Date

By Year

By Type

  • In The News (1271)

By Topic

  • Cybersecurity (161)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1226)

By Language

Displaying 31 to 60 of 1597

Palo Alto Networks CEO: Consolidation thwarts innovation

Palo Alto Networks CEO: Consolidation thwarts innovation
  • 0
  • 256

5 Ways to Get Ready for Public Cloud Deployment

For many organizations, the public cloud has become the sole route to market for new product introductions. This cloud infrastructure is owned and managed by a third party, freeing up the organization from the maintenance and cost that comes with a private cloud setup. With that, speed and scale are the main reasons why developers are moving to the public cloud, and now is the best time for security teams to tighten their partnerships with product development and IT teams.
  • 0
  • 798

Palo Alto Networks brings cloud management option, new UI to Traps endpoint protection

Traps has also been better integrated with the Palo Alto Networks Application Framework, something that is likely to please channel partners. So will the increased channel enablement around this Traps release.
  • 0
  • 707

The CyberWire Daily Podcast

In today's podcast, we hear that AMD continues its investigation of the backdoors and other vulnerabilities CTS Labs publicly disclosed. That disclosure remains controversial. BlackTDS offers malware distribution as-a-service on the black market.
  • 0
  • 874

Having a boardroom conversation about cybersecurity and material risk

I know a lot of persuasive folks in the cybersecurity community who can easily conjure up a dozen different cyberattack scenarios detailed enough to scare the socks off any board member. Many of us have been hearing about these hypothetical disasters for a decade or longer.
  • 0
  • 957

ComboJack malware steals digital payments, cryptocurrency, by modifying info saved to clipboards

Researchers have discovered a new malware that steals cryptocurrency and other electronic funds by surreptitiously modifying wallet or payment information whenever victims copy it to their devices' clipboards.
  • 0
  • 986

International Women's Day: Girls Scouts of the USA readying cybersecurity badge

International Women's Day is a great time to bring up the fact that the young members of the Girl Scouts of the USA will soon be able to do their part to help buttress the number of women in cybersecurity by working toward earning badges in that exact skill.
  • 0
  • 641

ComboJack Malware Steals Multiple Virtual Currencies

A newly discovered piece of malware is capable of stealing a variety of crypto-coins from its victims by replacing legitimate wallet addresses with that of the attacker. Dubbed ComboJack, the malware performs its nefarious activity by monitoring the user clipboard and replacing targeted addresses there. This is the same technique that was recently observed being used by the Evrial Trojan and the CryptoShuffler malware, but the new threat targets multiple virtual currencies.
  • 0
  • 973

Girl Scouts fight cybercrime with new cybersecurity badge

If you think being a Girl Scout is all camping, crafting, and cooking, think again. For the first time, millions of Girl Scouts nationwide are taking on hacking and cybercrime as they work towards earning newly introduced cybersecurity badges.
  • 0
  • 921

ComboJack Trojan Replaces Cryptocurrency Addresses Copied to Windows Clipboard

Security researchers have discovered a new malware strain that is capable of detecting when users copy a cryptocurrency address to the Windows clipboard. The malware works by replacing this address with one owned by its author.
  • 0
  • 887

Palo Alto Networks introduces new hardware, firewall

California-based security company Palo Alto Networks rolled out updates to one of its operating systems and launched a new firewall for industrial settings.
  • 0
  • 469

Palo Alto Networks Releases New Rugged Firewall

Palo Alto Networks on Tuesday announced that it has updated its PAN-OS operating system and released a new next-generation firewall designed for use in industrial and other harsh environments.
  • 0
  • 696

The CyberWire Daily Podcast

In today's podcast we hear that SWIFT fraud has hit an Indian lender. North Korean hacking continues, even during the DPRK's Winter Olympics charm offensive.
  • 0
  • 801

Palo Alto Networks extends security to the big 3 public cloud

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.
  • 0
  • 694

How do you measure cybersecurity risk?

Rick Howard talks about using tools to reduce the manual response aspect of reacting to a cybersecurity event. He details his definition of terms like extensibility and flexibility when it comes to managing federal resources. During the interview, he talks about concepts like the cyber kill chain, doxing, and threat intelligence sharing.
  • 0
  • 671

Hiring Cloud Talent Will Improve Cybersecurity

The use of advanced cloud technologies will require a security strategy that matches the requirements of cloud products and services themselves.
  • 1
  • 1111

Palo Alto Networks makes Magnifier behavioral analytics app first in new Application Framework

The technology which comes from last year’s LightCyber acquisition, has now been integrated into Palo Alto Networks’ new cloud platform.
  • 0
  • 418

Detecting and Stopping the Stealthiest Threats With Behavioral Analytics

When attackers gain a foothold in the network, they use their privileges to explore their surroundings, expand their realm of control and achieve their ultimate objective: stealing, modifying or destroying sensitive data. Blending in with legitimate users, they can infiltrate organizations and dwell inside networks for months or even years without being detected.
  • 0
  • 704

Palo Alto Networks launches new cloud-based user behaviour analytics application

The Calif.-based security firm has released Magnifier, a cloud-based behavioral analytics application that allows organizations to rapidly identify and prevent threats on their network.
  • 0
  • 730

Up to 30M Systems Impacted by Unauthorized Monero Mining Campaign

Palo Alto Networks is warning of a new cryptocurrency mining attack that is using URL shorteners as a way to infect victims' systems.
  • 0
  • 698

Palo Alto Networks Finds Attackers Who Dwell in Networks

Palo Alto Networks released a cloud-based behavioral analytics application as part of its security platform. The new application, named Magnifier, analyzes data sent from next-generation firewalls to Palo Alto Networks Logging Service and uses this data to profile the behavior of users and devices. Magnifier is expected to be generally available in February.
  • 0
  • 702

Malware Epidemic: Monero Mining Campaigns Are Becoming a Real Problem

Malware that secretly mines Monero is becoming a real problem in the real world, with the number of different incidents growing with each week. For example, only this past week, three new attacks came to light.
  • 0
  • 702

15 Million People Worldwide Affected by a Single Monero Mining Operation

A single Monero cryptocurrency mining operation has used malware delivery techniques to affect at least 15 million people worldwide.
  • 0
  • 791

Millions of PCs Targeted by Cryptocurrency-Mining Malware

Malware is increasingly developing an appetite for cryptocurrency mining. One newly discovered strain has tried to infect millions of Windows machines, all in an effort to siphon their computing power and possibly sell it for mining purposes.
  • 0
  • 695

On cybersecurity and IT teams of the future, we'll all be SREs

Devops is perhaps the most important innovation in the IT and security sectors since the invention of the personal computer. The philosophy is so foreign though, compared to what IT and security staffs have traditionally done, that many do not understand the implications. It is tough for them, and their management chains, to fully wrap their heads around the potential impact to their organizations in the future.
  • 0
  • 989

Machine learning capabilities aid healthcare cybersecurity

As the new year draws near, healthcare organizations are thinking about where to focus their resources. Matt Mellen, security architect and healthcare solution lead at Palo Alto Networks, predicts that, in 2018, machine learning capabilities will not only enhance a healthcare organization's cybersecurity program, but improve patient outcomes as well
  • 0
  • 1412

The Internet of (Secure) Things Checklist

In October 2016, as a botnet strung together by the Mirai malware launched the biggest distributed denial-of-service attack in history, I was, appropriately enough, giving a talk on Internet of Things (IoT) security and privacy at the Grace Hopper Conference.
  • 0
  • 928

Why You Should Question These Most Common Cloud Assumptions

The dynamic and automated nature of the cloud brings many benefits to businesses, from easy setup and delivery of services to predictable maintenance costs. With users accessing data and collaborating from anywhere, whether they are in branch offices or working remotely, cloud-based services and applications have completely transformed how business is done.
  • 0
  • 919

Channel needs to make its decisions on cloud in 2018: Palo Alto Networks

Palo Alto Networks Canadian country manager Rob Lunney emphasizes that both the opportunities and dangers of the cloud for the channel are greater than ever, and partners need to be proactive in adjusting their business models to the future.
  • 0
  • 902
Displaying 31 to 60 of 1597