Date

By Year

By Type

  • In The News (1216)

By Topic

  • Cybersecurity (156)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1226)

By Language

Displaying 1 to 30 of 1537

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.

  • 0
  • 20

VMblog's Expert Interviews: Palo Alto Networks Shares Why the Automotive Industry will Invest in Secure Cloud Environments in 2018

Cloud is transforming many industries, and the automotive industry is no exception. Dharminder Debisarun, product marketing manager, Cloud Security lead, EMEA at Palo Alto Networks talks about why cloud security adoption will disrupt the automotive industry in 2018.

  • 0
  • 16

The CyberWire Daily Podcast for 12.12.17

Rick Howard from Palo Alto Networks discusses DevOps vs. site reliability engineers.

  • 0
  • 23

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames; called "Boleto Mestre", about 261,098 e-mails have already been distributed since June

  • 0
  • 19

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Unit 42, the Palo Alto Networks research unit, has identified a malspam (malicious spam) campaign specially developed to affect Brazilian victims. Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames.

  • 0
  • 21

CRN's 2017 Products Of The Year

Recent updates as part of Palo Alto Networks' PAN-OS 8.0 adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention, and integrations with complementary vendors.

  • 0
  • 48

False tickets serve as bait to contaminate PCs with viruses

The security company Palo Alto Networks announced on Thursday (7) an alert about a coup that circulates in Brazil using fake tickets. In a criminal campaign monitored by the company, more than 260,000 emails have been sent since June 2017. Whoever falls in the coup and tries to open the tickets ends up having the computer infected with a digital plague that steals information, including passwords.

  • 0
  • 21

Guarding against the next cyber attack

Army veteran and cyber security expert Rick Howard talks to the FT's Hannah Kuchler about the current state of cyber security, what we have learned from recent large-scale attacks known as WannaCry and NotPetya and what companies can do to try to guard against the next attack. 

  • 0
  • 36

The Security Risk Lurking in the Board of Directors

An enterprise's board of directors is there to steer the business. However, in some cases, it is wearing a security blindfold and the vehicle they are steering is drifting off the road. A series of training sessions with Palo Alto Networks Inc. now shows that the classic strengths of the board can actually be weaknesses when it comes to shoring up the company, according to some of the output captured from those sessions and shared with Security Now.

  • 0
  • 28

Vendor Q&A Series: Karl Soderlund, Palo Alto Networks

The Palo Alto Networks NextWave Channel Partner Program is designed to help partners with technical differentiation and specializations, gain access to more profitable opportunities, simplify the way we interact with and support partners and to help them build sustainable, breach prevention-focused security practices.

  • 0
  • 26

IoT is changing the meaning of ‘critical infrastructure’

The proliferation of internet of things devices tied into critical industries such as transportation and healthcare is changing the perspective on what constitutes critical infrastructure, according to government and industry experts who spoke at the 2017 CyberCon. “The attack surface is going to expand greatly,” said Ret. Maj. Gen John Davis, vice president and federal chief security officer at Palo Alto Networks.

  • 0
  • 87

Top cybersecurity CEO touts benefits of 'a return to normalcy' in the Federal Government

Jim Cramer logged in with Palo Alto Networks Chairman and CEO Mark McLaughlin to hear about the latest in cybersecurity.

  • 0
  • 106

Three Things to Consider Before Incorporating Machine Learning into Your Security Efforts

We have been hearing a lot of buzz about artificial intelligence (AI) for years, but more recently, the discussion within the cybersecurity industry has centered around machine learning (ML), an approach to AI that focuses on using algorithms to sift through data, learn from it and inform action based on the analytics, such as automatically preventing an unknown threat.

  • 0
  • 102

North Korean Hackers Target Android Users in South

At least two cybersecurity firms have noticed that the notorious Lazarus threat group, which many experts have linked to North Korea, has been using a new piece of Android malware to target smartphone users in South Korea.

  • 0
  • 160

Middle East 'MuddyWater' Attacks Difficult to Clear Up

Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week. Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date

  • 0
  • 170

The CyberWire Daily Podcast 11.13.17

Rick Howard from Palo Alto Networks discusses network defender best practices including Vendor in Depth and Best of Breed.

  • 0
  • 153

A rocket scientist hacks the cybersecurity labor crisis

You don't have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021. Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now president of Girl Scouts of the United States of America, has partnered with Palo Alto Networks on a stroke of genius: training young girls on cybersecurity.

  • 0
  • 157

How tech firms are trying to recruit veterans for cybersecurity jobs

Veteran job seekers are more likely than non-veterans to be underemployed, despite the fact that the majority of employers report that veterans perform "better than" or "much better than" non-veterans, according to a survey released this week by ZipRecruiter and the Call of Duty Endowment. Meanwhile, there's a severe shortage of skilled U.S. workers needed for open technology jobs, particularly in the cybersecurity field.

  • 0
  • 157

What Is Cryptojacking? Trend Continues To Grow

Most people are aware of the potential threats looming online but a new trend called cryptojacking can steal a user’s computing power and use it to mine profitable cryptocurrencies for attackers. Unlike other attacks like adware that bombards a user with advertisements that can redirect them to spam-filled websites or malware that requires the user to download and install a piece of software, cryptojacking is relatively unintrusive and generally less harmful than other attacks—though that doesn’t make the intentions less malicious.

  • 0
  • 179

Preventing Credential Theft: A Security Checklist for Boards

Board members pose a unique risk for business, but proper planning helps. Within any organization, certain employees have access to information that could tip the scales of risk for the business. If a cybercriminal were to gain access to a company's most sensitive information through stealing credentials from one of these employees, the business could face serious financial and reputational repercussions.

  • 0
  • 201

Consistency is Key for IoT Security

Increasingly, companies are connecting thousands of devices to the internet. From smart TVs to conference rooms to thermostats. Most of these devices have been built specifically to perform a single function, regardless of the safety factor. While this flow of technology is critical to the evolution of our digital age, it also presents a new layer of risk to organizations.

  • 0
  • 197

CRN Exclusive: Palo Alto Networks Expands NextWave Partner Program With New Public Cloud Specialization

When it comes to the public cloud, Palo Alto Networks said it is doubling down with partners. The Santa Clara, Calif.-based security vendor has launched the pilot for a new Public Cloud Specialization, as part of its NextWave Partner Program.

  • 0
  • 221

The Ten Cybersecurity Commandments

Cybersecurity Awareness Month is, once again, upon us. At its core is an issue that can have a massive impact on organizations in every industry, public and private, large and small: successful cyberattacks and how to prevent them from happening in the first place.

  • 0
  • 164

How Businesses Are Applying AI to Cybersecurity

In a digital threat landscape where businesses are constantly playing catch-up with new attack vectors and vulnerabilities, the best defense they have is the same thing that makes them such an appealing target for hackers: a mountain of data.

  • 0
  • 239

Bitcoin boom prompts growth of coin-mining malware

The booming price of Bitcoin and other crypto-coins has kicked off a gold rush among malicious hackers keen to cash in, warn security firms. Many sites are now harbouring code that secretly uses a visitors' computer to mine the valuable e-cash coins. Palo Alto Networks said it had found Coin-Hive on almost 150 separate domains. The most popular locations for the code were porn, video and file-sharing sites.

  • 0
  • 283

Your Board Of Directors Is Exposing You To Risk

It’s commonly accepted that your users are the weakest link in your security chain. That is actually not true in a lot of cases, though. The reality is that your true Achilles heel is probably your board of directors. Rick Howard, chief security officer of Palo Alto Networks, pointed out that board members, on the other hand, are not employees and generally operate completely outside the scope and protection of your information security tools and policies—using personal computers and mobile devices.

  • 0
  • 288

VMblog Expert Interview: Palo Alto Networks Talks Cybersecurity Awareness and the Cybersecurity Books Every CIO Should Read

Whether it's ransomware or a data breach, it feels like every day we read about a new cyberattack that leaves our organizations - or us, as individuals - at risk for cybertheft. Understanding the threat landscape is critical to prevent cyberattacks, and regardless of your title within the organization, understanding more of that landscape contributes to the well-being of the organization. October is National Cyber Security Awareness Month, so I sat down with Rick Howard, CSO at Palo Alto Networks to talk about the top five cybersecurity books that he recommends every CIO read to learn more about the cyberthreat playing field.

  • 0
  • 275

Hackers Hijack Ongoing Email Conversations to Insert Malicious Documents

A group of hackers is using a sophisticated technique of hijacking ongoing email conversations to insert malicious documents that appear to be coming from a legitimate source and infect other targets participating in the same conversational thread.

  • 0
  • 343

In-progress email threads were hacked to spearphish private companies, report says

A newly identified spearphishing campaign targeting banks, companies and individuals across Eurasia wielded particularly effective tactics and malware, according to new research published by the cybersecurity firm Palo Alto Networks.

  • 0
  • 299

Here's how you prevent the next cyberattack without stifling innovation

A persistent wave of headlines about data breaches and cyberattacks reinforces that cybersecurity remains fundamental to the future of our digital age and preservation of the economic and societal benefits that the internet provides. While new technology innovations continue to bring tremendous benefits to business productivity and our way of life, our increasing digital dependence is also broadening the cyberthreat landscape and creating more risk for enterprises and consumers alike.

  • 0
  • 312
Displaying 1 to 30 of 1537