Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 10215

Traps Prevents Microsoft Office Equation Editor Zero-Day CVE-2018-0802

Unit 42 examines CVE-2017-11882 and how Traps advanced endpoint protection protects against this threat.

Gal De LeonMaor Dokhanian,
  • 0
  • 1

GDPR and the End of Reckless Data Sharing

The European Union’s General Data Protection Regulation (GDPR) will put every company with a digital strategy at risk of significant financial penalties. Any company that processes any personal information on EU citizens—whether as customers, employees, or business partners—and fails to comply, could face fines up to four percent of their annual global revenues, as well as severe reputational damage. And...

James Staten,
  • 0
  • 0

Make ‘Cyber Prep’ A Part of Doing Business

You’d think that the last thing any company would want, when it has suffered a disruptive data breach, is to compound the problem. So why are so many companies doing just that, with sub-par cyber-incident response? One of the main reasons is that many are still treating cyber risk as a technology issue, when it is actually a business issue....

Sean Duca,
  • 0
  • 3

Ignite '18 Call for Papers Extended 'til February 12

CALL FOR PAPERS EXTENDED 'TIL FEBRUARY 12   Submission Deadline: 12 February 2018 Selection & Notification: 16 February 2018     You're in luck if you'd still like to present a paper at Ignite '18! The call for papers has been extended 'til February 12 and you'll still hear back

editeur,
  • 0
  • 2

URL Filtering Implementation Best Practice

Hell everyone,    I have a vendor that is going to work on deploying the URL Filtering service in our Pan3020 but I wanted to undersandt/learn what the best approach is in order for to come up with an outcome that is manageable once they leave us. As of today,

garciar,
  • 0
  • 4

LiveWeek 19 Jan 2018

GLOBALPROTECT CLOUD SERVICE New Cloud service offerings! Part 2 of 3 - GlobalProtect Cloud Service Want to learn all about GlobalProtect Cloud Services? Then look no further -- all the details, including a video, are here. Exciting new features include solutions in service infrastructure, connections, remote networks, mobile support and

editeur,
  • 0
  • 0

Join Us February 6 for the Epic Cloud Security Event!

  Learn how to consistently protect your public, private, hybrid or multi-cloud environment without slowing down DevOps. Walk away with ideas you can implement immediately.   This enlightening cloud conversation will be moderated by best-selling author, futurist and entrepreneur Salim Ismail. We’ll cover: Cloud, network and security team and partners – roles and

editeur,
  • 0
  • 1

Konnichiwa Aperture!

  Konnichiwa Aperture!    The Aperture service now provides language support for Japanese as part of the internationalization project to expand globally and improve the user experience. With one easy switch, you can customize the supported display languages in Aperture to view navigation options, dialogs, menus, forms, error reporting, text

pwatkins,
  • 0
  • 2

Channels Scoop: January 19, 2018

Catch up on the latest Palo Alto Networks NextWave Partner news.

Roxanne Edwards,
  • 0
  • 0

Lennar Corporation

Lennar Corporation, is one of the largest home builders in the U.S., and markets the world's first Wi-Fi Certified Homes. Kevin Gonzalez, Security Operations Manager, discusses Lennar's decision to replace its legacy firewalls with more than 40 Palo Alto Networks next-generation firewalls - giving Lennar a single, holistic view to manage and secure its data more efficiently.

  • 0
  • 5

You’ve Just Crossed Over into the Deep, Dark Web

It’s the stuff of crime novels and science fiction movies: a virtual world that seems so mysterious and foreboding that one enters only at his or her own risk. Welcome to the dark web, a quadrant of the internet that serves up a motley collection of often boring but sometimes secretive sites that contain everything from corporate records to meeting...

Sam Greengard,
  • 0
  • 3

New Cloud service offerings! Part 2 of 3 - GlobalProtect Cloud Service

  In part 1 of the new cloud service offerings, we talked about the Logging Service. In part 2, we'll turn our attention to GlobalProtect Cloud service offerings.   Running a large business with employees located around the globe can be a pain when it comes to scaling GlobalProtect across your

jdelio,
  • 0
  • 3

Boards Seek Bigger Role in Thwarting Hackers

Corporate boards are seeking greater insight into cybersecurity risks in the aftermath of the recent breach at Equifax Inc. The hacking attack on the credit-reporting firm last summer was a defining moment for directors, say technology and corporate-governance experts.

  • 0
  • 1

Palo Alto Networks Announces Cloud-Based Logging Service in Europe

AMSTERDAM, January 18, 2018 – Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the launch of its cloud-based Logging Service in Europe. This service allows customers to collect large amounts of their own security data from the Palo Alto Networks Next-Generation Security Platform, making large scale log collection affordable while addressing data privacy and location needs for many European organizations.

Amsterdam
  • 0
  • 52

5 Critical Mistakes to Avoid: Incorrectly Sizing Your Future NGFW

We dive into the first of five critical mistakes people make when choosing a next-generation firewall.

Stephanie JohnsonKarin Shopen,
  • 0
  • 3

5 Critical Mistakes to Avoid: Choosing an NGFW in a Silo

Stephanie Johnson shares the second of five critical mistakes to avoid when purchasing a new NGFW.

Stephanie JohnsonKarin Shopen,
  • 0
  • 4

Simplify PCI Compliance With Network Segmentation for airlines

PCI compliancy is mandatory for the airlines, the scope extends to all system components that are included in or connected to the Cardholder Data Environment (CDE).

  • 0
  • 86

Don’t Forget the NIS Directive in Your 2018 Priorities

Greg Day weighs in on why the new NIS Directive should be a top priority for many EU organizations.

Greg Day,
  • 0
  • 1

Mitigate Digital Transformation Cybersecurity Risk With ‘DevSecOps’

Achieving customer value with any digital transformation initiative requires an organizational and cultural shift across the enterprise to align people’s efforts with customer priorities. We see such cultural change in software development shops in particular, as DevOps becomes the standard approach to delivering quality software at the velocity the business requires. There is a dark underbelly to digital transformation-driven customer...

  • 0
  • 0

For Today’s Chief Marketers, Cybersecurity Is a Key Campaign

While the damage from a data breach can be large—extremely large, in some cases—in financial terms, experts suggest that the worst damage, in the end, is to the company’s reputation. Chief marketing officers are now on their guard over data, and not just to protect their files, but their future sales. “Keeping our customers safe in the digital age is...

Mercedes Cardona,
  • 0
  • 5

Safe Search Best Practices with Palo Alto Networks

  Safe Search Best Practices I’d like to first level set on what Safe Search is and why this feature may be extremely useful for certain situations, in particular the education space (K-12).  Safe Search essentially filters out adult images, videos and content in search query returns.  This prevents end

neg273,
  • 0
  • 2

Master Channel: The Boleto Mestre Campaign Targets Brazil

Unit 42 investigates Boleto Mestre, a malspam campaign impersonating invoice documents of a popular Brazilian payment method.

Brad Duncan,
  • 0
  • 4

Threat ID for Unsafe Characters in URLs

Is there a Threat signature to detect Unsafe/ Illegal characters in an URL? I've searched the ThreatVault but I couldn't find any unfortunately.   For clarity this is what I'm talking about - https://perishablepress.com/stop-using-unsafe-characters-in-urls/   As anyone been able to find a signature for this (without using a custom signature)?  

Adriano_Carvalho,
  • 0
  • 7

Responding to the Rise of Fileless Attacks

Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets. Cybercriminals take the path of least resistance — which is why more of them are adopting fileless attacks to target their victims. The threat is poised to grow as attackers recognize the ease of this method and more employees rely on...

  • 0
  • 6

Palo Alto Networks Launches Global Cyber Range Initiative and Opens First Dedicated Facility in Amsterdam

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the launch of its new global Cyber Range initiative. By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the Asia-Pacific region, the company is working to build and improve effective skills for cybersecurity challenges today and in the future.

Amsterdam
  • 0
  • 176

Zero indicators in inboundfeed

I am trying out minemeld and I started by adding miner (zeustracker.badips) and removing the default dshield and spam nodes. Before removal inbound feeds were showing subnet ranges/indicators. After removal there is not a single ip. processor shows RX count and PROCESSED count but output is all zero. Am i doing something

raji_toor,
  • 0
  • 3

The Path from Denial to True Leadership Is a Challenging One

Cyber-attacks are such an ever-rising threat that the UK’s National Crime Unit reports their number surpassed the nation’s “traditional crime” as of July 2016. Importantly, cyber threats don’t always deal with sophisticated technology: sometimes, attackers simply exploit one of a typical organization’s many cyber weaknesses. To stay ahead of cyber criminals, it’s helpful for senior management and board members to...

Security Roundtable Staff,
  • 0
  • 3

Channel Scoop: January 12, 2018

Get the latest partner news in this week's NextWave Partner Channel Scoop.

Roxanne Edwards,
  • 0
  • 1

The CISO Definitive Guide for Picking the NGFW That Works for You

It seems that nearly every day a major trusted brand is reporting a breach. The loss and impact felt by companies and individuals alike are significant, and IDC expects that lost business will be more tangible over time. A recent IDC survey of 2,500 consumers found that over three-quarters of respondents would be willing to switch providers if their data was lost to criminals. The size and scope of breaches is mind numbing, and CEOs, board members, and everyday citizens continue to ask, "How do we get better?"

  • 0
  • 36

False positive for Visual Studio extension

I'm the author of this extension: https://marketplace.visualstudio.com/items?itemName=ionoy.XamarinFormsLive-18843   There is a xlserver.exe file that is a simple .NET assembly serving as a TCP server. There is nothing malicious which can be easily verified. Please remove the false positive.    Thanks!

ionoy123,
  • 0
  • 2
Displaying 1 to 30 of 10215