Search
  1. Home
Location
Products Resources Partners Company
Location
The State of Cybersecurity in ASEAN, 2020

Where ASEAN Organizations Are Winning—and Not Winning—in the Cybersecurity War.

361
Palo Alto Networks Expands Cortex, Prisma Cloud Hosting to Singapore

Only nine days after introducing a cloud hosting location in the UK for Cortex and WildFire, we are proud to announce a new cloud hosting location in Singapore for Cortex XDR, Cortex Data Lake and Prisma Cloud.

61360

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Datasheet (37)
  • White Paper (22)
  • Press Release (15)
  • Blog (10)
  • Book (3)
  • Guide (3)
  • Article (2)
  • In The News (1)
  • Research Reports (1)
  • + Show More
By Topic

By Topic

  • Cloud Security (15)
  • Threat Detection and Prevention (12)
  • Security Operations (7)
  • Public Cloud Security (7)
  • Network Security (5)
  • Saas Security (5)
  • Amazon Web Services (4)
  • Virtual Data Center (3)
  • Google Cloud (2)
  • Network Security Management (2)
  • Zero Trust (2)
  • Microsoft Azure (1)
  • Mobile Security (1)
  • Private Cloud Security (1)
  • + Show More
By Industry

By Industry

  • Healthcare (2)
  • Financial Services (1)
  • Federal Government (1)
  • Manufacturing (1)
By Product Category

By Product Category

  • NGFW (16)
  • Prisma Cloud (8)
  • Traps (5)
  • Cortex XDR (5)
  • Prisma SaaS (3)
  • Prisma Access (3)
  • Cortex Data Lake (3)
  • Cortex (2)
  • Cortex XSOAR (2)
  • DNS Security service (2)
  • GlobalProtect (2)
  • WildFire (2)
  • AutoFocus & MineMeld (1)
  • Panorama (1)
  • Threat Prevention (1)
  • VM-Series (1)
  • + Show More
By Features

By Features

By Technology

By Technology

By Services

By Services

By Audience

By Audience

By Language

By Language

  • English (93)
  • German (1)

Displaying 11 to 20 of 113

  • previous
  • 1
  • 2(current)
  • 3
  • …
  • 11
  • 12
  • next
Blogs

2017 Cybersecurity Predictions: New Norms Expected in Threat Landscape

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.

132
Blogs

2017 Cybersecurity Predictions: The Year We Get Serious About IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. Throughout 2016, cybersecurity moved more into the public eye than ever before. Hacks into the Democratic National Committee, BitFinex, Yahoo, Dropbox, LinkedIn, and Verizon were just a few of the high-profile security breaches that grabbed headlines this year.

123
Blogs

2017 Cybersecurity Predictions: IoT Security Flaws Awareness Will Be Magnified

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. The endpoint security market will experience some dramatic shifts in 2017. Everything from the disposition of the threat actors to the players in the security vendor space to the nature of endpoints is undergoing significant changes. This will most certainly catch many organisations off guard. But there are options for those security professionals who care to prepare for it. In this post, I will outline four changes that security professionals might see in 2017.

132
Blogs

2017 Cybersecurity Predictions: Ransomware and SaaS Challenges Persist in Healthcare

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. 2016 was the year of ransomware in cybersecurity, and it was especially impactful in healthcare. In this blog post, I’ll lay out a few predictions about the type of threats that the healthcare industry will face in 2017.

132
Blogs

Traps Earns CRN Product of the Year Award for Endpoint Security

Today is a big day for Palo Alto Networks, our partners and the momentum we’ve achieved in advanced endpoint protection. We are very proud that Traps has been recognised by CRN as the overall winner for endpoint security in CRN’s 2016 Products of the Year.

136
Blogs

2017 Cybersecurity Predictions: Financial Sector Attackers Exploit Cracks in Blockchain Technology

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. This year saw some notable cybersecurity events in the financial services industry, including thefts from a number of SWIFT (Society for Worldwide Interbank Financial Telecommunication) member banks and from malware-infected ATMs in Asia. As we look ahead to 2017, I predict that we’ll see the following cybersecurity trends in the financial services industry.

127
Blogs

2017 Cybersecurity Predictions: Machine Learning and AI-Driven Frameworks Shape Cloud Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.

133
Blogs

2017 Cybersecurity Predictions: Price of Ransomware Continues to Increase in Asia-Pacific

2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.

129
Blogs

2017 Cybersecurity Predictions: Service Providers Confront IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.

122
Blogs

Let It Ride: The Sofacy Group’s DealersChoice Attacks Continue

Recently, Palo Alto Networks Unit 42 reported on a new exploitation platform that we called “DealersChoice” in use by the Sofacy group (AKA APT28, Fancy Bear, STRONTIUM, Pawn Storm, Sednit). As outlined in our original posting, the DealersChoice exploitation platform generates malicious RTF documents which in turn use embedded OLE Word documents. These embedded OLE Word documents then contain embedded Adobe Flash (.SWF) files that are designed to exploit Abode Flash vulnerabilities.

139

Displaying 11 to 20 of 113

  • previous
  • 1
  • 2(current)
  • 3
  • …
  • 11
  • 12
  • next

Want to be first to know?

Subscribe to Palo Alto Networks

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Company

  • Company
  • Tech Docs
  • Careers
  • Report a Vulnerability

Legal Notices

  • Privacy
  • Terms of Use
  • Documents
  • GDPR Readiness

Account

  • Manage a Subscription

© 2020 Palo Alto Networks, Inc. All rights reserved.