Learn More

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

Cyber Insights for Executives

Advisory and viewpoints for leaders from the global leader in cybersecurity, Palo Alto Networks.

The Machines Are Coming: Financial Services Can Reduce the Blast Surface with Zero Trust

The Machines Are Coming: Financial Services Can Reduce the Blast Surface with Zero Trust

By Tarun Khandelwal, an executive security advisor to the financial services industry and the former Head of Security Architecture at CIBC, and a Palo Alto Networks customer - We’ve all seen movies and TV shows where SWAT teams or military forces take heroic steps to safeguard lives and property in the event of a bomb threat. Chief among the defensive efforts they put in place are ways to reduce the impact of a potential explosion—reducing the blast surface. Often, they use machines such as remote-controlled robots to safeguard their human team members. Obviously, they want to prevent the blast from happening in the first place, but at the very least, they want to ensure they can mitigate its impact as much as possible.
April 4, 2022
Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders

Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders

By Derrick Lowe, Chief Information Security Officer at Orlando Health, a Palo Alto Networks customer - On the surface, cybersecurity in healthcare may not seem all that different from cybersecurity in other verticals such as financial services, retail, manufacturing, or education. Several of these are highly regulated, have exacting data governance mandates and deal with huge and growing volumes of data essential to their daily and long-term business operations.
April 4, 2022
Securing Your Cloud Supply Chain

Securing Your Cloud Supply Chain

By Matt Chiodi, Chief Security Officer, Public Cloud, Palo Alto Networks - Supply chain security has become top-of-mind for many leaders, as incident after incident has revealed supply chain vulnerabilities that expose significant organizational risk. Security challenges like Log4j and SolarStorm have battered organizations of all sizes with risks they likely didn’t even know they had. With a supply chain attack, a vulnerability in one component of a software stack can expose an entire organization to potential exploitation.
April 4, 2022
Doing More with Less: The Case for SOC Consolidation

Doing More with Less: The Case for SOC Consolidation

By Niall Browne, CISO - The traditional security operations center (SOC) is based on a model that has persisted for decades, yet it’s no longer effective. Too much has shifted in organizations and in the threat landscape for the “old ways” to work. Now is the time for a change to enable a modern SOC—taking on SOC consolidation to achieve better outcomes, with faster remediation, reduced risk and an overall stronger security posture.
March 10, 2022
Why Secure SD-WAN Should Be Delivered from the Cloud

Why Secure SD-WAN Should Be Delivered from the Cloud

By Kumar Ramachandran, SVP, Products - "Software-defined WAN, better known today as SD-WAN, is not the same technology that it was when it first got started. Learn more about how enabling reliable connectivity is still a key promise of SD-WAN and how but next-generation SD-WAN can do much more than just that."
February 14, 2022
Establishing Trust with Your Board—Advice for Security Leaders

Establishing Trust with Your Board—Advice for Security Leaders

By David Faraone, Sr. Consulting Director, Unit 42 - A board of directors can and should be thought of as the fourth line of defense for an enterprise’s security. Read more about how you can establish trust with your board and enable them to partner with you to maintain your security posture.
February 14, 2022
Things to Do Now to Ensure Your Cloud Posture and Preparedness

Things to Do Now to Ensure Your Cloud Posture and Preparedness

By Vinay Venkataraghavan, CTO - Technology Partnerships, Palo Alto Networks - Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that have to be managed. Read more to discover insights on cloud adoption and what it will take to be as secure in cloud deployments as on-premises.
February 8, 2022
Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

By Matt Kraning, CTO, Cortex - Artificial Intelligence (AI) and Machine Learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in service of their goals. For the bad actors, it’s about breaking down defenses and finding vulnerabilities faster. Learn more about the value AI and ML can offer when you’re working to secure an organization.
February 7, 2022