Quantcast
Channel: Data Security Posture Management Archives - Palo Alto Networks Blog
Browsing all 27 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Data Flow Security: Mitigating the Risks of Continuous Data Movement in the...

In today's cloud environments, data movement is widespread due to diverse architectural patterns and extensive organizational access to data. Unmanaged data flows can result in compliance challenges...

View Article


Image may be NSFW.
Clik here to view.

An Introduction to Data Detection and Response (DDR)

How long would it take you to respond to a cloud data breach? For most organizations, the answer is far too long. When it takes less than a minute for an authorized user to download an entire...

View Article


Image may be NSFW.
Clik here to view.

Cloud Data Access: From Chaos to Governance

Controlling access to sensitive data is foundational to any cybersecurity strategy. But the cloud adds complications on the road to least privilege. In this post, we delve into the realities of data...

View Article

Use Context-Aware Data Classification for a Robust Data Security Posture

Enterprises often interpret a data security mandate as identifying configuration issues or vulnerabilities in their data infrastructure. To improve security posture, though, the scope of data security...

View Article

Image may be NSFW.
Clik here to view.

Ransomware in the Cloud: Breaking Down the Attack Vectors

The number of ransomware attacks, especially those involving Amazon S3 buckets, Azure Storage accounts and other cloud assets, has increased in recent years. Still, most organizations don't act to...

View Article


Shadow Data Is Inevitable, But Security Risks Aren’t

Shadow data is inevitable, particularly with the shift to cloud and data democratization. The ease of creating shadow data assets and the potential for faster insights incentivize employees. While...

View Article

Mastering Data Flow: Enhancing Security and Compliance in the Cloud

Many organizations struggle to determine their data’s precise locations and pathways, making it challenging to ensure security and compliance throughout its lifecycle, as it crosses borders and...

View Article

Image may be NSFW.
Clik here to view.

OpenAI Custom GPTs: What You Need to Worry About

The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. They also open the door...

View Article


Image may be NSFW.
Clik here to view.

5 Essential Components of a Cloud DLP Solution

The data loss prevention (DLP) landscape has taken a long while to catch up with the realities of the public cloud. In this post, we’ll explain why this tooling, developed in the on-premises era,...

View Article


Image may be NSFW.
Clik here to view.

Cloud Data Security & Protection: Everything You Need to Know

Sharon Farber / Mar 6 Data is currency for modern businesses. Organizations use data analytics to make decisions about new products and services or to provide better customer experiences. As companies...

View Article

Image may be NSFW.
Clik here to view.

Data Security Platforms: 9 Key Capabilities and Evaluation Criteria

Data Security Platforms: 9 Key Capabilities and Evaluation Criteria What Makes a Cloud Data Security Platform? Recent years have seen a flurry of new technologies and vendors — first in CSPM, and then...

View Article

Image may be NSFW.
Clik here to view.

An Incident Response Framework for Cloud Data Security

How do you respond to a security incident? In some cases, the answer might be ‘block first, ask questions later.’ That was common a decade ago in the centralized IT infrastructure. Security teams had...

View Article

Image may be NSFW.
Clik here to view.

Prisma Cloud DSPM Wins in Cloud-Native Data Security

The 2024 Globee Security Awards Gives Top Honors to Prisma Cloud Data Security Posture Management (DSPM) Solution in Multiple Categories Prisma Cloud DSPM (formerly Dig Security) was named a winner in...

View Article


Image may be NSFW.
Clik here to view.

Redshift Security: Access and Data Flows Explained

This blog post is the first in a series that exposes security risks, possible attack vectors, and how to hunt and prevent them using data detection and response (DDR). When correctly configured,...

View Article

Image may be NSFW.
Clik here to view.

Redshift Security: Data Backups and Encryption Best Practices

In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore security features and best practices that can prevent...

View Article


Image may be NSFW.
Clik here to view.

Redshift Security: Attack Surface Explained

In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce the static risk...

View Article

Image may be NSFW.
Clik here to view.

Prisma Cloud Data Security Vs. Other CSPM Vendors

Closing the gap on cloud data security is a top priority for today’s enterprises. To answer this need, data security posture management (DSPM) has emerged as one of the most in-demand categories in...

View Article


Image may be NSFW.
Clik here to view.

How to Build an Enterprise Data Security Team

Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics. One trend I’ve come across is the...

View Article

Image may be NSFW.
Clik here to view.

Announcing Prisma Cloud AI-SPM: Security and Compliance for AI-Powered Apps

As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management (AI-SPM) is a new set of capabilities that...

View Article

Image may be NSFW.
Clik here to view.

Are Cloud Serverless Functions Exposing Your Data?

More than 25% of all publicly accessible serverless functions have access to sensitive data, as seen in internal research. The question then becomes, Are cloud serverless functions exposing your data?...

View Article
Browsing all 27 articles
Browse latest View live