Secure State and Local Cloud Modernization Efforts
Prisma Cloud Achieves StateRAMP Authorized Status In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP...
View ArticleBest Practices for Managing Vulnerabilities in the Cloud
If you’ve ever questioned the importance of vulnerability management, consider these facts: 26,447 vulnerabilities were disclosed in 2023—1,500 more than in 2022. Three new vulnerabilities are...
View ArticleAnnouncing Prisma Cloud AI-SPM: Security and Compliance for AI-Powered Apps
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management (AI-SPM) is a new set of capabilities that...
View ArticlePrisma Cloud Copilot: Don’t Just Ask, Act
Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the...
View ArticleWhy Code to Cloud™, Data Security and Platforms Matter in Cloud Security
If anyone knows about the importance of rapid response when it comes to effectively solving cloud security issues, it's Bill Ho, a Prisma Cloud Solution Architect and expert on cloud-native security. I...
View ArticleOperate Efficiently and Securely: Rotating Prisma Cloud Access Keys
Ensuring appropriate access management is a critical component of any effective cloud security strategy. Take this real-world scenario, for example. Prisma Cloud™ exposes an API and allows users to...
View ArticleUnderstanding Three Real Threats of Generative AI
The New Reality of Generative AI Generative AI is a technology that has caught the attention of both good and bad actors. At its heart, the term generative AI refers to types of artificial intelligence...
View ArticleHow CSPM Will Shape the Future of Cloud Security
Address the gaps of last generation CSPM tools with more context and proactive security measures that prevent repeated mistakes. When companies switch to the cloud, it’s natural for their security...
View ArticleJoin Prisma Cloud at AWS re:Inforce 2024
Prisma Cloud will be at AWS re:Inforce in Philadelphia June 10-12 at Booth #911 and we want to see you there. Prisma Cloud is coming to Philadelphia to meet with our customers at AWS re:Inforce 2024....
View ArticleSecurity Theater: Who Cares About Your AppSec Findings?
Welcome to Act 2 of our blog series focused on Security Theater where we seek to shed light on the illusion of cloud security. Previously we explained why you should NOT measure success based on...
View ArticleNot Just Another State of [Cloud-Native Security] Report
If you’re like me, you might be getting a tad exhausted keeping up with the many flavors of “The State of” reports. And I’m only talking about the ones within cybersecurity — everything from SBOMs to...
View ArticleBringing a Point of View to Your CIEM Strategy with Prisma Cloud
A Preview of New Features in Prisma Cloud Managing cloud infrastructure and entitlement management (CIEM) is hard enough with multicloud, sprawling machine and user identities, and users accessing the...
View ArticleBest Practices for Managing Vulnerabilities in the Cloud–Part 2
Welcome back to our Best Practices for Managing Vulnerabilities in the Cloud series. In part one, we discussed how important it is to have complete visibility into vulnerabilities across your cloud...
View ArticleHarnessing AI to Bolster Cybersecurity: Safeguarding Qatar’s Digital...
As the world embraces digital transformation, the threat landscape expands in parallel. To stay competitive, companies and nation states need to invest in the protection of key digital assets as part...
View ArticlePrisma Cloud Copilot: Don’t Just Ask, Act
Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the...
View ArticleHarnessing AI to Bolster Cybersecurity: Safeguarding Qatar’s Digital...
As the world embraces digital transformation, the threat landscape expands in parallel. With threat actors constantly developing new tactics, techniques and procedures, the speed to react and recover...
View ArticleImproving API Security with Google Cloud Service Extensions
Explore the potential of Service Extensions to strengthen your API security layer and protect web applications across any cloud-native architecture, public or private. New Service Extensions Release...
View ArticleActing on NSA Zero Trust Guidance for Applications and Workloads
Figure 1: The seven pillars of Zero Trust (source: National Security Agency) The U.S. National Security Agency (NSA) recently published the cybersecurity information sheet Advancing Zero Trust Maturity...
View ArticleAre Cloud Serverless Functions Exposing Your Data?
More than 25% of all publicly accessible serverless functions have access to sensitive data, as seen in internal research. The question then becomes, Are cloud serverless functions exposing your data?...
View ArticleBreaking Bad Habits with CIS Benchmarks
In today’s cyberthreat climate, organizations must prioritize the security of their IT infrastructure. The Center for Internet Security (CIS) Benchmarks provide a set of comprehensive guidelines...
View Article