Article

What Executives Should Know About Shift-Left Security

By Zachary Malone

Read more
Article

Aligning Security and Business Strategies

By Sean Duca

Read more
Article

Securing 5G for 2023 and Beyond

By Anand Oswal

Read more
Article

What's Next in Securing Healthcare

The New Fundamentals for Cyber Leaders

Read more
Article

IoT Adoption in Healthcare Brings Security Opportunities

By Anand Oswal

Read more
Article

Securing Critical Infrastructure with Zero Trust

Anand Oswal

Read more
Article

What's Missing in Most CISO's Security Risk Management Strategies

Dr. May Wang

Read more
Article

The Future of Machine Learning in Cybersecurity

Dr. May Wang

Read more
Article

Industry 4.0 - The Intersection of Cybersecurity and Workplace Safety

Alex Nehmy

Read more
Article

What Executives Should Know About XDR

By Zachary Malone

Read more
Article

Why You’re Still Getting Phished and What You Can Do About It

By Taylor Ettema

Read more
Article

Things to Do Now to Ensure Your Cloud Posture and Preparedness

By Vinay Venkataraghavan

Read more
Article

Our POV: State of Cloud Native Security Report 2022

The second annual State of Cloud Native Security report examines the changing nature of cloud deployments and the reality of how organizations are securing the cloud today.

By Ankur Shah

Read more
Article

Securing Your Cloud Supply Chain

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions— Cyber Risk Exposure

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions—Cyber Risk Mitigation Plan

Read more
Article

Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

Artificial intelligence (AI) and machine learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in service of their goals.

By Matt Kraning

Read more
Article

Connectivity and Cloud: A Chance for Zero Trust

Advice on how moving to the cloud provides new opportunities to create Zero Trust architectures.

By Sergej Epp

Read more
Article

The Evolution of Enterprise Data Security

By Mario Espinoza

Learn more
Article

Security Models of Tomorrow for Work from Anywhere

By Sean Duca

Read more
Article

5 Cybersecurity Questions Boards Need to Address in COVID Era

By Haider Pasha

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions—Cyber Due Diligence

By LeeAnne Pelzer

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions— Regulatory Compliance Requirements

By LeeAnne Pelzer

Read more
Article

Doing More with Less: The Case for SOC Consolidation

By Niall Browne

Read more
Article

Advice on Establishing Trust with Your Board

By David Faraone

Read more
Beyond the Cyber Buzzwords

What Executives Should Know About Zero Trust

By Zachary Malone

Read more
Beyond the Cyber Buzzwords

What Executives Should Know About SASE

By Zachary Malone

Read more
quote icon
The time for assessing what works, what doesn’t, and what’s next is here.
Jason Georgi
Field CTO, Prisma Access
Read more
CUSTOMER CASE STUDY

AutoNation drives high performance and millions in savings with Palo Alto Networks Prisma SD-WAN

See how unparalleled bandwidth goes a long way toward growing the business for the US’s largest automobile retailer.

Learn more
Article

Why Secure SD-WAN Should Be Delivered From the Cloud

SD-WAN isn’t just about network access. It’s a pathway toward digital transformation.

By Kumar Ramachandran

Read more
quote icon
To properly leverage machine learning and automation, a single-vendor platform is key.
Nir Zuk
Founder and CTO
Read Nir’s POV
Article

Extracting Greater Value from the Data You Have

Collecting data and having the right people, process and technology, help improve cybersecurity outcomes.

By Sean Duca

Learn how
Article

Keys to Building a Successful Cloud Security Strategy

Securing workloads in the cloud is not the same as securing workloads on-premises.

By Matt Chiodi

Read more
Article

Expanding IoT Visibility Without Increasing Burden

98% of IoT device traffic is unencrypted, but that doesn’t mean IoT has to be a security risk.

By Anand Oswald

Read more
 
Videos


Navigating the Digital Age: The Path to a Successful Cloud Transformation

Today’s cybersecurity isn’t only about tech. It’s a business strategy that aligns executives, boards, and business objectives. Want to see the best practices that can enable success?


For the majority of enterprises, data has become the most valuable currency. How do you protect it?


Since the COVID-19 pandemic began, everyone has been adjusting to the new normal. But as Lieutenant General Bruce T. Crawford, author and former US Army CIO suggests, it’s not just the new normal, it’s the new now.



OTHER THOUGHT LEADERS
innovations
SECURITY ROUNDTABLE

2 Innovations That Can Tip the Balance in Cybersecurity

How these two key innovations can help level the playing field.

Read more
implementing zero trust
VIDEO

Implementing Zero Trust Throughout your Infrastructure

Moving beyond the buzzword to a practical implementation of Zero Trust.

Watch
talent shortage
SECURITY ROUNDTABLE

How Can CISOs Tackle the SOC Talent Shortage?

Modernizing your SOC can make all the difference to your processes and your people.

Read more
quote
The @Unit42_Intel Cloud Threat Report finds cryptojacking affects at least 23% of organizations globally. Check out the risk factors.
FROM THE BLOG
BLOG

Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise

While much attention has been paid to ransomware in recent years, modern threat actors increasingly use additional extortion techniques to coerce targets into paying—or dispense with ransomware altogether and practice extortion on its own.

Read more
BLOG

Transforming Network Security with AI-Powered Innovations in SASE

Today, we stand on the precipice of a great transformation.

Read more
BLOG

What’s Next with Cortex

The Future of the Modern SOC Is Here

Read more
50 Expert Viewpoints.
1 Cybersecurity Guide.
Get the e-book today