Palo Alto Networks Blog » Prisma Cloud
53 FOLLOWERS
Read Palo Alto Networks Blog to know about Prisma Cloud which secures hybrid and multi-cloud environments for the world's most innovative companies. Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology and continuous innovation.
Palo Alto Networks Blog » Prisma Cloud
5d ago
The adoption of cloud infrastructure for application modernization is a significant trend, and healthcare is no different. However, the sensitive nature of health data, combined with the healthcare sector's increasing reliance on cloud infrastructure, makes it a prime target for cyberthreats. From March 2023 to March 2024, healthcare entities reported 633 data breaches to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR), with each incident affecting more than 500 patients.
Adversaries are going after the mission-critical applications and data that healthcare deli ..read more
Palo Alto Networks Blog » Prisma Cloud
1w ago
In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore security features and best practices that can prevent data leakage.
You can catch up with the previous blog post, Redshift Security: Access and Data Flows Explained. When you're ready, let's dig in.
Configuring Data Encryption in Redshift
Redshift provides two types of encryption to help with protecting sensitive data, at-rest and in-transit.
Protecting Sensitive Data in Transit
Encryption of data in transit is important to avoid data manipulations ..read more
Palo Alto Networks Blog » Prisma Cloud
1w ago
This blog post is the first in a series that exposes security risks, possible attack vectors, and how to hunt and prevent them using data detection and response (DDR).
When correctly configured, Redshift’s security features and capabilities protect sensitive data from leaks or other security incidents. However, often, organizations struggle to correctly configure and implement these features because the manual processes can be time-consuming and require specialized skills.
To mitigate security and privacy risks, you need to appropriately configure security features and follow practices. Imple ..read more
Palo Alto Networks Blog » Prisma Cloud
2w ago
Mitigating CVE-2024-3094
By now you’ve likely heard about the vulnerability in XZ Utils Data Compression Library that impacted multiple Linux distributions (CVE-2024-3094) and read the threat brief Palo Alto Networks Unit 42 posted.
I’m sure you understand all the recommended precautionary measures—downgrading vulnerable XZ Utils versions to 5.4.6 (the latest unaffected version), reverting affected Linux distributions to stable releases and treating any systems identified as vulnerable as potential security threats.
But where do you start?
Don’t panic. Take a deep breath. Let’s pause and take ..read more
Palo Alto Networks Blog » Prisma Cloud
3w ago
The 2024 Globee Security Awards Gives Top Honors to Prisma Cloud Data Security Posture Management (DSPM) Solution in Multiple Categories
Prisma Cloud DSPM (formerly Dig Security) was named a winner in multiple categories at the 2024 Globee Security Awards. This recognition cements Prisma Cloud’s leadership in data-centric security and validates our move toward a platform approach for cloud security.
The 2024 Globee Awards recognize exceptional achievements in cybersecurity by individuals, organizations, products, and initiatives. Prisma Cloud’s inclusion in this year’s list of distinguished wi ..read more
Palo Alto Networks Blog » Prisma Cloud
1M ago
GigaOm named Prisma Cloud a Leader in Cloud Security Posture Management (CSPM), Container Security, and now Cloud Infrastructure Entitlement Management (CIEM).
Identity and access management (IAM) in the cloud is challenging. Especially as organizations deal with entitlement sprawl and managing machine identities. GigaOm notes: “CIEM solutions enable organizations to efficiently manage and secure their cloud infrastructure as well as endpoints (devices) that connect to it.”
The CIEM Market is Evolving
CIEM as a category is relatively new, first appearing in 2020 to address the new challenges o ..read more
Palo Alto Networks Blog » Prisma Cloud
1M ago
How do you respond to a security incident? In some cases, the answer might be ‘block first, ask questions later.’ That was common a decade ago in the centralized IT infrastructure. Security teams had tools that could help them identify suspicious behavior and promptly block the resource or endpoint. But when it comes to cloud data, things aren’t that simple. Business-critical data is mired in dependencies between pipelines and complicated environments, making it difficult to reach for the kill switch.
Below we explain some of the key challenges of incident response in cloud environments and su ..read more
Palo Alto Networks Blog » Prisma Cloud
1M ago
Planning your schedule for the Google Cloud Next ‘24 event coming to the Mandalay Bay Convention Center in Las Vegas April 9–11? Please make some time to learn about how Prisma Cloud can help you reduce risk and eliminate breaches in your Google Cloud environment.
For starters, you can visit us at booth #820 where we can show you how Prisma Cloud accelerates business transformation with shift-left prevention, secure cloud configurations, and runtime protection in a single, unified security platform.
If you’re interested in learning even more, Prisma Cloud has put together an exciting lineup of ..read more
Palo Alto Networks Blog » Prisma Cloud
1M ago
When it comes to sensitive data, the ‘wild west’ approach that characterized the early 2000s is gone. Dozens of data protection frameworks have emerged amid increased regulation and concerns over privacy, security and identity theft. These frameworks create obligations for organizations, and violations can result in legal liability, fines and higher insurance premiums. More than ever, compliance is a priority for engineering, security and legal departments.
When it comes to the cloud, things get complicated. Compliance frameworks demand tight control and visibility over sensitive data, which ..read more
Palo Alto Networks Blog » Prisma Cloud
1M ago
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria What Makes a Cloud Data Security Platform?
Recent years have seen a flurry of new technologies and vendors — first in CSPM, and then DSPM. Dozens of products have emerged, in addition to existing data loss protection (DLP) vendors releasing cloud features and offerings. But do any of these tools provide comprehensive data security in the cloud?
To help you answer this question, we've created this guide covering the current market landscape, key capabilities and differentiators to look out for when evaluating data security tool ..read more