Crawl, Walk, Run: Operationalizing Your IaC Security Program

0
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now you’re off the IaC security races. You know what your...

Misconfigured Kubernetes Target Of XMRig Mining Campaign

0
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...

Is Your Organization Protected Against IAM Misconfiguration Risks?

0
In the latest edition of the Unit 42 Cloud Threat Report, our researchers explore the cloud threat landscape with a deep focus on identity and access management (IAM) misconfiguration...

Texas Courts Hit With Ransomware Attack

Officials say they will not pay any ransoms or demands of the attackers! Texas officials have revealed that a ransomware attack was launched against its court system but insists no...

Prisma Cloud 2.0: The Industry’s Most Comprehensive CNSP

0
With the rollout of Prisma Cloud in November 2019, Palo Alto Networks announced a new category in cloud security – the Cloud Native Security Platform (CNSP) – for securing...

Prisma Cloud 2.0 Just Launched: Why a Comprehensive CNSP is Essential

0
We recently announced the largest release for Prisma Cloud to date, creating the industry’s only comprehensive Cloud Native Security Platform (CNSP).  But what does it mean to say Prisma Cloud...

3 Simple Techniques to Add Security Into the CI/CD Pipeline

0
I propose that there are three fundamental and concrete practices DevOps and security teams can adopt to add security into the CI/CD pipeline and secure critical applications, involving: Infrastructure-as-Code (IaC). Kubernetes...

What to Know About Cloud Infrastructure Entitlement Management (CIEM)

0
Effective cloud native security relies on properly administering identity and access management (IAM) policies to users, workloads and data (also called entitlements). As cloud adoption continues to grow rapidly...

Log in, Learn, and Uplevel Your Future With Beacon

0
The future of work requires learning to be dynamic, virtual, relevant and available on demand. Our customers and partners need to be able to get up to speed quickly...

The Ignite ‘20 Agenda: Mark off the Minutes for Every Event

0
Welcome to the cybersecurity conference you’ve been waiting for. Join Palo Alto Networks at Ignite ’20, a two-day deep dive into everything you need to know to future-proof your cybersecurity....
Error decoding the Instagram API json