Date

By Year

By Type

  • In The News (1226)

By Topic

  • Cybersecurity (161)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1226)

By Language

Displaying 1 to 30 of 1552

Hiring Cloud Talent Will Improve Cybersecurity

The use of advanced cloud technologies will require a security strategy that matches the requirements of cloud products and services themselves.

  • 1
  • 386

Detecting and Stopping the Stealthiest Threats With Behavioral Analytics

When attackers gain a foothold in the network, they use their privileges to explore their surroundings, expand their realm of control and achieve their ultimate objective: stealing, modifying or destroying sensitive data. Blending in with legitimate users, they can infiltrate organizations and dwell inside networks for months or even years without being detected.

  • 0
  • 34

Palo Alto Networks launches new cloud-based user behaviour analytics application

The Calif.-based security firm has released Magnifier, a cloud-based behavioral analytics application that allows organizations to rapidly identify and prevent threats on their network.

  • 0
  • 40

Up to 30M Systems Impacted by Unauthorized Monero Mining Campaign

Palo Alto Networks is warning of a new cryptocurrency mining attack that is using URL shorteners as a way to infect victims' systems.

  • 0
  • 30

Malware Epidemic: Monero Mining Campaigns Are Becoming a Real Problem

Malware that secretly mines Monero is becoming a real problem in the real world, with the number of different incidents growing with each week. For example, only this past week, three new attacks came to light.

  • 0
  • 35

15 Million People Worldwide Affected by a Single Monero Mining Operation

A single Monero cryptocurrency mining operation has used malware delivery techniques to affect at least 15 million people worldwide.

  • 0
  • 36

Millions of PCs Targeted by Cryptocurrency-Mining Malware

Malware is increasingly developing an appetite for cryptocurrency mining. One newly discovered strain has tried to infect millions of Windows machines, all in an effort to siphon their computing power and possibly sell it for mining purposes.

  • 0
  • 30

Palo Alto Networks Finds Attackers Who Dwell in Networks

Palo Alto Networks released a cloud-based behavioral analytics application as part of its security platform. The new application, named Magnifier, analyzes data sent from next-generation firewalls to Palo Alto Networks Logging Service and uses this data to profile the behavior of users and devices. Magnifier is expected to be generally available in February.

  • 0
  • 36

Millions of PCs Targeted by Cryptocurrency-Mining Malware

Malware is increasingly developing an appetite for cryptocurrency mining. One newly discovered strain has tried to infect millions of Windows machines, all in an effort to siphon their computing power and possibly sell it for mining purposes.

  • 0
  • 34

Machine learning capabilities aid healthcare cybersecurity

As the new year draws near, healthcare organizations are thinking about where to focus their resources. Matt Mellen, security architect and healthcare solution lead at Palo Alto Networks, predicts that, in 2018, machine learning capabilities will not only enhance a healthcare organization's cybersecurity program, but improve patient outcomes as well

  • 0
  • 243

The Internet of (Secure) Things Checklist

In October 2016, as a botnet strung together by the Mirai malware launched the biggest distributed denial-of-service attack in history, I was, appropriately enough, giving a talk on Internet of Things (IoT) security and privacy at the Grace Hopper Conference.

  • 0
  • 188

On cybersecurity and IT teams of the future, we'll all be SREs

Devops is perhaps the most important innovation in the IT and security sectors since the invention of the personal computer. The philosophy is so foreign though, compared to what IT and security staffs have traditionally done, that many do not understand the implications. It is tough for them, and their management chains, to fully wrap their heads around the potential impact to their organizations in the future.

  • 0
  • 201

Why You Should Question These Most Common Cloud Assumptions

The dynamic and automated nature of the cloud brings many benefits to businesses, from easy setup and delivery of services to predictable maintenance costs. With users accessing data and collaborating from anywhere, whether they are in branch offices or working remotely, cloud-based services and applications have completely transformed how business is done.

  • 0
  • 149

Channel needs to make its decisions on cloud in 2018: Palo Alto Networks

Palo Alto Networks Canadian country manager Rob Lunney emphasizes that both the opportunities and dangers of the cloud for the channel are greater than ever, and partners need to be proactive in adjusting their business models to the future.

  • 0
  • 143

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.

  • 2
  • 25546

VMblog's Expert Interviews: Palo Alto Networks Shares Why the Automotive Industry will Invest in Secure Cloud Environments in 2018

Cloud is transforming many industries, and the automotive industry is no exception. Dharminder Debisarun, product marketing manager, Cloud Security lead, EMEA at Palo Alto Networks talks about why cloud security adoption will disrupt the automotive industry in 2018.

  • 1
  • 242

The CyberWire Daily Podcast for 12.12.17

Rick Howard from Palo Alto Networks discusses DevOps vs. site reliability engineers.

  • 0
  • 251

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames; called "Boleto Mestre", about 261,098 e-mails have already been distributed since June

  • 0
  • 231

False tickets serve as bait to contaminate PCs with viruses

The security company Palo Alto Networks announced on Thursday (7) an alert about a coup that circulates in Brazil using fake tickets. In a criminal campaign monitored by the company, more than 260,000 emails have been sent since June 2017. Whoever falls in the coup and tries to open the tickets ends up having the computer infected with a digital plague that steals information, including passwords.

  • 0
  • 251

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Unit 42, the Palo Alto Networks research unit, has identified a malspam (malicious spam) campaign specially developed to affect Brazilian victims. Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames.

  • 0
  • 242

CRN's 2017 Products Of The Year

Recent updates as part of Palo Alto Networks' PAN-OS 8.0 adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention, and integrations with complementary vendors.

  • 0
  • 270

Guarding against the next cyber attack

Army veteran and cyber security expert Rick Howard talks to the FT's Hannah Kuchler about the current state of cyber security, what we have learned from recent large-scale attacks known as WannaCry and NotPetya and what companies can do to try to guard against the next attack. 

  • 0
  • 249

The Security Risk Lurking in the Board of Directors

An enterprise's board of directors is there to steer the business. However, in some cases, it is wearing a security blindfold and the vehicle they are steering is drifting off the road. A series of training sessions with Palo Alto Networks Inc. now shows that the classic strengths of the board can actually be weaknesses when it comes to shoring up the company, according to some of the output captured from those sessions and shared with Security Now.

  • 0
  • 247

Vendor Q&A Series: Karl Soderlund, Palo Alto Networks

The Palo Alto Networks NextWave Channel Partner Program is designed to help partners with technical differentiation and specializations, gain access to more profitable opportunities, simplify the way we interact with and support partners and to help them build sustainable, breach prevention-focused security practices.

  • 0
  • 236

IoT is changing the meaning of ‘critical infrastructure’

The proliferation of internet of things devices tied into critical industries such as transportation and healthcare is changing the perspective on what constitutes critical infrastructure, according to government and industry experts who spoke at the 2017 CyberCon. “The attack surface is going to expand greatly,” said Ret. Maj. Gen John Davis, vice president and federal chief security officer at Palo Alto Networks.

  • 0
  • 305

Top cybersecurity CEO touts benefits of 'a return to normalcy' in the Federal Government

Jim Cramer logged in with Palo Alto Networks Chairman and CEO Mark McLaughlin to hear about the latest in cybersecurity.

  • 1
  • 322

Three Things to Consider Before Incorporating Machine Learning into Your Security Efforts

We have been hearing a lot of buzz about artificial intelligence (AI) for years, but more recently, the discussion within the cybersecurity industry has centered around machine learning (ML), an approach to AI that focuses on using algorithms to sift through data, learn from it and inform action based on the analytics, such as automatically preventing an unknown threat.

  • 0
  • 331

North Korean Hackers Target Android Users in South

At least two cybersecurity firms have noticed that the notorious Lazarus threat group, which many experts have linked to North Korea, has been using a new piece of Android malware to target smartphone users in South Korea.

  • 0
  • 382

Middle East 'MuddyWater' Attacks Difficult to Clear Up

Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week. Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date

  • 0
  • 382
Displaying 1 to 30 of 1552