5 webcasts found
+ 4 past events found
Back to Search Begin New Search Save Search Auto-Notify
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
The Future of Cyber Secure Schools
Keeping students and their data safe while maintaining a modern and engaging learning environment is a delicate balance for K-12 institutions. Schools struggle to continuously comply to industry and legal standards that continue to grow, while faced with limited IT resources. As education continues to make the move into the realm of internet-based and on-demand education, they have to find ways to bring their IT resources into the same spaces....
Add Favorite
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Cortex XDR Coffee Talk: Brewing Up the...
Attendees of this on-demand webinar better understand how Cortex XDR allows for: Full visibility across network, Cortex endpoint, cloud, third party and identity sources, not just endpoint Reduced mean time to detect (MTTD) and mean time to respond (MTTR) Out-of-the-box identity-focused threat detection for initial access tactics, techniques, and procedures (TTPs) and available add-ons for advanced identity-based threat detection analytics, l...
Add Favorite
Back to Search Begin New Search