Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Palo Alto Networks I Unit 42

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit

Unit 42 brings together an elite group of cyber researchers and incident responders to protect our digital way of life. With a deeply rooted reputation for delivering industry-leading threat intelligence, Unit 42 has expanded its scope to provide state-of-the-art incident response and cyber risk management services. Our consultants will serve as trusted partners to rapidly respond to and contain threats so you can focus on your business. Visit

Our Website:

Latest Content From Palo Alto Networks I Unit 42

Research Report: 2021 Unit 42 Ransomware Threat Report

by Palo Alto Networks I Unit 42Sep 16, 2021

As threat actors continue developing new and updated ransomware variants, how can your organization stay proactive?

Download the "2021 Unit 42 Ransomware Threat Report" to learn:

  • Top ransomware threats and how to identify them
  • Which industries are seeing an increase in ransomware attacks and why
  • Ransomware's future and how you can prepare for what's next
Take the first step toward a stronger ransomware prevention and protection strategy. Download the threat report now.

Whitepaper: Cyber Risk Management Worksheet

by Palo Alto Networks I Unit 42Apr 21, 2021

View this worksheet to determine the current maturity level of your organization and take the cyber risk assessment to identify organizational strengths, weaknesses, and opportunities.

Whitepaper: Cybersecurity Expertise Retainer Datasheet

by Palo Alto Networks I Unit 42Apr 21, 2021

Read this datasheet to discover the benefits of having a Cybersecurity Expertise Retainer including lowering the likelihood and cost of a breach.

Research Report: Forrester's Planning for Failure: How to Survive a Breach

by Palo Alto Networks I Unit 42Sep 16, 2021

You may not stop every cyberattack, but you can avoid the worst effects of a security failure if you have a plan.

Forrester's new report, "Planning for Failure: How to Survive a Breach," covers:

  • Planning for the legal and regulatory complexity of a security breach
  • How to initiate an incident response program, including internal testing and training
  • The benefits of preparation to boost customer trust

Get your complimentary security report now.

Whitepaper: Incident Response and Data Breach Report

by Palo Alto Networks I Unit 42May 20, 2021

Get a detailed review of the most pervasive and impactful cyber threats found amongst Palo Alto Networks | Unit 42's investigations in 2020. Download the comprehensive analysis of the top cyber threats that occurred last year and check out the Pro Tips to help your organization fight back.

Whitepaper: Ransomware’s New Trend: Exfiltration & Extortion

by Palo Alto Networks I Unit 42Sep 16, 2021

To stay ahead of data exfiltration and extortion cyber attacks, your organization needs to implement a proactive ransomware protection strategy to prevent threats and prepare for the evolution of ransomware.

In this white paper you'll learn:

  • How data exfiltration is used during ransomware attacks
  • The anatomy of this type of attack
  • Attack tactics, techniques and procedures (TTPs)
  • Best practices to protect your organization

Read this white paper today to make sure you're prepared for tomorrow.

Webcast: The Tech Exec’s Ransomware Incident Response Playbook

by Palo Alto Networks I Unit 42Jan 20, 2022

Sooner or later, your business is likely to be hit with a ransomware attack. Perhaps you’ve planned for it, but are you truly prepared? When the time comes, however, the careful planning may not be tailored to a specific incident. In that case, you have to be able to react and adjust in real time. Beyond just knowing whether or not to pay a ransom, you have to be sure your tools, processes, and procedures are adaptable so that during a stressful moment, you’re making the right decisions to save your company’s business. Our experts will outline a trusted guide ensuring you have the right incident response, develop ironclad backups, and follow a business continuity plan.

E-Book: Unit 42 & ESG Incident Response Ebook

by Palo Alto Networks I Unit 42Sep 16, 2021

An incident response plan and retainer are critical to organizational security.

ESG's "An Ounce of Prevention: Investing in Incident Readiness" study reveals significant insight into:

  • The impact of breach preparation on confidence and maturity of response
  • Efficacy of incident readiness services purchased
  • Best practices in the incident response and readiness market
  • Incident response service preferences according to market segment
View ESG's study now to get your incident response plan on track.

Whitepaper: Unit 42 2021 Ransomware Threat Report

by Palo Alto Networks I Unit 42Apr 21, 2021

Read the 2021 Ransomware Threat Report to better understand threats, trends and ransomware tactics.

Research Report: Unit 42 Incident Response and Data Breach Report

by Palo Alto Networks I Unit 42Sep 16, 2021

Does your organization have the security it needs to outpace new, advanced threats?

Download the 2020 Unit 42 Incident Response and Data Breach Report to learn rich insights into real-world cyber risks and practical advice for protecting your organization, including:

  • Analysis of the top cybersecurity risks by industry
  • Best practices and tips for each risk area
  • Detailed looks into incidents types
Equip your organization with the expertise to mitigate cyber risks. Download the report now.