Cloud Security Defense Report – October 2024

Cloud Security Defense Report – October 2024

While the days are getting shorter and the autumn leaves continue to fall, the cloud security threats are as impactful as ever. That’s why we're excited to present the October edition of our Cloud Security Defense Report!??

Join us as we explore the latest in cloud security, from a technical analysis of the fake recruiters’ activity in the contagious interview campaign to uncovering vulnerabilities within Amazon SageMaker. This month, we're putting the spotlight on evaluating cloud security tools, offering you invaluable insights and expert guidance on selecting tools to secure your cloud.

We're eager to hear your thoughts, so please drop us a comment to share what you found useful—we always value your suggestions. Let's continue safeguarding the cloud together!

Hot Topics in Cloud Security ??

Detailed exploration of some of the most impactful cloud security topics…

Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware?

Get a technical analysis of the fake recruiters’ activity in the contagious interview campaign, an examination of the MacOS, Windows, and Python malware being used, and insights into how to detect and prevent this cross-platform threat. Read the blog

Attack Surface Explained: Amazon SageMaker?

Take a deep dive into the various features of Amazon SageMaker and learn how to defend them against exploitation as attack vectors. Read the blog

DEVOPS EXPERIENCE: Accelerating DevOps - Platforms, Culture and Velocity

Understand emerging trends in DevOps, get advanced platform engineering techniques to optimize DevOps workflows, learn how to harness AI assistants to streamline automation processes, and more. Watch replay


Monthly Cloud Security Spotlight ?? — Evaluating Security Tools

The Insider’s Guide to Evaluating Cloud Security Platforms

Explore the most pressing cloud security challenges that organizations face today, unpack research and insights from Gartner and Forrester, and gain tips and guidance on evaluating the cloud security market beyond surface features. Watch webinar

Selecting and Evaluating DSPM Solutions

Understand the vital role of data security posture management (DSPM) and learn what to look for in a DSPM tool and how to determine the total cost of ownership for your organization. Download report

The Forrester Wave?: Cloud Workload Security

Forrester researched, analyzed and scored 13 top providers. See their findings and learn how to effectively evaluate CWS platforms, what to consider when choosing a CWS partner, and which additional capabilities are critical to a holistic CWS solution. Download report

Gartner CNAPP Market Guide

Get recommendations and market analysis on CNAPP solutions, including insights into the expanding attack surface of cloud-native applications, market growth and vendor consolidations trends, and new CNAPP expansion areas like application security posture management (ASPM) and data security posture management (DSPM). Download report

Don’t forget to subscribe to the Prisma Cloud blogs , delivered fresh to your inbox every Friday for a weekly recap.

Customer Showcase ?

See what Prisma Cloud has accomplished as Quantiphi’s single, integrated platform for cloud security and how the Code to CloudTM platform delivers proactive misconfiguration resolution and vulnerability management. Learn more about how Quantiphi achieves optimum?visibility, governance and threat detection with Prisma Cloud .


More Information


?2024 Palo Alto Networks. All the company names and/or brand names, and/or product names, and/or logos referred to in this document are either registered trademarks or trademarks pending registration in accordance with relevant national laws.

Cyber threats are increasing in a daily basis, so we must take care with them.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了