Date

By Technology

By Services

By Audience

Displaying 1 to 30 of 2499

Palo Alto Networks Brings Cybersecurity Insights to World Economic Forum Annual Meeting in Davos

Palo Alto Networks CEO Mark McLaughlin and Japan CSO William Saito will address cyber concerns to the 47th Annual Meeting of the World Economic Forum in Davos.

London, U.K.
  • 0
  • 38

Palo Alto Networks Launches Cybersecurity Guide for Organisations in Singapore

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers (Singapore Edition) Provides Expert Advice, Insights and Best Practices

Singapore
  • 0
  • 217

Pseudo-Darkleech Remains Prominent Distributer of Ransomware

The pseudo-Darkleech campaign, one of the long-standing prominent distributers of ransomware, is expected to remain strong in 2017, after going through a series of important changes last year, Palo Alto Networks researchers warn.

  • 0
  • 202

Exploit Kits: A Series of Unfortunate Events

This brief discusses the different stages of an exploit kit that must be successfully completed in order for the attacker to gain control of the host.

  • 0
  • 81

Next-Generation Security for Local Governments

Palo Alto Networks meets the security needs of local governments by automatically preventing cyberthreats and controlling access to sensitive data.

  • 1
  • 356

Maine Township High School District 207

Why Maine Township HS District 207 chose Palo Alto Networks Security Platform with Aruba ClearPass to secure network access for students, faculty and staff.

  • 0
  • 191

Cybersecurity in 2017: Automation, Adversaries and Orchestration

Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate its value; especially as conversations around sharing intelligence between the public and private sectors continues.

  • 0
  • 217

Palo Alto Networks to Present at Upcoming Investor Conference

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that members of its management team will be presenting at the following financial community event: 19th...

Santa Clara, CA
  • 0
  • 100

Spotting a Spoofed Email in Healthcare

Over the past year, healthcare organizations of all sizes have been impacted by cyberattacks. Most of them involve malware of one sort or another. As a former security operations lead at a hospital network in the San Francisco Bay Area, I learned what my research at Palo Alto Networks has confirmed: By far, the most common way for malware to make its way into Healthcare networks is by spoofed emails.

  • 0
  • 200

5 Missed Opportunities for Network-Endpoint Security Synergy

This brief discusses the five things an endpoint security solution should do to prevent negatively impacting your network security posture.

  • 0
  • 74

2017 Cybersecurity Predictions: The Price of Ransomware continues to increase in Asia-Pacific

2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it.

  • 0
  • 198

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.

  • 3
  • 93

Next-Generation Security for Lower Education/K-12 Districts and Schools

Keeping students and their data safe, while maintaining a modern and engaging learning environment, is a delicate balance. Read this brief to discover how Palo Alto Networks meets the security needs of schools and school districts by preventing cyberthreats across cloud, network and endpoint devices while granting administrators granular visibility and control over users and their actions.

  • 0
  • 356

Next-Generation Security for Higher Education Institutions

Higher education institutions must balance academic openness with protecting personal and financial information and valuable intellectual property. It’s another balancing act to maintain continuous, high-bandwidth access to resources while blocking threats that could damage the institution’s reputation. Read this brief to discover how Palo Alto Networks meets the security needs of higher education institutions by automatically preventing cyberthreats across cloud, network and endpoint devices at network speeds, as well as keeping sensitive data safe by administering granular security policies based on users, applications and content.

  • 0
  • 569

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.

  • 0
  • 41

Rethink Network Availability

Mobile network operators are now facing new malware-based incidents that threaten network availability as well as subscriber confidentiality.

  • 0
  • 43

Establish An Effective Security Posture In Next-Generation Mobile Networks

Mobile network operators need a new approach to security that will keep up with rapid network evolution and growing threats.

  • 0
  • 42

Sofacy APT doubles down on its 'DealersChoice' Flash exploit campaign

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealersChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 302

How to maintain security while employees are out of the office for the holidays

The downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems.

  • 1
  • 306

What Lies Ahead for Cybersecurity in 2017?

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealerWhat Lies Ahead for Cybersecurity in 2017?sChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 333

Palo Alto Networks Traps Named a 2016 CRN Product of the Year Winner

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that CRN®, a brand of The Channel Company, has named its Traps™ advanced endpoint protection offering...

Santa Clara, CA
  • 0
  • 230

Traps Privacy Datasheet

This document provides customers of Palo Alto Networks with information needed to assess the impact of Traps on their overall privacy posture.

  • 1
  • 142

Aperture Privacy Datasheet

This document provides customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture.

  • 1
  • 102

Fundamentals of Secure Cloud Adoption

The challenge of moving to the cloud is how to protect applications and data without adding complexity or cost. Read Securely Enabling Cloud Adoption for solutions.

  • 0
  • 134

Palo Alto Networks Automates Cloud Security Deployment On Amazon Web Services

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the integration of its VM-Series virtualized next-generation firewalls with Amazon® Web Services (AWS®)...

Santa Clara, CA
  • 1
  • 664

"PluginPhantom" Android Trojan Uses Plugins to Evade Detection

A recently discovered Android Trojan dubbed “PluginPhantom” abuses a legitimate plugin framework to update itself and evade static detection, Palo Alto Networks reported on Wednesday.

  • 0
  • 279

PluginPhantom trojan expoits Android plugins to snoop

Researchers at Palo Alto Network's Unit 42 threat intelligence team spotted a new Google Android trojan named “PluginPhantom” which is capable of leveraging Android's DroidPlugin technology to steal user information.

  • 0
  • 286

URL Filtering Privacy Datasheet

This document provides customers of Palo Alto Networks with information needed to assess the impact of the URL Filtering service on their overall privacy posture.

  • 1
  • 218

AirWatch Palo Alto Networks Integration Solution Brief

Read how Palo Alto Networks and AirWatch have partnered to provide unique, integrated security for protecting the mobile workforce.

  • 0
  • 15

Palo Alto Networks reforça necessidade de reavaliação da postura de SI

Arthur Capella, country manager da companhia, conta que frequência de ciberataques ao setor significa necessidade de rever modelos de proteção através de cada ponto na cadeia de valor.

  • 1
  • 392
Displaying 1 to 30 of 2499