Overview
Explore
Services
Experts
Events
Select a tab
86 results found
Infrastructure as a Strategic Target of War
As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026
SSL Certificate Validity Changes 2025: How to Prepare Your Business Now
Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025
Stop Stacking Boxes. Start Designing Security.
Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
•May 6, 2024
OWASP API Top Ten 2023 - All Your API Vulnerabilities Are Belong to Us
The OWASP just released their API Top Ten API Security Risks for 2023. Here's the rundown with some inside industry perspective.
Blog
•Sep 21, 2023
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
Milan 2026: Securing the Upcoming Winter Games in an Age of Hyper-Connectivity and AI-Driven Chaos
The expanding digital ecosystem of the Winter Games demands identity-first, AI-aware security heading into Milan 2026.
Blog
•Feb 5, 2026
Integrating Dataminr into a Palo Alto Networks–Centric Platform
Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026
The Grizzled CyberVet's Tactical Plan: Mapping Palo Alto Networks to MITRE ATT&CK
Next up in the Grizzled CyberVet series: A global enterprise faces a full-scale cyberattack spanning every stage of the MITRE ATT&CK framework. Armed with Palo Alto Networks' full security platform, they stop the threat at every turn. Learn how a unified security strategy can outmatch attackers before they succeed. Read on to see it in action!
Blog
•Mar 19, 2025
Check Point and the Post-Quantum Transition
Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025
The Grizzled CyberVet: How Palo Alto Networks Powers End-to-End Cyber Defense
Fragmented security solutions create inefficiencies and vulnerabilities. This article explores how Palo Alto Networks' integrated platform addresses these gaps, breaking the cybersecurity kill chain at every stage. By consolidating security functions, organizations enhance threat prevention, streamline operations and reduce costs. Learn how a unified approach strengthens defenses and why proactive security is essential for business resilience.
Blog
•Mar 14, 2025