Palo Alto Networks
Follow
69 Followers
Follow Palo Alto Networks on their other social channels!
About Us
Founded:
2005
Company Size:
5001-10000 employees
Company Type:
Public
Location:
Santa Clara, CA
Website:
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, custom ...
Read more
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Follow
New Year, New Opportunities: 2019 Channel Partner Trends
Happy New Year! As 2019 begins, we can expect changes, large and small, to take place within the channel partner ecosystem. Predicting what the year holds is hardly a science, not even one that artificial intelligence can foresee. However, when we listen to our customers, listen to our partner community, and observe shifting business dynamics, we can anticipate where the market is going and, more importantly, how our partners can maximize their success with us. Here are three trends that I expec ...
Save
Like
01/12/2019
Follow
Channel Scoop: January 11, 2019
Sit back, relax and enjoy this week’s Channel Scoop. New Opportunities: 2019 Channel Partner Trends. Predicting what the year holds is hardly a science, not even one that artificial intelligence can foresee. However, when we listen to our customers, listen to our partner community, and observe shifting business dynamics, we can anticipate where the market is going and, more importantly, how our partners can maximize their success with us. Read Karl Soderlund’s blog to find out what t ...
Save
Like
01/12/2019
Follow
Differentiating With 5G Security: How Mobile Service Providers Can Become Secure Business Enablers
Mobile Network Operators (MNOs) are set to invest billions of dollars over the next several years to build 5G networks. What differentiates 5G from previous generations of mobile technology evolutions (2G to 3G, 3G to 4G) is the opportunity to enable new and transformative enterprise use cases. Whether it be leveraging 5G for on-site factory automation, self-driving cars, remote surgery, or any number of centrally or remotely deployed massive IoT use cases, 5G creates opportunity to build new en ...
Save
Like
01/08/2019
Follow
Cybersecurity Talent Acquisition in 2019: My Top Three Recommendations
As we begin 2019, we are crossing the threshold into another exciting year in cybersecurity. Building on the momentum of 2018 – a year filled with steep growth and innovation – cybersecurity now takes center stage in a big way. We can see a significant increase in awareness and passion about cybersecurity as a career. People from all walks of life are talking about the opportunities, asking questions including: “What are the biggest challenges in cybersecurity?” “Wh ...
Save
Like
01/07/2019
Follow
Hitting Pause on “Patch Tuesday”
Thousands of new software vulnerabilities and exploits are discovered each year, requiring diligent software patch distribution by software vendors on top of patch management by system and security administrators in every organization. This regular flow of patches and updates often lands on “Patch Tuesday,” the monthly or semimonthly day when Microsoft releases security patches for its software. Patching is a critical part of a sound endpoint protection strategy. However, patch manag ...
Save
Like
01/02/2019
Follow
Channel Scoop: December 21, 2018
Sit back, relax and enjoy this week’s Channel Scoop.   2019 Partner Campaigns. Jump-start the new year with a new campaign. On the partner portal, find information on everything from hosting your own security day, to leading a Best Practice Assessment (BPA). Partner Technical Resources. There are many valuable resources available throughout the partner portal. We now have a Technical Resources page where you can easily find quick links. Check it out! Cyberthreats in 2019. When it come ...
Save
Like
12/22/2018
Follow
Documentation 2.0: The New Tech Docs Portal
Keeping with the Palo Alto Networks spirit of innovation, we are thrilled to unveil our new Tech Docs subdomain, docs.paloaltonetworks.com.     The new portal is your hub for all things technical documentation and features a sporty new look. In addition to all the great content you used to find on https://www.paloaltonetworks.com/documentation, we’ve also added a few features to enhance your documentation experience.   Recently Updated Documentation You can now easily view ...
Save
Like
12/19/2018
Follow
Global Efforts Supporting Women in Cybersecurity
As part of our commitment to inclusion and diversity in the cybersecurity industry, it is important that our efforts expand globally. It is also no surprise that women are hugely underrepresented and needed in this industry. This is why our recent alliances with AnitaB.org and Perspektywy Education Foundation are important. These partner organizations host events that highlight the achievements of women in tech and provide opportunities for collaboration, professional development, and networking ...
Save
Like
12/19/2018
Follow
Traps: Protecting Resource Sensitive Environments
Virtual endpoints and servers, whether in a VDI environment or cloud workload, encounter the same cybersecurity challenges as their physical counterparts. This has led to a slew of new operational and technical challenges for the professionals tasked with securing them. Frequent antivirus (AV) signature updates, application patches, and operating system updates, which are required to secure endpoints against known vulnerabilities, are particularly challenging in virtual environments where a &ldq ...
Save
Like
12/19/2018
Follow
The EU’s New Telecom Code Requires Heightened Cybersecurity Efforts
Today, the European Union (EU) took its final step in enacting its new telecommunications legislation, the European Electronic Communications Code (the “Code”), which overhauls the existing EU legislative framework for telecommunications, dating from 2009. The Code was published in the Official Journal of the European Union today, and EU Member States will have two years to transpose relevant clauses of the Directive into national laws, regulations and administrative provisions neces ...
Save
Like
12/18/2018

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel