In The News

  • The Quantified Other: Nest And Fitbit Chase A Lucrative Side Business

    forbes_logo
    Forbes

     

    There are risks for gadget makers who enter the data-broker model. Employers who collect more health data about their staff naturally face a greater risk of being attacked by hackers, or staff who might manipulate the data to lower healthcare costs. Various data breaches at hospitals in 2013 already led to a 15% error rate of medical diagnosis that year, according to Ponemon Institute.

    The onus of security will fall on the enterprise customers says Nir Zuk, CTO of corporate security specialist Palo Alto Networks. “I don’t think security is at the top of the minds of these Internet of Things companies,” he says.

  • Heartbleed's Network Effect

    Network Computing
    Network Computing

    It's been one week since the massive Heartbleed flaw was disclosed publicly and websites began frantically patching, but the potential danger of the bug being used to hack into businesses' internal networks and steal their data could last for years to come.

    "The immediate focus should have been on the perimeter and external websites. But the long-term devastation and real cost is from the internal [network] perspective," says Rob Seger, distinguished engineer at Palo Alto Networks. "Being able to steal all the data carte blanche is, in my opinion, a more lasting and negative" outcome of Heartbleed.

  • Synergy between protection and business

    Decision Report
    Decision Report

    Each day, the cyber attacks defy the Corporate Information Security. The threats are more advanced and aimed to obtain data value, a scenario that put protection strategies in the focus of attention of executives, not only of the CSO, but also from the business. 's view of Danelle Au, Director of Marketing Security Solutions and Palo Alto Networks, the biggest challenge is to support the CSO board to ensure cyber defense strategies.

  • 7 Tips For Dealing With Heartbleed Right Now

    bcw
    Business Computing World

    Last week was a fun week. We’ve not had a significant cyber event like Heartbleed – something that affects just about everybody on the Internet — since the Kaminsky DNS vulnerability of 2008. Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family. While many reports have been very doom and gloom oriented, there are things you can immediately to protect yourself. Here are 7 things I’m doing to protect myself, my business, and my family.

  • Heartbleed bug: Businesses must act now…

    Tech Day IT Brief
    Techday

    To avoid severe impacts on enterprise servers, businesses must take action against the ‘Heartbleed’ bug, which is likely to be the single greatest vulnerability in history, according to Palo Alto Networks.

  • Heartbleed's Intranet & VPN Connection

    dark-reading-logo
    Dark Reading

    "The immediate focus should have been on the perimeter and external websites. But the long-term devastation and real cost is from the internal [network] perspective," says Rob Seger, distinguished engineer at Palo Alto Networks. "Being able to steal all the data carte blanche is, in my opinion, a more lasting and negative" outcome of Heartbleed.

  • Growth of attack code packets also observed in domestic server

    atmarkit
    atmarkit

     Increase of attack packets seeking that there is a possibility that the SSL / TLS implementation of open source to "OpenSSL", would have been to read the data in the memory from the remote "Heartbleed" vulnerability was observed.Measures taken by the vendor is also progressing on the other hand.

  • Palo Alto spends $200 million on Cyvera

    Business cloud
    Business Cloud

    Palo Alto acquisition trail in 2014 has continued after buying Morta Security they have now purchased Cyvera for $200 million. Cyvera bring an endpoint security solution that prevents zero-day attacks, even if the device is not patched against it.

  • Palo Alto Ignite: bringing some discipline to big data protection

    MicroScope
    Microscope

    It’s time for some discipline when it comes to big data protection.

    American retail giant Target used all its incredible guile to analyse big data and deduced all kinds of stuff about the customers. Famously its statisticians worked out how to analyse buying patterns to figure out when customers were pregnant. After which, of course, it bombarded its clients with schmaltzy marketing material.

  • Cyber Security Unplugged

    Print
    Australian Security Magazine

    Designed to fight today’s cyber attacks and defend against the threats of tomorrow, next generation firewalls promise to evolve with the threats while providing users with the functionality they need to get on with their work. But are they all they’re cracked up to be?

  • The new malware and its victims: smartphones

    computer-world-logo
    Computer World

    The number of smartphones in shared through applications is immense information as well as data leakage without the user's knowledge. This is nothing new, everyone has heard of similar issues related to inadvertent disclosure of personal information, caused by adware and malware on various platforms. However, there are certain aspects of the problem that are unique to mobile devices.

  • Safeguarding intellectual property – your crown jewels

    cnme
    CNME

    A recent article in the San Francisco Chronicle caught my eye: Hackers break into networks of 3 big medical device makers.

    The article was related to a breach that took place back in August 2013, and it sheds light on a new target for cybercriminals. What made the news at the time was that thousands of patient records were compromised, but the hackers’ underlying target was potentially the companies’ intellectual property.

  • Espionage carries U.S. consumers to use less internet banking and e-commerce

    tiinside
    TI Inside

    Although the U.S. government has entered into an agreement with the major Internet companies, in late January, allowing the public to disclose more details about court orders received related to espionage , the leaking of classified documents to the press about this practice made by ex-service of the National Security Agency (NSA) Edward Snowden, made ​​to increase the fear of American Internet users use the web, causing damage to the reputation of these companies - and also financial loss.