Quantcast
Channel: Stopping Cryptojacking Attacks With and Without an Agent - Palo Alto Networks Blog
Browsing latest articles
Browse All 60 View Live

Image may be NSFW.
Clik here to view.

Boosting Identity Security with Cortex XDR/XSIAM Honey Users

In today’s digital landscape, identity-based attacks are becoming increasingly prevalent and sophisticated. To counter these threats, it’s crucial to employ proactive defensive strategies that not only...

View Article


Image may be NSFW.
Clik here to view.

Cortex XSOAR Ranked #1 for SOC Automation

Introduction Automation is vital for SecOps teams to stay agile in today’s unpredictable cybersecurity landscape, where the growing complexity of threats and the sheer volume of alerts can quickly...

View Article

Image may be NSFW.
Clik here to view.

Introducing Cortex Canvas: Unleashing the Power of Visual Storytelling

In today's cyber landscape, security teams face the challenge of complex attack scenarios and collaborating effectively to safeguard their organizations. Palo Alto Networks is committed to empowering...

View Article

Image may be NSFW.
Clik here to view.

Bye Whack-a-Mole: The New Cortex Generic Persistence Analytics Module

Research by: Matan Haim Guez, Tom Fakterman, Yoav Zemah Executive Summary One of the key phases of a cyberattack lifecycle is the persistence phase. In its essence, persistence deals with maintaining a...

View Article

Image may be NSFW.
Clik here to view.

Cortex Copilot - Another Step Forward in SOC Transformation

  When Incidents Pile Up, You Need A Way Out Security operations is hard. End-to-end attacks—from compromise to impact—happen in a matter of hours. This requires security analysts to quickly identify...

View Article


Image may be NSFW.
Clik here to view.

Cutting Through the Noise: Simplifying SIEM Alerts with Cortex

A Deluge of Data Like many of us in the world of cybersecurity, your SecOps team has likely been overwhelmed by the volume of alerts flooding your SIEM systems. We've all been there—sifting through...

View Article

Image may be NSFW.
Clik here to view.

Cloud Security — Maturing Past the Awkward Teenage Years

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider The genesis of cloud computing can be traced back to the 1960s concept of utility computing, but it came into its own...

View Article

Image may be NSFW.
Clik here to view.

Banking on AI to Defend the Financial Services Sector

As cyberthreats evolve, financial institutions are leveraging AI to bolster their defenses, streamline operations and protect their assets. Like other data-rich industries, banking, capital markets,...

View Article


Image may be NSFW.
Clik here to view.

Shaking Up Security — The Power of AI-Native SOCs

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider Like legacy security tools, such as traditional firewalls and signature-based antivirus software, organizations that...

View Article


Image may be NSFW.
Clik here to view.

Optimize Analyst Workflows with Cortex Copilot

For any organization, finding, hiring, and retaining IT and security talent poses a challenge. It will take years for enough new analysts to enter the field and gain enough experience to solve the...

View Article
Browsing latest articles
Browse All 60 View Live