Article

5 Things That Keep CIOs Up at Night (Hint: It’s Not Always the Obvious Stuff)

Learn more
Article

Understanding and Leveraging the Role of Platformization in AI-First Cybersecurity

Learn more
Article

AI in Cybersecurity: Beyond the Hype and Facing the Challenges

By Zachary Malone

Read more
Article

What Executives Should Know About Quantum-Resistant Security

By Zachary Malone

Read more
Article

What Executives Should Know About 5G Security

By Zachary Malone

Read more
Article

When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination

By Haider Pasha

Read more
Article

Why Resilience—Not Prevention—Should Be Your Cybersecurity Goal

By Jason Koler

Read more
Article

Why CISOs Need to Fully Embrace AI

By Ali Khan

Read more
Article

The (Secure) Digital Future of Healthcare

By Alex Nehmy

Read more
Article

Three Principles of Data Security in the AI Era

By Dan Benjamin

Read more
Article

What Executives Should Know About SOAR

By Zachary Malone

Read more
Article

Securing Your AI-Powered Network Transformation: A Guide for C-Suite Leaders

By Anand Oswal

Read more
Podcast

Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape

By David Moulton

Read more
Podcast

Unit 42 Threat Vector Podcast provides IR Sniping and AI’s Changing Face of Cyberthreats

David Moulton

Read more
Article

Healthcare Cybersecurity

By Wendy Roodhooft

Read more
Article

Three Ways to Enable Cyber Resilience in Education in 2023 and Beyond

By Jeffery Tay

Read more
Article

5 Steps We Can Take to Address the Cyber Skills Shortage

By Leonard Kleinman

Read more
Article

ChatGPT: AI for Good or AI for Bad Camp

By Sean Duca

Read more
Article

Consolidation: How Security Platforms Reduce Implementation Time and Supercharge Risk Posture

By Haider Pasha

Read more
Article

Consolidation: The Secret to Supercharging Your SOC

Most CISOs have a clearly defined goal: to ensure smooth, reliable, and gap-free security operations.

By Niall Browne

Read more
Article

Cybersecurity Automation: Levelling the Playing Field

By Leonard Kleinman

Read more
Article

Healthcare Innovation: A Safe and Secure Approach

By Jason Wessel

Read more
Article

What Executives Should Know About CNAPP

By Zachary Malone

Read more
Article

What Executives Should Know About Shift-Left Security

By Zachary Malone

Read more
Article

Aligning Security and Business Strategies

By Sean Duca

Read more
Article

What's Next in Securing Healthcare

The New Fundamentals for Cyber Leaders

Read more
Article

IoT Adoption in Healthcare Brings Security Opportunities

By Anand Oswal

Read more
Article

Securing Critical Infrastructure with Zero Trust

Anand Oswal

Read more
Article

What's Missing in Most CISO's Security Risk Management Strategies

Dr. May Wang

Read more
Article

The Future of Machine Learning in Cybersecurity

Dr. May Wang

Read more
Article

Industry 4.0 - The Intersection of Cybersecurity and Workplace Safety

Alex Nehmy

Read more
Article

What Executives Should Know About XDR

By Zachary Malone

Read more
Article

Why You’re Still Getting Phished and What You Can Do About It

By Taylor Ettema

Read more
Article

Things to Do Now to Ensure Your Cloud Posture and Preparedness

By Vinay Venkataraghavan

Read more
Article

Securing Your Cloud Supply Chain

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions— Cyber Risk Exposure

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions—Cyber Risk Mitigation Plan

Read more
Article

Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

Artificial intelligence (AI) and machine learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in service of their goals.

By Matt Kraning

Read more
Article

Connectivity and Cloud: A Chance for Zero Trust

Advice on how moving to the cloud provides new opportunities to create Zero Trust architectures.

By Sergej Epp

Read more
Article

The Evolution of Enterprise Data Security

By Mario Espinoza

Learn more
Article

Security Models of Tomorrow for Work from Anywhere

By Sean Duca

Read more
Article

5 Cybersecurity Questions Boards Need to Address in COVID Era

By Haider Pasha

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions—Cyber Due Diligence

By LeeAnne Pelzer

Read more
Article

CISOs: How to Answer Your Board’s Top Cybersecurity Questions— Regulatory Compliance Requirements

By LeeAnne Pelzer

Read more
Article

Doing More with Less: The Case for SOC Consolidation

By Niall Browne

Read more
Article

Advice on Establishing Trust with Your Board

By David Faraone

Read more
Beyond the Cyber Buzzwords

What Executives Should Know About Zero Trust

By Zachary Malone

Read more
Beyond the Cyber Buzzwords

What Executives Should Know About SASE

By Zachary Malone

Read more
quote icon
The time for assessing what works, what doesn’t, and what’s next is here.
Jason Georgi
Field CTO, Prisma Access
Read more
CUSTOMER CASE STUDY

AutoNation drives high performance and millions in savings with Palo Alto Networks Prisma SD-WAN

See how unparalleled bandwidth goes a long way toward growing the business for the US’s largest automobile retailer.

Learn more
Article

Why Secure SD-WAN Should Be Delivered From the Cloud

SD-WAN isn’t just about network access. It’s a pathway toward digital transformation.

By Kumar Ramachandran

Read more
quote icon
To properly leverage machine learning and automation, a single-vendor platform is key.
Nir Zuk
Founder and CTO
Read Nir’s POV
Article

Extracting Greater Value from the Data You Have

Collecting data and having the right people, process and technology, help improve cybersecurity outcomes.

By Sean Duca

Learn how
Article

Keys to Building a Successful Cloud Security Strategy

Securing workloads in the cloud is not the same as securing workloads on-premises.

By Matt Chiodi

Read more
Article

Expanding IoT Visibility Without Increasing Burden

98% of IoT device traffic is unencrypted, but that doesn’t mean IoT has to be a security risk.

By Anand Oswald

Read more
Article

The Air Gap Is Dead. It’s Time for Industrial Organisations to Embrace the Cloud

By Alex Nehmy

Read more
 
Videos

Navigating the Digital Age: The Path to a Successful Cloud Transformation

Today’s cybersecurity isn’t only about tech. It’s a business strategy that aligns executives, boards, and business objectives. Want to see the best practices that can enable success?


For the majority of enterprises, data has become the most valuable currency. How do you protect it?


Since the COVID-19 pandemic began, everyone has been adjusting to the new normal. But as Lieutenant General Bruce T. Crawford, author and former US Army CIO suggests, it’s not just the new normal, it’s the new now.



OTHER THOUGHT LEADERS
innovations
SECURITY ROUNDTABLE

2 Innovations That Can Tip the Balance in Cybersecurity

How these two key innovations can help level the playing field.

Read more
implementing zero trust
VIDEO

Implementing Zero Trust Throughout your Infrastructure

Moving beyond the buzzword to a practical implementation of Zero Trust.

Watch
talent shortage
SECURITY ROUNDTABLE

How Can CISOs Tackle the SOC Talent Shortage?

Modernizing your SOC can make all the difference to your processes and your people.

Read more
quote
The @Unit42_Intel Cloud Threat Report finds cryptojacking affects at least 23% of organizations globally. Check out the risk factors.
FROM THE BLOG
BLOG

Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise

While much attention has been paid to ransomware in recent years, modern threat actors increasingly use additional extortion techniques to coerce targets into paying—or dispense with ransomware altogether and practice extortion on its own.

Read more
BLOG

Transforming Network Security with AI-Powered Innovations in SASE

Today, we stand on the precipice of a great transformation.

Read more
BLOG

What’s Next with Cortex

The Future of the Modern SOC Is Here

Read more
50 Expert Viewpoints.
1 Cybersecurity Guide.
Get the e-book today