Get to know # Rachel Deng *** ** * ** *** Blogs by Rachel Deng Sort By: Recent Recent Popular *** ** * ** *** [![Detect DNS Threats for AWS Environments with Prisma Cloud](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/02/Serious-Man-2.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/dns-based-threat-detection/) ## [Cloud Security Posture Management](https://www.paloaltonetworks.com/blog/category/cloud-security-posture-management/?ts=markdown) ### [Detect DNS Threats for AWS Environments with Prisma Cloud](https://www2.paloaltonetworks.com/blog/cloud-security/dns-based-threat-detection/) Given the prevalence of the Domain Name System (DNS) protocol on any type of network, it's essential for organizations to monitor DNS traffic for suspicious activity, as cyber attacks may leave traces ... Mar 21, 2023 By [Ignacio Bermudez Corrales](https://www.paloaltonetworks.com/blog/author/ignacio-bermudez-corrales/?ts=markdown "Posts by Ignacio Bermudez Corrales") and [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** [![Prisma Cloud Now Detects Threats Using the TOR Network](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/06/Cityscape.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/threat-detection-using-tor-networks/) ## [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [Cloud Security Posture Management](https://www.paloaltonetworks.com/blog/category/cloud-security-posture-management/?ts=markdown) ### [Prisma Cloud Now Detects Threats Using the TOR Network](https://www2.paloaltonetworks.com/blog/cloud-security/threat-detection-using-tor-networks/) Prisma Cloud extends its CSPM threat detection capabilities to surface threats and unusual behavior coming from the TOR network. Jun 06, 2022 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng"), [Venkatesh Pappakrishnan](https://www.paloaltonetworks.com/blog/author/venkatesh-pappakrishnan/?ts=markdown "Posts by Venkatesh Pappakrishnan") and [Alok Tongaonkar](https://www.paloaltonetworks.com/blog/author/alok-tongaonkar/?ts=markdown "Posts by Alok Tongaonkar") *** ** * ** *** [![Enhancing UEBA with Compute Provisioning Anomaly Detection](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/06/Coding.jpeg)](https://www2.paloaltonetworks.com/blog/cloud-security/compute-provisioning-anomaly-detection/) ## [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) ### [Enhancing UEBA with Compute Provisioning Anomaly Detection](https://www2.paloaltonetworks.com/blog/cloud-security/compute-provisioning-anomaly-detection/) While we tend to talk about them as if they were a single entity, cloud environments are typically composed of multiple accounts across different global regions, with many users that have varying ... Jun 10, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** [![Network-Based Data Exfiltration Detection Extends Visibility of Threats](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Aerial-Sunset-on-City-1.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/network-based-data-exfiltration-detection/) ## [Cloud Network Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-network-security/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) ### [Network-Based Data Exfiltration Detection Extends Visibility of Threats](https://www2.paloaltonetworks.com/blog/cloud-security/network-based-data-exfiltration-detection/) By analyzing a combination of network flow logs and user behavior, Prisma Cloud can help identify potential malicious data exfiltration attempts before they become an issue. Jun 09, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** [![How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Aerial-Sunset-on-City-1.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/how-to-set-up-prisma-cloud-threat-detection/) ## [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ### [How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www2.paloaltonetworks.com/blog/cloud-security/how-to-set-up-prisma-cloud-threat-detection/) We'll outline how to set up Prisma Cloud for threat detection, which is an important aspect of a strong security posture. Jun 01, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** Load more *** ** * ** *** Blogs by Rachel Deng Sort By: Popular Popular Recent *** ** * ** *** [![Enhancing UEBA with Compute Provisioning Anomaly Detection](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/06/Coding.jpeg)](https://www2.paloaltonetworks.com/blog/cloud-security/compute-provisioning-anomaly-detection/) ## [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) ### [Enhancing UEBA with Compute Provisioning Anomaly Detection](https://www2.paloaltonetworks.com/blog/cloud-security/compute-provisioning-anomaly-detection/) While we tend to talk about them as if they were a single entity, cloud environments are typically composed of multiple accounts across different global regions, with many users that have varying ... Jun 10, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** [![Network-Based Data Exfiltration Detection Extends Visibility of Threats](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Aerial-Sunset-on-City-1.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/network-based-data-exfiltration-detection/) ## [Cloud Network Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-network-security/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) ### [Network-Based Data Exfiltration Detection Extends Visibility of Threats](https://www2.paloaltonetworks.com/blog/cloud-security/network-based-data-exfiltration-detection/) By analyzing a combination of network flow logs and user behavior, Prisma Cloud can help identify potential malicious data exfiltration attempts before they become an issue. Jun 09, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** [![Prisma Cloud Now Detects Threats Using the TOR Network](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/06/Cityscape.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/threat-detection-using-tor-networks/) ## [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [Cloud Security Posture Management](https://www.paloaltonetworks.com/blog/category/cloud-security-posture-management/?ts=markdown) ### [Prisma Cloud Now Detects Threats Using the TOR Network](https://www2.paloaltonetworks.com/blog/cloud-security/threat-detection-using-tor-networks/) Prisma Cloud extends its CSPM threat detection capabilities to surface threats and unusual behavior coming from the TOR network. Jun 06, 2022 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng"), [Venkatesh Pappakrishnan](https://www.paloaltonetworks.com/blog/author/venkatesh-pappakrishnan/?ts=markdown "Posts by Venkatesh Pappakrishnan") and [Alok Tongaonkar](https://www.paloaltonetworks.com/blog/author/alok-tongaonkar/?ts=markdown "Posts by Alok Tongaonkar") *** ** * ** *** [![How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Aerial-Sunset-on-City-1.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/how-to-set-up-prisma-cloud-threat-detection/) ## [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ### [How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www2.paloaltonetworks.com/blog/cloud-security/how-to-set-up-prisma-cloud-threat-detection/) We'll outline how to set up Prisma Cloud for threat detection, which is an important aspect of a strong security posture. Jun 01, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** [![How The MITRE ATT\&CK For Cloud Framework Can Improve Threat Detection](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/03/Man-Using-Computer-Twitter.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/mitre-attck-for-cloud-improve-threat-detection/) ## [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ### [How The MITRE ATT\&CK For Cloud Framework Can Improve Threat Detection](https://www2.paloaltonetworks.com/blog/cloud-security/mitre-attck-for-cloud-improve-threat-detection/) Prisma Cloud CSPM utilizes the MITRE ATT\&CK for Cloud framework to identify and mitigate risks effectively, and detect attack incidents quickly. Apr 22, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") *** ** * ** *** Load more {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language