Learn More

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

Cyber Insights for Executives

Advisory and viewpoints for leaders from the global leader in cybersecurity, Palo Alto Networks.

What’s Missing in Most CISO’s Security Risk Management Strategies

What’s Missing in Most CISO’s Security Risk Management Strategies

By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox - Dr. May Wang shares what's missing in most risk management and the keys to creating a better strategy to reduce security risks.
September 22, 2022
The Future of Machine Learning in Cybersecurity

The Future of Machine Learning in Cybersecurity

By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox - Why has machine learning become so vital in cybersecurity? This article answers that and explores several challenges that are inherent when applying machine learning.
September 7, 2022
5 Signs the World Isn’t Paying Enough Attention to 5G Security

5 Signs the World Isn’t Paying Enough Attention to 5G Security

By Keith O’Brien, Chief Technology Officer for the Service Provider line of business at Palo Alto Networks - With each successive generation, advances in mobile technology have trained us to expect ever-faster mobile speeds and the ability of the signal to transport ever-greater loads of data. Increased data transfer rates enabled 3G to handle larger capacities, and that generation was the first to have serious broadband capabilities. As 4G LTE rolled out, mobile signals could now support interactive multimedia, voice, and video with greater speed and efficiency.
August 23, 2022
The Four 5G Edge Environments and How to Secure Them

The Four 5G Edge Environments and How to Secure Them

By Liia Sarjakoski, Principal Product Marketing Manager, 5G Security, for Palo Alto Network Security - Governments, organizations, and businesses are readily embracing transformation at the edge of mobile networks these days. Mobile edge – with its distributed support for low latency, capacity for rapid delivery of massive data amounts, and scalable cloud-native architectures – enables mission critical industrial and logistic applications and creates richer experiences across remote working, education, retail, and entertainment. Bringing resources closer to the user enables a better user experience, serving mission critical applications and taking advantage of improved economics.
August 22, 2022
The Machines Are Coming: Financial Services Can Reduce the Blast Surface with Zero Trust

The Machines Are Coming: Financial Services Can Reduce the Blast Surface with Zero Trust

By Tarun Khandelwal, an executive security advisor to the financial services industry and the former Head of Security Architecture at CIBC, and a Palo Alto Networks customer - We’ve all seen movies and TV shows where SWAT teams or military forces take heroic steps to safeguard lives and property in the event of a bomb threat. Chief among the defensive efforts they put in place are ways to reduce the impact of a potential explosion—reducing the blast surface. Often, they use machines such as remote-controlled robots to safeguard their human team members. Obviously, they want to prevent the blast from happening in the first place, but at the very least, they want to ensure they can mitigate its impact as much as possible.
April 4, 2022
Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders

Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders

By Derrick Lowe, Chief Information Security Officer at Orlando Health, a Palo Alto Networks customer - On the surface, cybersecurity in healthcare may not seem all that different from cybersecurity in other verticals such as financial services, retail, manufacturing, or education. Several of these are highly regulated, have exacting data governance mandates and deal with huge and growing volumes of data essential to their daily and long-term business operations.
April 4, 2022
Securing Your Cloud Supply Chain

Securing Your Cloud Supply Chain

By Matt Chiodi, Chief Security Officer, Public Cloud, Palo Alto Networks - Supply chain security has become top-of-mind for many leaders, as incident after incident has revealed supply chain vulnerabilities that expose significant organizational risk. Security challenges like Log4j and SolarStorm have battered organizations of all sizes with risks they likely didn’t even know they had. With a supply chain attack, a vulnerability in one component of a software stack can expose an entire organization to potential exploitation.
April 4, 2022
Doing More with Less: The Case for SOC Consolidation

Doing More with Less: The Case for SOC Consolidation

By Niall Browne, CISO - The traditional security operations center (SOC) is based on a model that has persisted for decades, yet it’s no longer effective. Too much has shifted in organizations and in the threat landscape for the “old ways” to work. Now is the time for a change to enable a modern SOC—taking on SOC consolidation to achieve better outcomes, with faster remediation, reduced risk and an overall stronger security posture.n
March 10, 2022
Why Secure SD-WAN Should Be Delivered from the Cloud

Why Secure SD-WAN Should Be Delivered from the Cloud

By Kumar Ramachandran, SVP, Products - "Software-defined WAN, better known today as SD-WAN, is not the same technology that it was when it first got started. Learn more about how enabling reliable connectivity is still a key promise of SD-WAN and how but next-generation SD-WAN can do much more than just that."
February 14, 2022
Establishing Trust with Your Board—Advice for Security Leaders

Establishing Trust with Your Board—Advice for Security Leaders

By David Faraone, Sr. Consulting Director, Unit 42 - A board of directors can and should be thought of as the fourth line of defense for an enterprise’s security. Read more about how you can establish trust with your board and enable them to partner with you to maintain your security posture.
February 14, 2022
Things to Do Now to Ensure Your Cloud Posture and Preparedness

Things to Do Now to Ensure Your Cloud Posture and Preparedness

By Vinay Venkataraghavan, CTO - Technology Partnerships, Palo Alto Networks - Cloud strategy is a top priority for nearly every organization today. The shift to the cloud has created tremendous opportunities, but also introduced new risks that have to be managed. Read more to discover insights on cloud adoption and what it will take to be as secure in cloud deployments as on-premises.
February 8, 2022
Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

Beyond the Hype: Understanding the True Value of AI/ML in Security Environments

By Matt Kraning, CTO, Cortex - Artificial Intelligence (AI) and Machine Learning (ML) are terms that are heard everywhere across the IT security landscape today, as organizations and attackers are both seeking to leverage these advancements in service of their goals. For the bad actors, it’s about breaking down defenses and finding vulnerabilities faster. Learn more about the value AI and ML can offer when you’re working to secure an organization.
February 7, 2022
Connectivity and Cloud: A Chance for Zero Trust

Connectivity and Cloud: A Chance for Zero Trust

By Sergej Epp, Chief Security Officer, EMEA - While Zero Trust is a term that is often misunderstood as well as misused, it is an approach that has real value in helping to reduce systematic cyber risk and improve resiliency. Read more about how moving to the cloud provides a new chance for Zero Trust architectures.n
February 1, 2022
The Evolution of Enterprise Data Security

The Evolution of Enterprise Data Security

By Mario Espinoza, Vice President of SaaS Security & Data Protection at Palo Alto Networks - Enterprise data security has always been about protecting sensitive data and ensuring that it doesn’t fall into the hands of unauthorized people. Learn more about the evolution of enterprise data security.n
February 1, 2022
Architecting the Zero Trust Enterprise

Architecting the Zero Trust Enterprise

Digital transformation is accelerating with key shifts such as the expanding Hybrid Workforce and continued migration of applications and data to the cloud. As we make this transformation, Information Security teams have the opportunity to adopt a modern Zero Trust approach that fits these significant shifts.
December 22, 2021
Beyond the Cyber Buzzwords: What Executives Should Know About Zero Trust

Beyond the Cyber Buzzwords: What Executives Should Know About Zero Trust

By Zachary Malone, SE Academy Manager at Palo Alto Networks - Invented in 2010 by Forrester Research, Zero Trust is a cybersecurity model enterprises can leverage to remove risky, implicitly trusted interactions between users, machines and data. The Zero Trust model provides a process for organizations to protect themselves from threats no matter what vector the threat originates fromu2014whether from across the world or from Sandy down the hall.
December 22, 2021
Security Models of Tomorrow for Work from Anywhere

Security Models of Tomorrow for Work from Anywhere

By Sean Duca, Regional CSO, JAPAC - Remote work was not a new thing, but never before had it been needed at the same scale and urgency. While many organizations used to have some employees working remotely, few were ready for everyone to be remote. The big question facing all organizations was how to maintain business continuity.
December 22, 2021
Our POV: The State of Hybrid Workforce Security 2021

Our POV: The State of Hybrid Workforce Security 2021

By Jason Georgi, Field CTO, Prisma Access / SASE at Palo Alto Networks - The State of Hybrid Workforce Security 2021 report looks at how organizations are viewing the challenges and opportunities of hybrid work as the need for a long-term plan to enable secure hybrid work has become increasingly paramount. The independent third-party research firm ONR interviewed 3,000 enterprise IT professionals from around the world. The study included C-level executives as well as practitioners.
December 22, 2021