Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware: Attackers vs Defenders Alex Hinchliffe, Unit 42 and Maurits Lucas, Intel 471 Ransomware is the most common type of malware attack and often the most costly to organizations around the world. The need for organizations to protec... 3 days ago | 48 mins Ransomware: Attackers vs Defenders Alex Hinchliffe, Unit 42 and Maurits Lucas, Intel 471 Ransomware is the most common type of malware attack and often the most costly to organizations around the world. The need for organizations to protec... 3 days ago | 48 mins Identity and Access Management: The First Line of Defense Bob West, Chief Security Officer for Prisma Cloud at Palo Alto Join Bob West, Chief Security Officer at Prisma Cloud, to learn about how Prisma® Cloud can address the cloud threats in your enterprise. This event e... 2 months ago | 49 mins Techniques that Strengthen Cloud IAM and Remove Lax Permissions Ajay Mishra, Palo Alto Networks and Ken Zhang,Google Cloud. Gartner has predicted that 75% of security failures will result in inadequate management of identities, access, and privileges by 2023. We can trace t... 2 months ago | 34 mins Cloud Threat Report: IAM the first line of defense Nathaniel Quist, Principal Researcher, Unit 42; Jay Chen, Principal Researcher Unit 42; Brandon Dunlap, Moderator The ongoing transition to cloud platforms has meant that more sensitive data is stored in the cloud, making it more tempting for adversaries to exploi... 10 months ago | 57 mins How to defend your organization against Apache Log4j? Brad Duncan, Threat Intelligence Analyst , Unit 42 Palo Alto Networks On December 9, a remote code execution (RCE) vulnerability in Apache Log4j 2 was identified as being exploited in the wild. Apache Log4j is an open-... 1 year ago | 64 mins Ransomware’s Known (and Unknown) Risks Renzon Cruz, Brian Pinnock, Thom Bailey Ransomware has become a major threats to organizations of all types in recent years. And, the frequency and sophistication of attacks appears to breed... 4 months ago | 58 mins The Covid Conundrum: Cloud Security Impact and Opportunity Nathaniel “Q” Quist, Senior Threat Researcher, Unit 42; Jay Chen, Senior Threat Researcher, Unit 42 In the early days of the COVID-19 pandemic, there was a rapid uptick in demand for cloud services. Utilizing data pulled from our global array of sens... 2 years ago | 44 mins You Are Here: Navigating the Global Cloud Native Security Landscape Jason Williams, Prod Mktg Mgr, Primsa Cloud; Nathaniel "Q" Quist, Principal Researcher, Unit 42; B. Dunlap, Moderator To understand where you’re going, you must first know where you are. But in the world of cloud-native security, where technologies and best practices ... 1 year ago | 61 mins Unit 42 Cloud Threat Report: The Covid Conundrum Ashley Ward, Technical Director, Office of the CTO, Palo Alto Networks; Brandon Dunlap, Moderator In the latest edition of the biannual Unit 42 Cloud Threat Report, researchers analyzed data from hundreds of cloud accounts around the world between ... 2 years ago | 55 mins Load more