Devops is perhaps the most important innovation in the IT and security sectors since the invention of the personal computer. The philosophy is so foreign though, compared to what IT and security staffs have traditionally done, that many do not understand the implications. It is tough for them, and their management chains, to fully wrap their heads around the potential impact to their organizations in the future.
As the new year draws near, healthcare organizations are thinking about where to focus their resources. Matt Mellen, security architect and healthcare solution lead at Palo Alto Networks, predicts that, in 2018, machine learning capabilities will not only enhance a healthcare organization's cybersecurity program, but improve patient outcomes as well
In October 2016, as a botnet strung together by the Mirai malware launched the biggest distributed denial-of-service attack in history, I was, appropriately enough, giving a talk on Internet of Things (IoT) security and privacy at the Grace Hopper Conference.
The dynamic and automated nature of the cloud brings many benefits to businesses, from easy setup and delivery of services to predictable maintenance costs. With users accessing data and collaborating from anywhere, whether they are in branch offices or working remotely, cloud-based services and applications have completely transformed how business is done.
Palo Alto Networks Canadian country manager Rob Lunney emphasizes that both the opportunities and dangers of the cloud for the channel are greater than ever, and partners need to be proactive in adjusting their business models to the future.
Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.
Cloud is transforming many industries, and the automotive industry is no exception. Dharminder Debisarun, product marketing manager, Cloud Security lead, EMEA at Palo Alto Networks talks about why cloud security adoption will disrupt the automotive industry in 2018.
The security company Palo Alto Networks announced on Thursday (7) an alert about a coup that circulates in Brazil using fake tickets. In a criminal campaign monitored by the company, more than 260,000 emails have been sent since June 2017. Whoever falls in the coup and tries to open the tickets ends up having the computer infected with a digital plague that steals information, including passwords.
Unit 42, the Palo Alto Networks research unit, has identified a malspam (malicious spam) campaign specially developed to affect Brazilian victims. Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames.
Recent updates as part of Palo Alto Networks' PAN-OS 8.0 adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention, and integrations with complementary vendors.
Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames; called "Boleto Mestre", about 261,098 e-mails have already been distributed since June
Army veteran and cyber security expert Rick Howard talks to the FT's Hannah Kuchler about the current state of cyber security, what we have learned from recent large-scale attacks known as WannaCry and NotPetya and what companies can do to try to guard against the next attack.
An enterprise's board of directors is there to steer the business. However, in some cases, it is wearing a security blindfold and the vehicle they are steering is drifting off the road.
A series of training sessions with Palo Alto Networks Inc. now shows that the classic strengths of the board can actually be weaknesses when it comes to shoring up the company, according to some of the output captured from those sessions and shared with Security Now.
The Palo Alto Networks NextWave Channel Partner Program is designed to help partners with technical differentiation and specializations, gain access to more profitable opportunities, simplify the way we interact with and support partners and to help them build sustainable, breach prevention-focused security practices.
The proliferation of internet of things devices tied into critical industries such as transportation and healthcare is changing the perspective on what constitutes critical infrastructure, according to government and industry experts who spoke at the 2017 CyberCon.
“The attack surface is going to expand greatly,” said Ret. Maj. Gen John Davis, vice president and federal chief security officer at Palo Alto Networks.
We have been hearing a lot of buzz about artificial intelligence (AI) for years, but more recently, the discussion within the cybersecurity industry has centered around machine learning (ML), an approach to AI that focuses on using algorithms to sift through data, learn from it and inform action based on the analytics, such as automatically preventing an unknown threat.
At least two cybersecurity firms have noticed that the notorious Lazarus threat group, which many experts have linked to North Korea, has been using a new piece of Android malware to target smartphone users in South Korea.
Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week.
Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date
You don't have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021.
Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now president of Girl Scouts of the United States of America, has partnered with Palo Alto Networks on a stroke of genius: training young girls on cybersecurity.
Veteran job seekers are more likely than non-veterans to be underemployed, despite the fact that the majority of employers report that veterans perform "better than" or "much better than" non-veterans, according to a survey released this week by ZipRecruiter and the Call of Duty Endowment. Meanwhile, there's a severe shortage of skilled U.S. workers needed for open technology jobs, particularly in the cybersecurity field.
Most people are aware of the potential threats looming online but a new trend called cryptojacking can steal a user’s computing power and use it to mine profitable cryptocurrencies for attackers. Unlike other attacks like adware that bombards a user with advertisements that can redirect them to spam-filled websites or malware that requires the user to download and install a piece of software, cryptojacking is relatively unintrusive and generally less harmful than other attacks—though that doesn’t make the intentions less malicious.
Increasingly, companies are connecting thousands of devices to the internet. From smart TVs to conference rooms to thermostats. Most of these devices have been built specifically to perform a single function, regardless of the safety factor. While this flow of technology is critical to the evolution of our digital age, it also presents a new layer of risk to organizations.
Board members pose a unique risk for business, but proper planning helps.
Within any organization, certain employees have access to information that could tip the scales of risk for the business. If a cybercriminal were to gain access to a company's most sensitive information through stealing credentials from one of these employees, the business could face serious financial and reputational repercussions.
When it comes to the public cloud, Palo Alto Networks said it is doubling down with partners.
The Santa Clara, Calif.-based security vendor has launched the pilot for a new Public Cloud Specialization, as part of its NextWave Partner Program.
Cybersecurity Awareness Month is, once again, upon us. At its core is an issue that can have a massive impact on organizations in every industry, public and private, large and small: successful cyberattacks and how to prevent them from happening in the first place.
In a digital threat landscape where businesses are constantly playing catch-up with new attack vectors and vulnerabilities, the best defense they have is the same thing that makes them such an appealing target for hackers: a mountain of data.
The booming price of Bitcoin and other crypto-coins has kicked off a gold rush among malicious hackers keen to cash in, warn security firms. Many sites are now harbouring code that secretly uses a visitors' computer to mine the valuable e-cash coins. Palo Alto Networks said it had found Coin-Hive on almost 150 separate domains. The most popular locations for the code were porn, video and file-sharing sites.