• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality


Palo Alto Networks
Published by: Research Desk Released: Nov 21, 2022

Taylor Ettema of Palo Alto Networks on
the Key Capabilities Needed in Response

: I’ve been looking at internet and
web-based attacks for over 10 years now, and the
threat landscape is always evolving. But this time it
is different – just the rate of change and the amount
of sophistication, particularly in the areas of evasion
where adversaries, ever present, ever trying to get
into corporate networks by any means necessary,
are using a lot of the same attacks we’re all familiar
with, like credential phishing, malware attacks, webbased attacks, but they’re getting ever more adept
at hiding those attacks so that security vendors can’t
find them. They’re using a variety of tricks to do that.
The rate of attacks and their sophistication is unlike
anything we’ve seen in the past.

Welcome Dear

Thank you for your interest and your registration with Teradata. Please confirm your e-mail address to complete your registration by clicking here

Yes, confirm my

By confirming this, you give Teradata your consent to send you information on our data analytics products and services or invitations to events and webinars by e-mail from time to time. You can revoke this consent at any time by clicking on the unsubscribe link at the bottom of each of our e-mails. We assure you that we treat your contact details with the utmost care. Detailed information on how we store and use your personal data or how you can exercise your rights regarding your personal data can be found in the global Teradata Privacy Policy.