Orange Business, Orange Cyberdefense and Palo Alto Networks have further strengthened their partnership to deliver Palo Alto Networks Prisma Secure Access Service Edge (SASE) with Service Pr... Read more
Palo Alto Networks’ Unit 42 published new research on Medusa ransomware activity. Unit 42 found an escalation in Medusa ransomware operations and a shift in tactics towards extortion, charac... Read more
15-19% UAE CISOs regularly test recovery plans according to Palo Alto and IDC research
Only 33% of organisations in the UAE consider cyber resilience a top priority, and just 15-19% of CISOs in the Emirates regularly test their recovery plans, according to new research from Pa... Read more
Palo Alto Networks introduced Strata Cloud Manager, the industry’s first AI-powered Zero Trust management and operations solution. With these innovations and over 4,400 machine learning mode... Read more
Palo Alto Networks announced it is bringing its industry-leading Machine Learning-Powered Next-Generation Firewall (NGFW) to Microsoft Azure as a fully managed Azure-native ISV service. Clou... Read more
Palo Alto Networks is the global cybersecurity leader with a vision of a world where each day is safer and more secure than the one before. Backed by industry-leading threat intelligence and... Read more
Open source software is a critical component of cloud-native applications, allowing developers greater speed and modularity without having to reinvent the wheel each time they code. However,... Read more
With hybrid work well established as the norm for the post-pandemic workforce and vast amounts of sensitive data now stored in SaaS apps, the risk of SaaS misconfiguration poses a serious se... Read more
The need for managed detection and response is soaring as attack surfaces grow, cloud usage skyrockets and the cybersecurity skills gap widens. Palo Alto Networks introduced Unit 42 Managed... Read more
According to a new report from Palo Alto Networks the heavy use of software vulnerabilities matches the opportunistic behavior of threat actors who scour the internet for vulnerabilities and... Read more