Secure the Cloud

  • Streamline Risk Management with Context-Based Risk Prioritization
    by Kasi Annamalai on November 9, 2023 at 1:00 pm

    Gain full visibility of your cloud environment, prioritize critical threats, and remediate risks with context-based risk prioritization for smarter cloud security. The post Streamline Risk Management with Context-Based Risk Prioritization appeared first on Palo Alto Networks Blog.

  • Top 3 IAM Risks in Your GitHub Organization
    by Omer Gil and Yaron Avital on July 18, 2023 at 12:00 pm

    Learn the top 3 IAM risks for GitHub Organizations, and discover practical tips to protect your organization with IAM for your source control management system. The post Top 3 IAM Risks in Your GitHub Organization appeared first on Palo Alto Networks Blog.

  • ChatGPT and Checkov: Fix IaC Security Issues Fast
    by Steve Giguere on June 27, 2023 at 12:00 pm

    Discover how Checkov works with ChatGPT to help you quickly identify and remediate IaC security issues with automatically suggested code fixes and rich security context. The post ChatGPT and Checkov: Fix IaC Security Issues Fast appeared first on Palo Alto Networks Blog.

  • How To Prevent the 5 Most Common Software Supply Chain Weaknesses
    by Chris Tozzi on June 13, 2023 at 12:00 pm

    Learn the basics of software supply chain security and 7 best practices to protect yourself against common software supply chain weaknesses. The post How To Prevent the 5 Most Common Software Supply Chain Weaknesses appeared first on Palo Alto Networks Blog.

  • Achieving Comprehensive Cloud Security: The Power of Consolidation
    by Martijn Baecke on May 8, 2023 at 12:02 pm

    Modern enterprises need a holistic approach to cloud security management — one that enables, rather than hinders, the timely achievement of business outcomes. By understanding the challenges of tool sprawl and moving towards a platform approach, decision makers can help drive innovation, obtain operational efficiencies and maintain a competitive advantage in today’s rapidly evolving digital environment. The post Achieving Comprehensive Cloud Security: The Power of Consolidation appeared first on Palo Alto Networks Blog.

  • Addressing Critical Violations From Login to Reporting With Prisma Cloud
    by Paul Dickens on May 3, 2023 at 12:00 pm

    Prisma Cloud’s Command Center user interface improves cloud security by showing you critical issues on one dashboard connected to all the info you need. The post Addressing Critical Violations From Login to Reporting With Prisma Cloud appeared first on Palo Alto Networks Blog.

  • Top 6 Considerations for Integrating Cloud Security and GitOps
    by Taylor Smith on April 27, 2023 at 12:00 pm

    Learn how to leverage GitOps to continuously enforce cloud security guardrails as infrastructure is developed, delivered, and deployed. The post Top 6 Considerations for Integrating Cloud Security and GitOps appeared first on Palo Alto Networks Blog.

  • Why Are Net-Effective Permissions Critical for Cloud IAM?
    by Cameron Hyde on April 19, 2023 at 12:00 pm

    With a CIEM tool to understand access entitlements across cloud environments, orgs can apply the principle of least privilege to reduce their attack surface. The post Why Are Net-Effective Permissions Critical for Cloud IAM? appeared first on Palo Alto Networks Blog.

  • Crawl, Walk, Run: Operationalizing Your IaC Security Program
    by Mike Urbanski on January 10, 2023 at 2:05 pm

    Learn how to operationalize your infrastructure as code security program with our rollout timeline and guidance for your first ninety days. The post Crawl, Walk, Run: Operationalizing Your IaC Security Program appeared first on Palo Alto Networks Blog.

  • How To Prevent the IaC Misconfiguration Snowball Effect
    by Payton O’Neal on January 3, 2023 at 6:31 pm

    See why one infrastructure as code (IaC) misconfiguration can snowball into thousands of security alerts, and learn how proactive, embedded IaC security can help you mitigate this problem. The post How To Prevent the IaC Misconfiguration Snowball Effect appeared first on Palo Alto Networks Blog.

Share Websitecyber