Cloud, the industry’s most comprehensive cloud native security …
Cisco, Fortinet, Palo Alto Networks and SonicWall get NetSecOPEN certified performance results
NetSecOPEN, the first industry organization focused on the creation of open, transparent network security performance testing standards, announced that Cisco, Fortinet, Palo …

43% of cloud databases are currently unencrypted
Palo Alto Networks released research showing how vulnerabilities in the development of cloud infrastructure are creating significant security risks. Alerts and events for …

Cryptojacking worm compromised over 2,000 Docker hosts
Security researchers have discovered a cryptojacking worm that propagates using containers in the Docker Engine (Community Edition) and has spread to more than 2,000 …
Citrix and Palo Alto Networks enable multi-layer security across branches and workspaces
Business today is more global and collaborative than ever. People work anywhere, anytime on any number of devices. And they access and share information and ideas across …

Should you block newly registered domains? Researchers say yes
7 out of 10 newly registered domains (NRDs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access …

Which are the most capable breach prevention systems?
NSS Labs released its Analysis of Breach Prevention Systems (BPS) – solution suites, involving endpoint, network, sandbox, cloud, and other integrated protections. …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility