Quantcast
Channel: Redshift Security: Data Backups and Encryption Best Practices - Palo Alto Networks Blog
Browsing latest articles
Browse All 108 View Live

Image may be NSFW.
Clik here to view.

Cloud Workload Protection, Now Operating at Full Context

Cloud workload protection (CWP) changed the game when it arrived. For the first time, teams could extend security controls into new cloud native workloads where traditional security methods no longer...

View Article


Image may be NSFW.
Clik here to view.

Weak Identity Governance Leads to Data Exposure — 3 Attack Paths Explained

Identity and access management (IAM) shapes every cloud resource interaction — from a business user viewing a document to an AI model conducting complex operations on vectorized data. Controlling...

View Article


The Rise of AI-Powered IDEs: What the Windsurf Acquisition News Mean for...

Earlier this week, several news outlets reported that OpenAI has agreed to acquire Windsurf, an AI coding assistant, for approximately $3 billion. While the news isn’t yet final, it highlights the...

View Article

Image may be NSFW.
Clik here to view.

Cortex Cloud Stands Alone to Secure Mission-Critical Workloads with FedRAMP...

In just three months, Cortex® Cloud has earned FedRAMP High and Moderate authorization — establishing itself as the only CNAPP on the FedRAMP Marketplace with both High and Moderate authorization. The...

View Article

Image may be NSFW.
Clik here to view.

Anatomy of a Kubernetes Attack: How Cortex Cloud Provides End-to-End Protection

Attackers no longer strike in isolation. In cloud-native environments, they orchestrate multistage campaigns that move laterally across workloads and vertically through cloud control planes. For teams...

View Article


Image may be NSFW.
Clik here to view.

Model Context Protocol (MCP): A Security Overview

The Model Context Protocol (MCP), introduced by Anthropic in November 2024 to connect AI models to data, has taken off in recent months. Countless companies have announced new integrations based on...

View Article

Image may be NSFW.
Clik here to view.

Kubernetes: A Practitioner’s Guide to KSPM

Kubernetes doesn’t just orchestrate containers — it orchestrates complexity. Security practitioners defending sprawling, multitenant environments can’t rely on surface-level dashboards or vague...

View Article

Image may be NSFW.
Clik here to view.

The Best Cloud Threat Detection Just Got Better

Cortex CDR—Stronger Runtime Protection, Enhanced Threat Detection and Robust Automation Backed by the World’s Most Deployed SOAR Cloud attackers no longer need days or even hours. One exposed service...

View Article


Image may be NSFW.
Clik here to view.

The New AI Attack Surface — How Cortex Cloud Secures MCP

With remarkable momentum behind its adoption, the Model Context Protocol (MCP) is quickly becoming the de facto interface for connecting large language models (LLMs) to tools, APIs, databases and other...

View Article


Image may be NSFW.
Clik here to view.

Cloud Attack Surface Management: See What Other CNAPPs Miss

New cloud services spin up daily, and many outside the view of security teams. While this accelerates innovation, it creates a growing number of internet-exposed assets and services that attackers can...

View Article
Browsing latest articles
Browse All 108 View Live