BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.
Cyber Insights for Executives
Advisory and viewpoints for leaders from the global leader in cybersecurity, Palo Alto Networks.
By Tarun Khandelwal, an executive security advisor to the financial services industry and the former Head of Security Architecture at CIBC, and a Palo Alto Networks customer - We’ve all seen movies and TV shows where SWAT teams or military forces take heroic steps to safeguard lives and property in the event of a bomb threat. Chief among the defensive efforts they put in place are ways to reduce the impact of a potential explosion—reducing the blast surface. Often, they use machines such as remote-controlled robots to safeguard their human team members. Obviously, they want to prevent the blast from happening in the first place, but at the very least, they want to ensure they can mitigate its impact as much as possible.
By Derrick Lowe, Chief Information Security Officer at Orlando Health, a Palo Alto Networks customer - On the surface, cybersecurity in healthcare may not seem all that different from cybersecurity in other verticals such as financial services, retail, manufacturing, or education. Several of these are highly regulated, have exacting data governance mandates and deal with huge and growing volumes of data essential to their daily and long-term business operations.
By Matt Chiodi, Chief Security Officer, Public Cloud, Palo Alto Networks - Supply chain security has become top-of-mind for many leaders, as incident after incident has revealed supply chain vulnerabilities that expose significant organizational risk. Security challenges like Log4j and SolarStorm have battered organizations of all sizes with risks they likely didn’t even know they had. With a supply chain attack, a vulnerability in one component of a software stack can expose an entire organization to potential exploitation.
By Niall Browne, CISO - The traditional security operations center (SOC) is based on a model that has persisted for decades, yet it’s no longer effective. Too much has shifted in organizations and in the threat landscape for the “old ways” to work. Now is the time for a change to enable a modern SOC—taking on SOC consolidation to achieve better outcomes, with faster remediation, reduced risk and an overall stronger security posture.
By Sean Duca, Regional CSO, Palo Alto Networks - It’s not about collecting everything. It’s about collecting what you need and having the right people, process and technology to help improve cybersecurity outcomes. Learn more about the steps used to collect the right data and extracting the highest value from it.
By Kumar Ramachandran, SVP, Products - "Software-defined WAN, better known today as SD-WAN, is not the same technology that it was when it first got started. Learn more about how enabling reliable connectivity is still a key promise of SD-WAN and how but next-generation SD-WAN can do much more than just that."
By David Faraone, Sr. Consulting Director, Unit 42 - A board of directors can and should be thought of as the fourth line of defense for an enterprise’s security. Read more about how you can establish trust with your board and enable them to partner with you to maintain your security posture.
By Vinay Venkataraghavan, CTO - Technology Partnerships, Palo Alto Networks - Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that have to be managed. Read more to discover insights on cloud adoption and what it will take to be as secure in cloud deployments as on-premises.
By Matt Kraning, CTO, Cortex - Artificial Intelligence (AI) and Machine Learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in service of their goals. For the bad actors, it’s about breaking down defenses and finding vulnerabilities faster. Learn more about the value AI and ML can offer when you’re working to secure an organization.
By Zachary Malone, SE Academy Manager at Palo Alto Networks - What is SASE? Read this article to help debunk some industry myths about one of the hottest topics in cybersecurity today: SASE.