Quantcast
Channel: Beyond Visibility: Proactive Cloud Workload Security in the Real World - Palo Alto Networks Blog
Browsing all 81 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

4 Reasons to Implement Multitenancy in Your Cloud Security Strategy

The shift to the cloud is reshaping how developers build and deploy applications, but it also brings new security challenges. As organizations scale their cloud footprint, face new compliance...

View Article


Image may be NSFW.
Clik here to view.

Breaking Down the Biggest Threats to Your Cloud Environment

Cybersecurity threats are rapidly evolving. The battle feels endless, and AI has changed the game for both the attacker and the defender. The 2024 Unit 42 Incident Response Report is chock-full of...

View Article


Image may be NSFW.
Clik here to view.

Stories from the Darkside: A Set of Stolen Access Keys and a Complete Cloud...

  The simplicity of this attack isn’t what makes it shocking. It’s not even the speed with which the attacker seized control of an entire cloud environment. The alarming part is that it didn’t take...

View Article

Image may be NSFW.
Clik here to view.

Reduce Your Risk with the Kubernetes CIS Benchmark and Prisma Cloud

How does Prisma Cloud implement the Kubernetes CIS Benchmark to secure Kubernetes environments? What are the benefits of using Prisma Cloud for vulnerability management and compliance in Kubernetes...

View Article

Image may be NSFW.
Clik here to view.

Taking an Application-Centric Approach to Cloud Security

In complex cloud-native environments, security teams must protect an increasing number of applications. Limited resources make prioritizing and contextualizing cloud security risks challenging,...

View Article


Image may be NSFW.
Clik here to view.

Prisma Cloud Innovations: September's Highlights

Prisma Cloud's September 2024 release packs a punch with seven impactful updates to enhance your cloud security and user experience. Discover the Latest Features and Important Insights to Keep Your...

View Article

Image may be NSFW.
Clik here to view.

Taming Complexity, Turbocharging Security: Prisma Cloud Copilot

With digital assets dispersed across multiple cloud platforms in a shifting landscape, organizations find it difficult to keep track of and secure their cloud systems — which is understandable, given...

View Article

Image may be NSFW.
Clik here to view.

Securing Amazon SageMaker: Attack Surface Explained

Figure 1: SageMaker attack vectors diagram As organizations increasingly rely on Amazon SageMaker for their machine learning (ML) needs, understanding and mitigating security risks becomes paramount....

View Article


Image may be NSFW.
Clik here to view.

Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

With digital assets dispersed across multiple cloud platforms in a shifting landscape, organizations find it difficult to keep track of and secure their cloud systems — which is understandable, given...

View Article


Understanding the Costs and Benefits of DSPM Tools

The following article is an abridged version of our new Prisma Cloud datasheet Understanding the True Costs of a DSPM Solution. Today’s organizations face an uphill battle when it comes to protecting...

View Article

Image may be NSFW.
Clik here to view.

Shift Left: Should You Push It or Pull It?

In cloud-native development, managing security across every phase of the development lifecycle is critical. Whether working with Docker files, identity systems, microservices or serverless functions,...

View Article

Image may be NSFW.
Clik here to view.

GigaOm Recognizes Prisma Cloud as a CNAPP Leader

Figure 1: Palo Alto Networks Prisma Cloud is a Leader and Fast Mover in the Maturity/Platform Play quadrant of the 2024 GigaOm Radar for Cloud-Native Application Protection Platforms (CNAPPs) report....

View Article

Shifting Security Left with Prisma Cloud and HashiCorp Packer

Use Prisma Cloud to secure Packer images by HashiCorp and protect your entire CI/CD pipeline with comprehensive compliance support. In the ever-changing landscape of cloud infrastructure automation and...

View Article


Image may be NSFW.
Clik here to view.

Data Security, Meet Remediation: Introducing the New Integration Between...

Remediation has long been a sore spot in data security posture management (DSPM). Many of the currently available solutions are great at surfacing alerts but offer no real way for Security teams to...

View Article

Image may be NSFW.
Clik here to view.

Experience Next-Generation Cloud Security at AWS re:Invent 2024

Prisma Cloud by Palo Alto Networks will be at AWS re:Invent 2024 with speaking sessions on how to secure AI with AI-driven security in the cloud. Don’t miss our in-booth theaters on AWS use cases, JAM...

View Article


Image may be NSFW.
Clik here to view.

Discover, Protect and Respond with AWS and Prisma Cloud

Over the last 5 years, our team at Prisma Cloud has witnessed an extraordinary surge in the adoption of cloud-native technologies. One trend that stands out is the ongoing migration to the public...

View Article

Image may be NSFW.
Clik here to view.

Deploying Secure LLM and RAG Applications with Amazon Bedrock and Prisma Cloud

Rapid advancements in generative AI have enabled organizations to build powerful applications by integrating foundation models with internal data and systems. The potential rewards are high, but so are...

View Article


Image may be NSFW.
Clik here to view.

Complying with OWASP Top 10 for LLM Applications and NIST AI 600-1

Rapid advancement in artificial intelligence (AI) and the availability of accessible developer tools have made it relatively easy to incorporate sophisticated AI capabilities into applications. In the...

View Article

Forecasting the 2025 Cloudscape

2025 Cloud Security Trends and Challenges from Prisma Cloud Leadership As we prepare to step into 2025, cloud security continues to remodel in response to emerging needs – the wide adoption of AI,...

View Article

Image may be NSFW.
Clik here to view.

GigaOm Names Prisma Cloud a Leader in Software Supply Chain Security

With software supply chain threats escalating, organizations need comprehensive solutions that safeguard their entire development lifecycle. The GigaOm Radar for Software Supply Chain Security...

View Article
Browsing all 81 articles
Browse latest View live