Date

By Year

By Type

  • In The News (1287)

By Topic

  • Cybersecurity (52)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1337)

By Language

Displaying 31 to 60 of 1545

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off.

  • 0
  • 515

What to Know Before Choosing a Malware Analysis Environment

Even the Most Advanced Malware Analysis Environment could potentially be Circumvented by a Sufficiently Advanced Attacker. From a technology perspective, it has never been a better time to be in the cyberattack business. Thanks to the common availability of attack tools in the underground marketplace, today’s adversaries don’t require the technical know-how to develop malware.

  • 0
  • 516

New products of the week 2.13.17: PAN-OS 8.0

PAN-OS 8.0 adds over 70 features to the Next-Generation Security Platform, enabling customers to safely embrace the cloud; prevent successful cyberattacks with high performance across network, endpoint and cloud environments.

  • 0
  • 486

three-ways-to-keep-your-business-out-of-the-data-breach

As high-profile data breaches continue to make news headlines, expectations concerning the security of data continue to rise. Given the trend surrounding new privacy- and cybersecurity-related laws around the world that mandate personal data breach and security incident notification – including the European Union’s General Data Protection Regulation and Network and Information Security Directive, respectively – it’s now critical for organizations, particularly those with global operations, to maintain a level of compliance that combines productivity and data security.

  • 0
  • 311

Obama's Former Cybersecurity Coordinator Named President Of CTA

The Cyber Threat Alliance (CTA) consortium founded by security vendors Fortinet, Intel Security, Palo Alto Networks, and Symantec, today announced that it is now officially a nonprofit trade association and that Michael Daniel, the former cybersecurity coordinator and special assistant to President Barack Obama, will serve as the CTA's first president.

  • 0
  • 490

Palo Alto stresses breakthrough innovation across massive range of new launches

Palo Alto identifies five areas of innovation within a wide-ranging series of announcements, although the most exciting appear to be around the expansion of threat protection capabilities, including credential theft protection.

  • 0
  • 461

IBM, Symantec e Nokia se unem para tornar sistemas IoT mais seguros

Alguns grandes atores dos mercados de Segurança e Internet de Coisas, incluindo a IBM, a Symantec, a Nokia e a At&T estão unindo forças para resolver problemas que tornam a IoT vulnerável em muitas áreas.

  • 0
  • 405

AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic establish IoT Cybersecurity Alliance

A new group consisting of AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic have formed the IoT Cybersecurity Alliance with the aim of developing best practices to battle IoT security threats that have accelerated in the past year.

  • 0
  • 390

IoT Cybersecurity Alliance Will Collaborate on Standards, Education

A new IoT Cybersecurity Alliance formed by AT&T, IBM, Palo Alto Networks, Symantec, and Trustonic promises to help solve one of the most critical elements of the Internet of Things (IoT) — security. The group says its goal is to work on IoT security standards as well as raise awareness about the topic.

  • 0
  • 394

AT&T, IBM, Nokia join to make IoT systems safer

The IoT Cybersecurity Alliance, formed Wednesday, also includes IBM, Symantec, Palo Alto Networks, and mobile security company Trustonic. The group said it won’t set standards but will conduct research, educate consumers and businesses, and influence standards and policies.

  • 0
  • 388

AT&T, IBM, Nokia join to make IoT systems safer

Some big players in security and the internet of things, including AT&T and Nokia, are joining forces to solve problems that they say make IoT vulnerable in many areas.

  • 0
  • 469

New IoT Cybersecurity Alliance formed by AT&T, IBM, others

A group of businesses from across the IoT value chain have formed the IoT Cybersecurity Alliance, aiming to use their combined expertise to allay business concerns about the Internet of Things and solve its security challenges.

  • 0
  • 397

Palo Alto Primes PAN-OS 8.0 With New Security Features

Security vendor Palo Alto Networks today announced version 8.0 of its PAN-OS operating system, which includes more than 70 new features touching areas such as threat prevention, credential theft prevention, cloud security, and management. This is the largest announcement Palo Alto has ever put out, says Frank Mong, SVP of product, industry and solutions.

  • 0
  • 415

Palo Alto Networks Unveils Big Product Updates, New Firewalls

Palo Alto Networks on Tuesday announced the launch of PAN-OS 8.0, which brings major improvements to the company’s Next-Generation Security Platform, and several new hardware and virtual firewall appliances.

  • 0
  • 371

Palo Alto Networks aims to thwart credential theft

Palo Alto Networks is aiming to thwart credential theft with the launch of its next-generation security platform. The move, which comes amid a barrage of product announcements from the security vendor, is notable because it's looking to prevent the intrusions that typically give cyberattackers the keys to the enterprise network.

  • 0
  • 412

Palo Alto Networks security platform gets major makeover

Palo Alto Networks has announced updates to its next-generation security platform that it says represents its biggest product and feature release ever. The updates to the Pan-OS 8.0 platform include over 70 features around cloud and SaaS, threat prevention, credential theft prevention and new hardware and virtual firewalls.

  • 0
  • 403

Palo Alto Networks Rolls Out Major PAN-OS 8.0 Update, New Hardware And Virtual Appliances

Palo Alto Networks is making major updates to its PAN-OS, the company announced Tuesday, adding new features across its entire technology platform. The new PAN-OS 8.0 launch adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention and new hardware. All in all, Palo Alto Networks added more than 70 new features across those platform categories with the operating system update.

  • 0
  • 410

Lack of Metrics is a Problem for Modern CISOs

A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no instance that you get from your team.

  • 0
  • 472

Finding the ROI in Threat Intelligence

Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place. First, I’d like to address the idea that threat intelligence is a cost center (albeit one vital to protecting the organization’s reputation and viability) rather than an investment that could lead to a competitive advantage and improved bottom line.

  • 1
  • 501

What's Next About Cloud Security?

De acordo com Daniel Bortolazo, systems engineer manager da Palo Alto Networks no Brasil, investimentos devem incluir visibilidade e controle completos no nível de aplicação e prevenção de ameaças conhecidas e desconhecidas, com o olhar voltado à automação

  • 0
  • 451

Pseudo-Darkleech Remains Prominent Distributer of Ransomware

The pseudo-Darkleech campaign, one of the long-standing prominent distributers of ransomware, is expected to remain strong in 2017, after going through a series of important changes last year, Palo Alto Networks researchers warn.

  • 0
  • 705

How Automation Can Help Agencies Thwart Today’s Cyber Adversaries

Pamela Warren, director of government and industry solutions, discusses why agencies need to be more efficient about cybersecurity, because every lost minute can make the difference between a successful attack and an unsuccessful one.

  • 0
  • 407

Cybersecurity in 2017: Automation, Adversaries and Orchestration

Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate its value; especially as conversations around sharing intelligence between the public and private sectors continues.

  • 0
  • 743

Spotting a Spoofed Email in Healthcare

Over the past year, healthcare organizations of all sizes have been impacted by cyberattacks. Most of them involve malware of one sort or another. As a former security operations lead at a hospital network in the San Francisco Bay Area, I learned what my research at Palo Alto Networks has confirmed: By far, the most common way for malware to make its way into Healthcare networks is by spoofed emails.

  • 0
  • 715

2017 Cybersecurity Predictions: The Price of Ransomware Continues to Increase in Asia-Pacific

A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no i2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.

  • 0
  • 240

2017 Cybersecurity Predictions: The Price of Ransomware continues to increase in Asia-Pacific

2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.

  • 0
  • 663

Sofacy APT doubles down on its 'DealersChoice' Flash exploit campaign

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealersChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 786

How to maintain security while employees are out of the office for the holidays

The downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems.

  • 1
  • 806

What Lies Ahead for Cybersecurity in 2017?

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealerWhat Lies Ahead for Cybersecurity in 2017?sChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 907

"PluginPhantom" Android Trojan Uses Plugins to Evade Detection

A recently discovered Android Trojan dubbed “PluginPhantom” abuses a legitimate plugin framework to update itself and evade static detection, Palo Alto Networks reported on Wednesday.

  • 0
  • 664
Displaying 31 to 60 of 1545