The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.
Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.
Security survey of Canadians, can Facebook hear you, Zoom video conferencing app warning
Canadians are doing just fine with protecting their data and online privacy. However, many feel that a solid education for cybersecurity is needed, according to a recent survey.
A new online survey from Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, and YouGov reveals that two-thirds of Canadians (66%) apply the same management of security across all of their personal devices (e.g., PCs, laptops, smartphones, tablets), and more than half of respondents (56%) feel they’re doing all they can to prevent the loss of their information.
Prisma is basically a ‘Branding Plus’ exercise, where the big news is the rebranding of existing products into a new suite, but the products receive some enhancements – with more to come – to make them work more smoothly together.
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
The Palo Alto Networks® Cortex platform unleashes a consumption model based in software as a service, or SaaS, that allows customers to dynamically engage apps to solve a nearly boundless number of the most challenging security use cases with the best technology available.