Stephanie Johnson

Stephanie Johnson

Palo Alto Networks Academy: Protecting Life in the Digital Age One Student at a Time
February 26, 2018
Announcing PAN-OS 8.1: Streamline SSL Decryption, Accelerate Adoption of Security Best Practices
February 20, 2018
5 Critical Mistakes to Avoid: Choosing an NGFW With a Steep Learning Curve and Minimal Support
February 5, 2018
5 Critical Mistakes to Avoid: Not Accounting for Ease of Integration and Scalability
January 30, 2018
5 Critical Mistakes to Avoid: Buying In to NGFW Roadmap Features and Promises
January 23, 2018
5 Critical Mistakes to Avoid: Choosing an NGFW in a Silo
January 16, 2018
Cyber Range: Fueling the Next Generation of Cyber Defenders
January 15, 2018
5 Critical Mistakes to Avoid: Incorrectly Sizing Your Future NGFW
January 9, 2018
A More Effective Cloud Security Approach: NGFW for Inline CASB
November 28, 2017
Only YOU Can Secure Your Data in the Public Cloud (In My Best Smokey the Bear Voice)
October 23, 2017
How to Prevent Accidental Data Exposure in the Cloud
June 30, 2017
Cyberpedia: Let’s Get to the Bottom of Cloud Security
June 20, 2017
How Can You Classify ALL Apps, ALL the Time? (Hint: Custom App-IDs)
May 31, 2017
Four Reasons to Use App-ID on Your Next-Generation Firewall
May 16, 2017
Cybersecurity Knowledge Is Breach Prevention Power: Introducing Cyberpedia
April 28, 2017
PAN-OS 8.0: New Hardware Enables Powerful Security Performance Without Compromise
March 6, 2017
PAN-OS 8.0: Three New Features in Panorama That Will Make Your Job Easier
February 24, 2017
PAN-OS 8.0: Cover Your SaaS By Securing Your Applications
February 22, 2017
PAN-OS 8.0: Accelerating Large-Scale, Multi-Cloud Deployments
February 15, 2017
5 Key Considerations When Implementing User-Based Access Controls
January 18, 2017
There’s No “I” in Secure Network: User-Based Access Policy is a Team Effort
January 11, 2017
Don’t Let Your Users Unknowingly Be the Weak Link in Your Security Infrastructure
January 4, 2017
Cloud Security: Who’s Responsible for What?
December 19, 2016
The Cybersecurity Download: User-Based Access Controls
October 26, 2016
Cybersecurity and Election Time: How to Avoid Being a Victim
October 12, 2016

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

© 2019 Palo Alto Networks, Inc. All rights reserved.