Displaying 1 to 30 of 166

On cybersecurity and IT teams of the future, we'll all be SREs

Devops is perhaps the most important innovation in the IT and security sectors since the invention of the personal computer. The philosophy is so foreign though, compared to what IT and security staffs have traditionally done, that many do not understand the implications. It is tough for them, and their management chains, to fully wrap their heads around the potential impact to their organizations in the future.
  • 0
  • 1375

Machine learning capabilities aid healthcare cybersecurity

As the new year draws near, healthcare organizations are thinking about where to focus their resources. Matt Mellen, security architect and healthcare solution lead at Palo Alto Networks, predicts that, in 2018, machine learning capabilities will not only enhance a healthcare organization's cybersecurity program, but improve patient outcomes as well
  • 0
  • 1866

The Internet of (Secure) Things Checklist

In October 2016, as a botnet strung together by the Mirai malware launched the biggest distributed denial-of-service attack in history, I was, appropriately enough, giving a talk on Internet of Things (IoT) security and privacy at the Grace Hopper Conference.
  • 0
  • 1391

Why You Should Question These Most Common Cloud Assumptions

The dynamic and automated nature of the cloud brings many benefits to businesses, from easy setup and delivery of services to predictable maintenance costs. With users accessing data and collaborating from anywhere, whether they are in branch offices or working remotely, cloud-based services and applications have completely transformed how business is done.
  • 0
  • 1359

Channel needs to make its decisions on cloud in 2018: Palo Alto Networks

Palo Alto Networks Canadian country manager Rob Lunney emphasizes that both the opportunities and dangers of the cloud for the channel are greater than ever, and partners need to be proactive in adjusting their business models to the future.
  • 0
  • 1314

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.
  • 5
  • 28845

VMblog's Expert Interviews: Palo Alto Networks Shares Why the Automotive Industry will Invest in Secure Cloud Environments in 2018

Cloud is transforming many industries, and the automotive industry is no exception. Dharminder Debisarun, product marketing manager, Cloud Security lead, EMEA at Palo Alto Networks talks about why cloud security adoption will disrupt the automotive industry in 2018.
  • 1
  • 1324

The CyberWire Daily Podcast for 12.12.17

Rick Howard from Palo Alto Networks discusses DevOps vs. site reliability engineers.
  • 0
  • 1301

False tickets serve as bait to contaminate PCs with viruses

The security company Palo Alto Networks announced on Thursday (7) an alert about a coup that circulates in Brazil using fake tickets. In a criminal campaign monitored by the company, more than 260,000 emails have been sent since June 2017. Whoever falls in the coup and tries to open the tickets ends up having the computer infected with a digital plague that steals information, including passwords.
  • 0
  • 1330

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Unit 42, the Palo Alto Networks research unit, has identified a malspam (malicious spam) campaign specially developed to affect Brazilian victims. Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames.
  • 0
  • 1368

CRN's 2017 Products Of The Year

Recent updates as part of Palo Alto Networks' PAN-OS 8.0 adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention, and integrations with complementary vendors.
  • 0
  • 1330

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames; called "Boleto Mestre", about 261,098 e-mails have already been distributed since June
  • 0
  • 1256

Guarding against the next cyber attack

Army veteran and cyber security expert Rick Howard talks to the FT's Hannah Kuchler about the current state of cyber security, what we have learned from recent large-scale attacks known as WannaCry and NotPetya and what companies can do to try to guard against the next attack. 
  • 0
  • 1335

The Security Risk Lurking in the Board of Directors

An enterprise's board of directors is there to steer the business. However, in some cases, it is wearing a security blindfold and the vehicle they are steering is drifting off the road. A series of training sessions with Palo Alto Networks Inc. now shows that the classic strengths of the board can actually be weaknesses when it comes to shoring up the company, according to some of the output captured from those sessions and shared with Security Now.
  • 0
  • 1318

Vendor Q&A Series: Karl Soderlund, Palo Alto Networks

The Palo Alto Networks NextWave Channel Partner Program is designed to help partners with technical differentiation and specializations, gain access to more profitable opportunities, simplify the way we interact with and support partners and to help them build sustainable, breach prevention-focused security practices.
  • 0
  • 1349

IoT is changing the meaning of ‘critical infrastructure’

The proliferation of internet of things devices tied into critical industries such as transportation and healthcare is changing the perspective on what constitutes critical infrastructure, according to government and industry experts who spoke at the 2017 CyberCon. “The attack surface is going to expand greatly,” said Ret. Maj. Gen John Davis, vice president and federal chief security officer at Palo Alto Networks.
  • 0
  • 1351

Top cybersecurity CEO touts benefits of 'a return to normalcy' in the Federal Government

Jim Cramer logged in with Palo Alto Networks Chairman and CEO Mark McLaughlin to hear about the latest in cybersecurity.
  • 1
  • 1373

Three Things to Consider Before Incorporating Machine Learning into Your Security Efforts

We have been hearing a lot of buzz about artificial intelligence (AI) for years, but more recently, the discussion within the cybersecurity industry has centered around machine learning (ML), an approach to AI that focuses on using algorithms to sift through data, learn from it and inform action based on the analytics, such as automatically preventing an unknown threat.
  • 0
  • 1419

North Korean Hackers Target Android Users in South

At least two cybersecurity firms have noticed that the notorious Lazarus threat group, which many experts have linked to North Korea, has been using a new piece of Android malware to target smartphone users in South Korea.
  • 0
  • 1446

Middle East 'MuddyWater' Attacks Difficult to Clear Up

Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week. Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date
  • 0
  • 1375

The CyberWire Daily Podcast 11.13.17

Rick Howard from Palo Alto Networks discusses network defender best practices including Vendor in Depth and Best of Breed.
  • 0
  • 1355

A rocket scientist hacks the cybersecurity labor crisis

You don't have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021. Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now president of Girl Scouts of the United States of America, has partnered with Palo Alto Networks on a stroke of genius: training young girls on cybersecurity.
  • 0
  • 1317

How tech firms are trying to recruit veterans for cybersecurity jobs

Veteran job seekers are more likely than non-veterans to be underemployed, despite the fact that the majority of employers report that veterans perform "better than" or "much better than" non-veterans, according to a survey released this week by ZipRecruiter and the Call of Duty Endowment. Meanwhile, there's a severe shortage of skilled U.S. workers needed for open technology jobs, particularly in the cybersecurity field.
  • 0
  • 1339

What Is Cryptojacking? Trend Continues To Grow

Most people are aware of the potential threats looming online but a new trend called cryptojacking can steal a user’s computing power and use it to mine profitable cryptocurrencies for attackers. Unlike other attacks like adware that bombards a user with advertisements that can redirect them to spam-filled websites or malware that requires the user to download and install a piece of software, cryptojacking is relatively unintrusive and generally less harmful than other attacks—though that doesn’t make the intentions less malicious.
  • 0
  • 1464

Preventing Credential Theft: A Security Checklist for Boards

Board members pose a unique risk for business, but proper planning helps. Within any organization, certain employees have access to information that could tip the scales of risk for the business. If a cybercriminal were to gain access to a company's most sensitive information through stealing credentials from one of these employees, the business could face serious financial and reputational repercussions.
  • 0
  • 1519

Consistency is Key for IoT Security

Increasingly, companies are connecting thousands of devices to the internet. From smart TVs to conference rooms to thermostats. Most of these devices have been built specifically to perform a single function, regardless of the safety factor. While this flow of technology is critical to the evolution of our digital age, it also presents a new layer of risk to organizations.
  • 0
  • 1365

CRN Exclusive: Palo Alto Networks Expands NextWave Partner Program With New Public Cloud Specialization

When it comes to the public cloud, Palo Alto Networks said it is doubling down with partners. The Santa Clara, Calif.-based security vendor has launched the pilot for a new Public Cloud Specialization, as part of its NextWave Partner Program.
  • 0
  • 1413

How Businesses Are Applying AI to Cybersecurity

In a digital threat landscape where businesses are constantly playing catch-up with new attack vectors and vulnerabilities, the best defense they have is the same thing that makes them such an appealing target for hackers: a mountain of data.
  • 0
  • 1430

The Ten Cybersecurity Commandments

Cybersecurity Awareness Month is, once again, upon us. At its core is an issue that can have a massive impact on organizations in every industry, public and private, large and small: successful cyberattacks and how to prevent them from happening in the first place.
  • 0
  • 1393

Bitcoin boom prompts growth of coin-mining malware

The booming price of Bitcoin and other crypto-coins has kicked off a gold rush among malicious hackers keen to cash in, warn security firms. Many sites are now harbouring code that secretly uses a visitors' computer to mine the valuable e-cash coins. Palo Alto Networks said it had found Coin-Hive on almost 150 separate domains. The most popular locations for the code were porn, video and file-sharing sites.
  • 0
  • 1477
Displaying 1 to 30 of 166