Date

Displaying 1 - 30 of 1813

In The News

The 25 Most Influential Executives Of 2020

Arora has charted a course of aggressive growth for the world’s largest pure-play cybersecurity vendor with eight acquisitions over his first two years as CEO.

In The News

Palo Alto Networks Digs Into Kubernetes Security Flaw

The Unit 42 research arm of Palo Alto Networks this week issued a security alert that warns a previously disclosed Kubernetes vulnerability may be more severe than initially appreciated.

In The News

The Top 25 Channel Sales Leaders Of 2020

Soderlund has helped Palo Alto Networks push into the systems integrator market, expanding its partnership with NTT Ltd.

In The News

Minorities in cybersecurity face unique and lasting barriers

IT is facing renewed scrutiny into its lack of diversity. Explore the unique barriers minorities in cybersecurity face and why hiring approaches are ill equipped to address them.

In The News

Taking on the perfect storm in cybersecurity

The cybersecurity industry is at a turning point. Traditional security approaches were already struggling to deal with rising cyberattacks, a shift to cloud and explosive growth in Internet of Things (41.6 billion IoT devices by 2025, anyone?).

In The News

BEC Busts Take Down Multimillion-Dollar Operations

The two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.

In The News

Hackers Used Malicious Docker Images to Mine Monero

A recently uncovered cryptomining scheme used malicious Docker images to hide cryptocurrency mining code, according to Palo Alto Networks' Unit 42.

In The News

Docker Hub Distributing Cryptomining Malware?

A pair of cybersecurity reports published this week suggests the level of cryptomining malware lurking in the Docker Hub repository is potentially greater than most IT teams realize.

In The News

Lucifer Malware Aims to Become Broad Platform for Attacks

The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems.

In The News

Untrusted Docker Hub Images Found with Monero Cryptojacking Malware

A security team from Palo Alto Networks’ Unit 42 has unearthed six containers that were housed on Docker Hub that, once instantiated, were activated by unknown parties to mine the Monero cryptocurrency.

In The News

Five Cybersecurity Books That Everyone Should—and Can—Read

You want to learn about cybersecurity, but it seems so complicated. Here are some books we all can understand.

In The News

Palo Alto Networks Rolls ML Into Firewall, Containerizes It

Palo Alto Networks launched what it calls the “world’s first” machine-learning powered next generation firewall, plus a containerized version of the firewall, and a new IoT security service.

In The News

Machine learning in Palo Alto firewalls adds new protection for IoT, containers

With machine learning added to Palo Alto Networks' PAN-OS firewall operating system, the firewalls are better equipped to defend IoT devices and containers, whether on-prem or in the cloud.

In The News

Palo Alto Networks debuts its machine learning-powered next-generation firewall

Network security platform provider Palo Alto Networks Inc. is expanding its product portfolio with the launch of what it says is the world’s first machine learning-powered Next-Generation Firewall.

In The News

Palo Alto Networks Embeds ML Models in Firewalls

Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time.

In The News

5 New Machine Learning Capabilities From Palo Alto Networks

From the industry’s first next-gen firewall for Kubernetes to gaining visibility into never-before-seen IoT devices, here are five new Palo Alto Networks tools that leverage machine learning to keep customers safe.

In The News

The 8 Biggest Google Cloud Security Mistakes To Avoid

From exposing sensitive data in BigQuery tables to overauthorizing access on new projects to leaving virtual machines unguarded, here are some Google Cloud security mishaps that occur too often.

In The News

8 Important Microsoft Azure Security Center Best Practices

From enabling multifactor authentication and extending protection beyond virtual machines to establishing rules around log analysis and remediation, here’s how businesses can get the most out of Azure Security Center.

In The News

10 Tips For Making The Most Of AWS Security Certifications

Here’s a look at what type of industry experience, hands-on practice and vendor-neutral certificates employees should bring to the table to maximize the value of their AWS security certifications.

In The News

This new Trickbot malware update makes it even harder to detect

The notorious information-stealing trojan is one of the most prolific forms of malware out there - and has evolved yet again.

In The News

12 Biggest Cloud Threats And Vulnerabilities In 2020

From misconfigured storage buckets and excess privileges to Infrastructure as Code (IoC) templates and automated attacks, here’s a look at 12 of the biggest cloud threats technical experts are worried about this year.

In The News

How managed threat hunting helps bust malicious insiders

Managed threat hunting services can help take some of the pressure off security operations centres and help ensure potential breaches don’t escalate into something far worse. We explore one such case with a happy ending

In The News

TrickBot Update Makes Malware Harder to Detect: Report

The developers behind TrickBot malware have updated it to run from an infected device's memory to help better avoid detection, according to researchers at Palo Alto Networks' Unit 42.

In The News

U.S. to Accuse China of Trying to Hack Vaccine Data, as Virus Redirects Cyberattacks

Iran and other nations are also looking to steal data and exploit the pandemic with attacks on infrastructure, officials say.

In The News

How moving to the cloud can solve remote access problems

During these unprecedented times, organizations across all sectors are facing the same issue: enabling remote “business as usual” while facing extraordinary challenges of scale and secure connectivity.

In The News

PPE acquisition used as bait in global phishing scheme

Individuals linked to a Nigerian cybercriminal group conducted a broad business email compromise campaign in the first quarter of the year that included healthcare organizations responding to the coronavirus outbreak as targets, according to new research released May 8 from Palo Alto Networks.

In The News

Okta COVID-19 app usage report finds it’s not just collaboration seeing a huge uptick

Okta released a special COVID-19 edition of its app usage report today, and you don’t need a Ph. D. in statistics to guess what they found. Indeed, Zoom surged 110% on the Okta network, leading the way in usage growth just as you would expect, but another whole class of tools besides collaboration also saw huge increases in usage.
Displaying 1 - 30 of 1813