Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off.
Even the Most Advanced Malware Analysis Environment could potentially be Circumvented by a Sufficiently Advanced Attacker. From a technology perspective, it has never been a better time to be in the cyberattack business. Thanks to the common availability of attack tools in the underground marketplace, today’s adversaries don’t require the technical know-how to develop malware.
PAN-OS 8.0 adds over 70 features to the Next-Generation Security Platform, enabling customers to safely embrace the cloud; prevent successful cyberattacks with high performance across network, endpoint and cloud environments.
As high-profile data breaches continue to make news headlines, expectations concerning the security of data continue to rise. Given the trend surrounding new privacy- and cybersecurity-related laws around the world that mandate personal data breach and security incident notification – including the European Union’s General Data Protection Regulation and Network and Information Security Directive, respectively – it’s now critical for organizations, particularly those with global operations, to maintain a level of compliance that combines productivity and data security.
The Cyber Threat Alliance (CTA) consortium founded by security vendors Fortinet, Intel Security, Palo Alto Networks, and Symantec, today announced that it is now officially a nonprofit trade association and that Michael Daniel, the former cybersecurity coordinator and special assistant to President Barack Obama, will serve as the CTA's first president.
Palo Alto identifies five areas of innovation within a wide-ranging series of announcements, although the most exciting appear to be around the expansion of threat protection capabilities, including credential theft protection.
Alguns grandes atores dos mercados de Segurança e Internet de Coisas, incluindo a IBM, a Symantec, a Nokia e a At&T estão unindo forças para resolver problemas que tornam a IoT vulnerável em muitas áreas.
A new group consisting of AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic have formed the IoT Cybersecurity Alliance with the aim of developing best practices to battle IoT security threats that have accelerated in the past year.
A new IoT Cybersecurity Alliance formed by AT&T, IBM, Palo Alto Networks, Symantec, and Trustonic promises to help solve one of the most critical elements of the Internet of Things (IoT) — security. The group says its goal is to work on IoT security standards as well as raise awareness about the topic.
The IoT Cybersecurity Alliance, formed Wednesday, also includes IBM, Symantec, Palo Alto Networks, and mobile security company Trustonic. The group said it won’t set standards but will conduct research, educate consumers and businesses, and influence standards and policies.
A group of businesses from across the IoT value chain have formed the IoT Cybersecurity Alliance, aiming to use their combined expertise to allay business concerns about the Internet of Things and solve its security challenges.
Security vendor Palo Alto Networks today announced version 8.0 of its PAN-OS operating system, which includes more than 70 new features touching areas such as threat prevention, credential theft prevention, cloud security, and management. This is the largest announcement Palo Alto has ever put out, says Frank Mong, SVP of product, industry and solutions.
Palo Alto Networks on Tuesday announced the launch of PAN-OS 8.0, which brings major improvements to the company’s Next-Generation Security Platform, and several new hardware and virtual firewall appliances.
Palo Alto Networks is aiming to thwart credential theft with the launch of its next-generation security platform.
The move, which comes amid a barrage of product announcements from the security vendor, is notable because it's looking to prevent the intrusions that typically give cyberattackers the keys to the enterprise network.
Palo Alto Networks has announced updates to its next-generation security platform that it says represents its biggest product and feature release ever. The updates to the Pan-OS 8.0 platform include over 70 features around cloud and SaaS, threat prevention, credential theft prevention and new hardware and virtual firewalls.
Palo Alto Networks is making major updates to its PAN-OS, the company announced Tuesday, adding new features across its entire technology platform. The new PAN-OS 8.0 launch adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention and new hardware. All in all, Palo Alto Networks added more than 70 new features across those platform categories with the operating system update.
A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no instance that you get from your team.
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place. First, I’d like to address the idea that threat intelligence is a cost center (albeit one vital to protecting the organization’s reputation and viability) rather than an investment that could lead to a competitive advantage and improved bottom line.
De acordo com Daniel Bortolazo, systems engineer manager da Palo Alto Networks no Brasil, investimentos devem incluir visibilidade e controle completos no nível de aplicação e prevenção de ameaças conhecidas e desconhecidas, com o olhar voltado à automação
The pseudo-Darkleech campaign, one of the long-standing prominent distributers of ransomware, is expected to remain strong in 2017, after going through a series of important changes last year, Palo Alto Networks researchers warn.
Pamela Warren, director of government and industry solutions, discusses why agencies need to be more efficient about cybersecurity, because every lost minute can make the difference between a successful attack and an unsuccessful one.
Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate its value; especially as conversations around sharing intelligence between the public and private sectors continues.
Over the past year, healthcare organizations of all sizes have been impacted by cyberattacks. Most of them involve malware of one sort or another. As a former security operations lead at a hospital network in the San Francisco Bay Area, I learned what my research at Palo Alto Networks has confirmed: By far, the most common way for malware to make its way into Healthcare networks is by spoofed emails.
A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no i2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.
2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.
Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealersChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.
The downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems.
Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealerWhat Lies Ahead for Cybersecurity in 2017?sChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.