Date

By Year

By Type

  • In The News (1288)

By Topic

  • Cybersecurity (39)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1338)

By Language

Displaying 31 to 60 of 1533

Palo Alto Networks aims to thwart credential theft

Palo Alto Networks is aiming to thwart credential theft with the launch of its next-generation security platform. The move, which comes amid a barrage of product announcements from the security vendor, is notable because it's looking to prevent the intrusions that typically give cyberattackers the keys to the enterprise network.

  • 0
  • 302

Palo Alto Networks Unveils Big Product Updates, New Firewalls

Palo Alto Networks on Tuesday announced the launch of PAN-OS 8.0, which brings major improvements to the company’s Next-Generation Security Platform, and several new hardware and virtual firewall appliances.

  • 0
  • 279

Palo Alto Networks Rolls Out Major PAN-OS 8.0 Update, New Hardware And Virtual Appliances

Palo Alto Networks is making major updates to its PAN-OS, the company announced Tuesday, adding new features across its entire technology platform. The new PAN-OS 8.0 launch adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention and new hardware. All in all, Palo Alto Networks added more than 70 new features across those platform categories with the operating system update.

  • 0
  • 309

Palo Alto Networks security platform gets major makeover

Palo Alto Networks has announced updates to its next-generation security platform that it says represents its biggest product and feature release ever. The updates to the Pan-OS 8.0 platform include over 70 features around cloud and SaaS, threat prevention, credential theft prevention and new hardware and virtual firewalls.

  • 0
  • 311

Lack of Metrics is a Problem for Modern CISOs

A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no instance that you get from your team.

  • 0
  • 386

Finding the ROI in Threat Intelligence

Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place. First, I’d like to address the idea that threat intelligence is a cost center (albeit one vital to protecting the organization’s reputation and viability) rather than an investment that could lead to a competitive advantage and improved bottom line.

  • 1
  • 407

What's Next About Cloud Security?

De acordo com Daniel Bortolazo, systems engineer manager da Palo Alto Networks no Brasil, investimentos devem incluir visibilidade e controle completos no nível de aplicação e prevenção de ameaças conhecidas e desconhecidas, com o olhar voltado à automação

  • 0
  • 373

Pseudo-Darkleech Remains Prominent Distributer of Ransomware

The pseudo-Darkleech campaign, one of the long-standing prominent distributers of ransomware, is expected to remain strong in 2017, after going through a series of important changes last year, Palo Alto Networks researchers warn.

  • 0
  • 583

How Automation Can Help Agencies Thwart Today’s Cyber Adversaries

Pamela Warren, director of government and industry solutions, discusses why agencies need to be more efficient about cybersecurity, because every lost minute can make the difference between a successful attack and an unsuccessful one.

  • 0
  • 330

Cybersecurity in 2017: Automation, Adversaries and Orchestration

Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate its value; especially as conversations around sharing intelligence between the public and private sectors continues.

  • 0
  • 600

Spotting a Spoofed Email in Healthcare

Over the past year, healthcare organizations of all sizes have been impacted by cyberattacks. Most of them involve malware of one sort or another. As a former security operations lead at a hospital network in the San Francisco Bay Area, I learned what my research at Palo Alto Networks has confirmed: By far, the most common way for malware to make its way into Healthcare networks is by spoofed emails.

  • 0
  • 586

2017 Cybersecurity Predictions: The Price of Ransomware Continues to Increase in Asia-Pacific

A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no i2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.

  • 0
  • 165

2017 Cybersecurity Predictions: The Price of Ransomware continues to increase in Asia-Pacific

2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.

  • 0
  • 559

Sofacy APT doubles down on its 'DealersChoice' Flash exploit campaign

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealersChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 677

How to maintain security while employees are out of the office for the holidays

The downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems.

  • 1
  • 689

What Lies Ahead for Cybersecurity in 2017?

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealerWhat Lies Ahead for Cybersecurity in 2017?sChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 743

PluginPhantom trojan expoits Android plugins to snoop

Researchers at Palo Alto Network's Unit 42 threat intelligence team spotted a new Google Android trojan named “PluginPhantom” which is capable of leveraging Android's DroidPlugin technology to steal user information.

  • 0
  • 577

"PluginPhantom" Android Trojan Uses Plugins to Evade Detection

A recently discovered Android Trojan dubbed “PluginPhantom” abuses a legitimate plugin framework to update itself and evade static detection, Palo Alto Networks reported on Wednesday.

  • 0
  • 560

Palo Alto Networks reforça necessidade de reavaliação da postura de SI

Arthur Capella, country manager da companhia, conta que frequência de ciberataques ao setor significa necessidade de rever modelos de proteção através de cada ponto na cadeia de valor.

  • 1
  • 690

É hora de adotar uma nova definição para a palavra “prevenção”

Em discussões sobre cibersegurança uma das palavras mais utilizadas é “prevenção” e uma das indagações mais frequentes é como prevenir de ataques cibernéticos antes que eles sejam executados e registrem sucesso? Essa é uma questão importante com a qual as equipes de segurança têm de lidar diariamente.

  • 1
  • 627

What Could The Next Ransomware Note Say? Let’s Learn from 2016

While ransomware threats are mostly an unknown entity to everyday consumers and Internet users, the widespread havoc these types of attacks have waged on healthcare organizations during 2016 started hitting a little too close to home. Ryan Olson weighs in on the maturation and and business model of ransomware.

  • 0
  • 818

Do You Need a Threat Intelligence Team?

I have the great opportunity to spend time with CSOs and IT executives to understand their cybersecurity concerns and help them map out a strategy for success. An increasingly common question I’ve been hearing is, “Does my organization need a threat intelligence team?” Adding threat intelligence capabilities to your organization can be valuable, with their ability to hunt for advanced attacks; profile never-before-seen malware, campaigns or adversaries; and really think like an attacker.

  • 0
  • 556

Data integrity, the next big threat

Imagine in a 2016 remake of the classic film Gaslight, a young security professional is driven to the brink of insanity – and impending disaster – by a cyber schemer who unbeknownst to IT security has over time moved around and corrupted bits of data, manipulating, let's say, the design of a jumbo jetliner or perhaps the composition of a vaccine, to execute an unspeakable attack.

  • 1
  • 657

In 2017, ransomware and SaaS challenges will persist in healthcare

2016 was the year of ransomware in cybersecurity, and it was especially impactful in healthcare. For this post, I’ve laid out a few predictions about the type of threats that the healthcare industry will face in 2017. Also, I’ve organized my predictions into “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.

  • 0
  • 691

5 Things That Shape The Security Solution Provider Of The Future

One thing is clear about security: it is changing perhaps faster than any other industry. For partners, that means there's a need for a new business model when it comes to security, Palo Alto Networks Senior Vice President of Worldwide Channels Ron Myers said.

  • 0
  • 676

Nigerian Scammers: Then and Now

The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing victims that they have the opportunity to get a hefty sum of money if they only send some first, or pretending to be a man or woman in love with the victim and needing money to get out of some difficulty or another.

  • 0
  • 460

What the next president needs to do on cyber

With Election Day upon us, we are getting closer to ushering in a new administration in the White House. Significant progress on cybersecurity policy has been made in the past decade in both Republican- and Democrat-led administrations, and we look forward to the incoming administration making further strides in the next four years. Federal CSO John Davis provides recommendations for the next administration in Federal Computer Week.

  • 0
  • 792

Cybersecurity and Election Time: How to Avoid Being a Victim

The 2016 U.S. presidential election is a global phenomenon, but candidates aren’t the only ones vying to connect with the people. Behind the scenes, stealthy cybercriminals are immersing themselves in the political banter, gathering information and intel to drive their own agendas. What exactly motivates a cyber attacker to take advantage of elections?

  • 0
  • 363

Nigerian Prince scammers now a 'formidable threat'

According to a research report and accompanying blog post by Palo Alto Networks' Unit 42 threat research team, the Nigerian cybercriminals traditionally known for their 419 advance-fee scams have evolved from silly spray-and-pray email spam campaigns to more refined con games that target large business organizations with malware and fetch princely sums totaling millions of dollars.

  • 0
  • 598

Palo Alto Networks CEO: When And Why SMBs Buy Security Platform Offerings

Buying triggers for security customers can range from seeing a hack in headlines to word-of-mouth recommendations, but Palo Alto Networks CEO Mark McLaughlin said in the security platform business, it’s often detection alerts from a company’s own systems. “The biggest [buying trigger] is the overwhelming number of just detection alerts that are happening,” said McLaughlin. “This would be true in a very large enterprise, but it would probably be even more painful in smaller businesses.”

  • 0
  • 737
Displaying 31 to 60 of 1533