What to Know About Cloud Infrastructure Entitlement Management (CIEM)

0
Effective cloud native security relies on properly administering identity and access management (IAM) policies to users, workloads and data (also called entitlements). As cloud adoption continues to grow rapidly...

The Ignite ‘20 Agenda: Mark off the Minutes for Every Event

0
Welcome to the cybersecurity conference you’ve been waiting for. Join Palo Alto Networks at Ignite ’20, a two-day deep dive into everything you need to know to future-proof your cybersecurity....

Prisma Cloud 2.0: The Industry’s Most Comprehensive CNSP

0
With the rollout of Prisma Cloud in November 2019, Palo Alto Networks announced a new category in cloud security – the Cloud Native Security Platform (CNSP) – for securing...

Is Your Organization Protected Against IAM Misconfiguration Risks?

0
In the latest edition of the Unit 42 Cloud Threat Report, our researchers explore the cloud threat landscape with a deep focus on identity and access management (IAM) misconfiguration...

3 Simple Techniques to Add Security Into the CI/CD Pipeline

0
I propose that there are three fundamental and concrete practices DevOps and security teams can adopt to add security into the CI/CD pipeline and secure critical applications, involving: Infrastructure-as-Code (IaC). Kubernetes...

MFA-Minded Attackers Continue to Figure Out Workarounds

0
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue. By: Robert Lemos As online...

Misconfigured Kubernetes Target Of XMRig Mining Campaign

0
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target...

Texas Courts Hit With Ransomware Attack

Officials say they will not pay any ransoms or demands of the attackers! Texas officials have revealed that a ransomware attack was launched against...