Cloud Security Defense Report - July 2024
Prisma Cloud by Palo Alto Networks
The industry’s most complete cloud-native application protection platform (CNAPP)
Welcome to the second edition of the Cloud Security Defense Report — your go-to source for the latest insights, best practices and innovations in cloud security. We want to keep you informed and ahead of the curve as we explore how to safeguard your cloud environments with expert advice from Palo Alto Networks.?
This newsletter is published on the last Friday of every month. Leave a comment about what you found useful and what you’d like to hear more about in next month's edition.
Hot Topics in Cloud Security ??
Tackling AI Risk Requires a New Governance Framework
Artificial intelligence (AI) is advancing rapidly, with organizations across various industries deploying AI-powered applications at an unprecedented pace. However, these systems introduce novel security risks and governance challenges that traditional cybersecurity approaches cannot adequately address. Read the blog
The Growing Dichotomy of AI-Powered Code in Cloud-Native Security
AI-generated code offers unparalleled efficiency gains but it also introduces formidable security risks. Read on to gain an in-depth understanding of the nuances between AI-developed code and security within the cloud-native ecosystem. Read the blog
Container Breakouts: Escape Techniques in Cloud Environments
Take a deep dive into container escape techniques, their possible impact and how to detect these escapes from the perspective of endpoint detection and response (EDR). Read the blog
Threat Brief: CVE-2024-6387 OpenSSH RegreSSHion Vulnerability
On July 1, 2024, a critical signal handler race condition vulnerability was disclosed in OpenSSH servers (sshd) on glibc-based Linux systems. This vulnerability, dubbed RegreSSHion and tracked as CVE-2024-6387, can result in unauthenticated remote code execution (RCE) with root privileges. Learn everything you need to know. Read the threat brief
Monthly Cloud Security Spotlight ?? — Vulnerability Management and Container Security
Best Practices for Managing Vulnerabilities in the Cloud
Coordinating vulnerability management across diverse systems and applications, including cloud-based infrastructure and third-party software, is inherently complex and time-consuming. This 2-part blog series explores four best practices for managing vulnerabilities from code to cloud. Blog Part 1 | Blog Part 2
Strategies for Success: Developing a Comprehensive Cloud Vulnerability Management Program
If you’re looking to develop a comprehensive cloud vulnerability management program, this webinar delivers actionable strategies, proven methodologies and practical tips for success. Learn from industry leaders who share valuable insights into identifying, prioritizing and remedying vulnerabilities in your cloud infrastructure to strengthen your overall security posture. View on-demand webinar ?
领英推荐
Agent Vs. Agentless: Determine the Right Deployment Option for Cloud Workload Protection?
It’s important to make the right decisions when implementing cloud workload protection. In this infographic you'll learn the pros and cons of agentless vs. agent-based solutions, cloud workload protection trends, and whether agentless or agent-based protection is best for your situation. View Infographic
The Definitive Guide to Container Security
Securing your containerized applications is a critical component of maintaining the integrity, confidentiality and availability of your services in the cloud. Whether you’re new to containers or a cloud-native veteran, The Definitive Guide to Container Security is your essential resource for understanding, implementing and mastering security in a containerized environment. Read the e-book
The Shift-Left Approach to Container Security
This upcoming webinar is an introduction to container security and how to leverage application security and workload protection from Prisma? Cloud in your container environment. Learn proper vulnerability management practices for containers, compliance management, incident response strategies and proper image vetting processes. Register for webinar
Mastering Vulnerability Management in the Cloud
Discover the latest insights on vulnerability management and learn how to effectively manage vulnerabilities in the cloud. This tip sheet provides valuable information and best practices to help you take control of vulnerability management. Read the tipsheet.
Don’t forget to subscribe to the Prisma Cloud blogs , delivered fresh to your inbox every Friday for a weekly recap.
Customer Showcase ?
Gain insights into how organizations like Global Atlantic, PEXA, Registers of Scotland and Aramis Group use Prisma Cloud to tackle vulnerability management. Explore Storybook.
More Information
?2024 Palo Alto Networks. All the company names and/or brand names, and/or product names, and/or logos referred to in this document are either registered trademarks or trademarks pending registration in accordance with relevant national laws.
--
3 周Struggling to keep up with traffic, security demands, or scaling needs? ?? Utho’s Simplified Load Balancers take the weight off by enhancing performance, tightening security, and scaling effortlessly. Discover smoother operations at Utho https://surl.li/ppddqf