The first day of Palo Alto's Ignite conference brings new security features, as the company releases its latest cyberthreat research. Credit: iStock Firewall and security software vendor Palo Alto Network's annual Ignite conference kicked off Tuesday, highlighted by several product announcements, which were unveiled alongside the company's latest threat report. Palo Alto's "What's Next in Cyber" report named ransomware and business email compromise as the most common attacks faced by businesses worldwide, with supply chain threats, malicious insiders and DDoS attacks rounding out the top five. Over the course of the past year, 96% of respondents to the company's executive survey said that they'd experienced at least one security breach, and over half said that they'd experienced three or more. Fully 84% said that they pin the responsibility for increased security incidents in the past year on the growing prevalence of remote work. What that means for the rank-and-file security professional remains to be seen, but Palo Alto predicts that one consequence, at least, is that a large-scale consolidation of security offerings is in the works. The report found that more than 41% of organizations surveyed said that they're working with 10 or more cybersecurity vendors at once--an organizational headache that, Palo Alto implied, is going to become unsustainable for many. The company also announced several of its own new offerings designed to help address the increasingly foreboding cyberthreat landscape today, including a partnership for zero-trust network access with Google Cloud, zero-day protection improvements in Palo Alto's PAN-OS firewall software, and better software defenses via the company's Prisma Cloud CNAPP (cloud-native application protection platform). The new ZTNA offering pairs Google Cloud's BeyondCorp Enterprise access control system with Palo Alto's security service edge technology. The latter is a subset of Gartner's SASE security framework that provides in-built security services via a cloud platform, while the former is a fine-grained user access framework designed to ensure that only specific users have access to the computing resources they need. The partnership is designed to address some of the aforementioned "security sprawl" and reduce the number of individual offerings required to provide end-to-end protection against modern threats. Palo Alto's PAN-OS improvements, which were initially announced in November, are focused on simplifying the software's internal structure and providing updated detection and mitigation techniques to work against advanced modern threats--the company said that the latest versions of the operating system can catch 60% of injection attacks that traditional intrusion prevention systems miss, as well as 26% of advanced zero-day threats thanks to advanced sandboxing techniques. Finally, the Prisma Cloud CNAPP now boasts built in "secret" detection, the company said. Throughout the software development and deployment process, the system can proactively scan for exposed configuration data--like passwords, usernames and access tokens--and alert developers if that data is present in runtimes. "Cybersecurity has never been more important as governments and organizations prioritize their digitization," said CEO Nikesh Arora in a press release. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe