Quantcast
Channel: Join Prisma Cloud at AWS re:Inforce 2024 - Palo Alto Networks Blog
Browsing all 66 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Secure State and Local Cloud Modernization Efforts

Prisma Cloud Achieves StateRAMP Authorized Status In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP...

View Article


Image may be NSFW.
Clik here to view.

Best Practices for Managing Vulnerabilities in the Cloud

If you’ve ever questioned the importance of vulnerability management, consider these facts: 26,447 vulnerabilities were disclosed in 2023—1,500 more than in 2022. Three new vulnerabilities are...

View Article

Image may be NSFW.
Clik here to view.

Announcing Prisma Cloud AI-SPM: Security and Compliance for AI-Powered Apps

As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management (AI-SPM) is a new set of capabilities that...

View Article

Image may be NSFW.
Clik here to view.

Prisma Cloud Copilot: Don’t Just Ask, Act

Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the...

View Article

Image may be NSFW.
Clik here to view.

Why Code to Cloud™, Data Security and Platforms Matter in Cloud Security

If anyone knows about the importance of rapid response when it comes to effectively solving cloud security issues, it's Bill Ho, a Prisma Cloud Solution Architect and expert on cloud-native security. I...

View Article


Image may be NSFW.
Clik here to view.

Operate Efficiently and Securely: Rotating Prisma Cloud Access Keys

Ensuring appropriate access management is a critical component of any effective cloud security strategy. Take this real-world scenario, for example. Prisma Cloud™ exposes an API and allows users to...

View Article

Image may be NSFW.
Clik here to view.

Understanding Three Real Threats of Generative AI

The New Reality of Generative AI Generative AI is a technology that has caught the attention of both good and bad actors. At its heart, the term generative AI refers to types of artificial intelligence...

View Article

Image may be NSFW.
Clik here to view.

How CSPM Will Shape the Future of Cloud Security

Address the gaps of last generation CSPM tools with more context and proactive security measures that prevent repeated mistakes. When companies switch to the cloud, it’s natural for their security...

View Article


Image may be NSFW.
Clik here to view.

Join Prisma Cloud at AWS re:Inforce 2024

Prisma Cloud will be at AWS re:Inforce in Philadelphia June 10-12 at Booth #911 and we want to see you there. Prisma Cloud is coming to Philadelphia to meet with our customers at AWS re:Inforce 2024....

View Article


Image may be NSFW.
Clik here to view.

Security Theater: Who Cares About Your AppSec Findings?

Welcome to Act 2 of our blog series focused on Security Theater where we seek to shed light on the illusion of cloud security. Previously we explained why you should NOT measure success based on...

View Article

Not Just Another State of [Cloud-Native Security] Report

If you’re like me, you might be getting a tad exhausted keeping up with the many flavors of “The State of” reports. And I’m only talking about the ones within cybersecurity — everything from SBOMs to...

View Article

Image may be NSFW.
Clik here to view.

Bringing a Point of View to Your CIEM Strategy with Prisma Cloud

A Preview of New Features in Prisma Cloud Managing cloud infrastructure and entitlement management (CIEM) is hard enough with multicloud, sprawling machine and user identities, and users accessing the...

View Article

Image may be NSFW.
Clik here to view.

Best Practices for Managing Vulnerabilities in the Cloud–Part 2

Welcome back to our Best Practices for Managing Vulnerabilities in the Cloud series. In part one, we discussed how important it is to have complete visibility into vulnerabilities across your cloud...

View Article


Harnessing AI to Bolster Cybersecurity: Safeguarding Qatar’s Digital...

As the world embraces digital transformation, the threat landscape expands in parallel. To stay competitive, companies and nation states need to invest in the protection of key digital assets as part...

View Article

Image may be NSFW.
Clik here to view.

Prisma Cloud Copilot: Don’t Just Ask, Act

Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the...

View Article


Harnessing AI to Bolster Cybersecurity: Safeguarding Qatar’s Digital...

As the world embraces digital transformation, the threat landscape expands in parallel. With threat actors constantly developing new tactics, techniques and procedures, the speed to react and recover...

View Article

Image may be NSFW.
Clik here to view.

Improving API Security with Google Cloud Service Extensions

Explore the potential of Service Extensions to strengthen your API security layer and protect web applications across any cloud-native architecture, public or private. New Service Extensions Release...

View Article


Image may be NSFW.
Clik here to view.

Acting on NSA Zero Trust Guidance for Applications and Workloads

Figure 1: The seven pillars of Zero Trust (source: National Security Agency) The U.S. National Security Agency (NSA) recently published the cybersecurity information sheet Advancing Zero Trust Maturity...

View Article

Image may be NSFW.
Clik here to view.

Are Cloud Serverless Functions Exposing Your Data?

More than 25% of all publicly accessible serverless functions have access to sensitive data, as seen in internal research. The question then becomes, Are cloud serverless functions exposing your data?...

View Article

Image may be NSFW.
Clik here to view.

Breaking Bad Habits with CIS Benchmarks

In today’s cyberthreat climate, organizations must prioritize the security of their IT infrastructure. The Center for Internet Security (CIS) Benchmarks provide a set of comprehensive guidelines...

View Article
Browsing all 66 articles
Browse latest View live