Palo Alto Networks
Follow
49 Followers
Follow Palo Alto Networks on their other social channels!
About Us
Founded:
2005
Company Size:
5001-10000 employees
Company Type:
Public
Location:
Santa Clara, CA
Website:
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, custom ...
Read more
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Follow
Cybersecurity Canon Candidate Book Review: Disrupt or Die: What the World Needs to Learn from Silico
We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Plea ...
Follow
Cybersecurity Canon Candidate Review: Zero Trust Networks: Building Secure Systems in Untrusted Netw
We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except this canon is for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the ...
Follow
Cybersecurity Canon Candidate Review – Zero Trust Networks: Building Secure Systems in Untrusted N
We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except this canon is for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the ...
Follow
CyFy: Takeaways from the Indian Conference on Cybersecurity and Internet Governance
From October 3-5, I attended CyFy, the Indian Conference on Cybersecurity and Internet Governance, in New Delhi. Now in its sixth year, this policy-focused conference organized by Indian think tank Observer Research Foundation brings together government, industry, academia, and civil society from India and around the world to discuss issues related to technology, security, and society. A main theme at CyFy 2018 was how communities globally are seeking new ideas to operate in cyberspace, particul ...
Follow
SSL Decryption Series: Next-Generation Firewall Buying Criteria for Your Decryption Needs
In my last post, I discussed why NGFWs are the most suitable devices to decrypt traffic, providing several advantages. However not all NGFWs are equal, and unfortunately, it can be difficult to distinguish between firewalls with similar claims. It is important to have clear guidelines for evaluating an NGFW prior to purchase. This will ensure the firewall can support a comprehensive breach prevention strategy, which includes SSL decryption. Here are the criteria to compare the SSL decryption cap ...
Follow
Use Automation to Maintain Compliance in the Cloud
Too often, organizations make the move to the cloud without considering the impact to compliance. Cloud compliance is an issue for any organization using cloud storage or backup services. You can ensure that your organization achieves compliance in the cloud for PCI DSS, HIPAA, SOC2 and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it. Herein lies the challenge, especially as more data retention and protection rul ...
Follow
Cybersecurity Canon Candidate Book Review: Learn Social Engineering
We modeled the Cybersecurity Canon after the Baseball Hall of Fame and the Rock & Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number. Please write a review and nominate your favorite.  The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so ...
Follow
News of the Week: October 13, 2018
Did you miss any of this week’s Palo Alto Networks action? Don’t worry – we’ve rounded up our top news and views right here: Innovation at your fingertips: the first third-party apps now available on the Application Framework. Unit 42 shared new research: Fake Flash Updaters Push Cryptocurrency Miners Detecting Malicious Campaigns with Machine Learning The Cybersecurity Canon is an excellent resource for discovering must-read cybersecurity books. Check out the latest rev ...
Follow
Channel Scoop – October 12, 2018
Sit back, relax and enjoy this week’s Channel Scoop.   Find the Right Solution. Find the right product or solution for your customers using this handy guide. Evident vs. AWS Config Rules Battlecard. Are your customers pursuing a multi-cloud strategy, or are they focused purely on AWS? This new battlecard compares features and addresses common questions. Are you prepared for the discussion? Water District Sees Benefits of Security Operating Platform. Find out why the Rancho California ...
Follow
Detecting Malicious Campaigns with Machine Learning
We’re always working to find new ways to protect customers and prevent successful attacks, and one recent addition to our research arsenal is the use of unsupervised machine learning on large datasets of domain information. Machine learning-based techniques like this can help us discover new threats and block them before they can affect our customers. They can quickly identify malicious domains that are part of larger campaigns as soon as they become active and provide much broader coverag ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel