Stephanie Johnson

Stephanie Johnson

5 Critical Mistakes to Avoid: Choosing an NGFW in a Silo
January 16, 2018
Cyber Range: Fueling the Next Generation of Cyber Defenders
January 15, 2018
5 Critical Mistakes to Avoid: Incorrectly Sizing Your Future NGFW
January 9, 2018
A More Effective Cloud Security Approach: NGFW for Inline CASB
November 28, 2017
Only YOU Can Secure Your Data in the Public Cloud (In My Best Smokey the Bear Voice)
October 23, 2017
How to Prevent Accidental Data Exposure in the Cloud
June 30, 2017
Cyberpedia: Let’s Get to the Bottom of Cloud Security
June 20, 2017
How Can You Classify ALL Apps, ALL the Time? (Hint: Custom App-IDs)
May 31, 2017
Four Reasons to Use App-ID on Your Next-Generation Firewall
May 16, 2017
Cybersecurity Knowledge Is Breach Prevention Power: Introducing Cyberpedia
April 28, 2017
PAN-OS 8.0: New Hardware Enables Powerful Security Performance Without Compromise
March 6, 2017
PAN-OS 8.0: Three New Features in Panorama That Will Make Your Job Easier
February 24, 2017
PAN-OS 8.0: Cover Your SaaS By Securing Your Applications
February 22, 2017
PAN-OS 8.0: Accelerating Large-Scale, Multi-Cloud Deployments
February 15, 2017
5 Key Considerations When Implementing User-Based Access Controls
January 18, 2017
There’s No “I” in Secure Network: User-Based Access Policy is a Team Effort
January 11, 2017
Don’t Let Your Users Unknowingly Be the Weak Link in Your Security Infrastructure
January 4, 2017
Cloud Security: Who’s Responsible for What?
December 19, 2016
The Cybersecurity Download: User-Based Access Controls
October 26, 2016
Cybersecurity and Election Time: How to Avoid Being a Victim
October 12, 2016

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS