Date

By Technology

By Services

By Audience

Displaying 1 to 30 of 2966

Protect Workloads in AWS for Airline IT

In the massive competitive airline industry, one of the top priority is to lower costs and boost it innovation to gain strategic advantages. One way to do this by moving workloads to public cloud. Public cloud infrastructure-as-a-service or platform-as-a-service offerings, such as Amazon® Web Services (AWS®), Microsoft® Azure® or Google® Cloud Platform, can quickly and cost-effective accommodate computing power for your workloads. Many airline organizations are extending their private data centers to the public cloud for a hybrid cloud model with competitive and operational benefits. How- ever, proper alignment of security and resiliency to enterprise standards and policies is still required.
  • 0
  • 4

Cybersecurity for Governments Brief

Prevent successful cyberattacks on government networks and critical systems
  • 0
  • 800

VM-Series firewalls on ACI

To take full advantage of the automation and operational efficiencies of your ACI environment, you need to ensure that your security policies are enforced consistently and without compromise. VM-Series firewalls on ACI bring next-generation security to ensure your environment is optimised. In this webinar, you will learn: * How to integrate physical and virtual Palo Alto Networks® firewalls into ACI environments. * How to centralise management. * Best practices when deploying firewalls with Palo Alto Networks Solutions.
  • 0
  • 48

DarkHydrus Uses Open Source Phishery Tool in Middle-East Attacks

Today's regular daily summary starts here.
  • 0
  • 120

The daily briefing

Today's regular daily summary starts here.
  • 0
  • 125

Protect Azure in Retail

Discover how you can secure your Azure deployment with Palo Alto Networks Security Operating Platform. With deep visualization and automation with cloud-delivered security services the Palo Alto Networks VM-Series protects against known and zero-day threats. Tight integrations with Azure services, such as Application Gateway and Domain Services, deliver an adaptive and scalable security platform upon which to build applications today and into the future.
  • 0
  • 8

3 Requirements for Secure Digital Transformation

To secure digital transformation without slowing down the business requires an integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – to simplify operations and bring about better security outcomes with less effort.
  • 0
  • 34

Google says 150 Play Store downloads have hidden malware designed to infect your computer when you plug in your smartphone

Google says 145 apps on its app store were loaded with malicious files designed to attack your computer.
  • 0
  • 86

FBI struggles to keep top cyber talent

FBI’S CYBER RETENTION WOES
  • 0
  • 66

Palo Alto Networks to Announce Fiscal Fourth Quarter and Fiscal Year 2018 Financial Results on Thursday, September 6, 2018

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal fourth quarter and fiscal year 2018, ended July 31,...
Santa Clara, CA
  • 0
  • 209

Hacking group combines spear-phishing with mass malware campaign

Pakistani hacking group uses basic techniques and has poor operational security - but appears to have slithered into a large number of networks.
  • 0
  • 65

Worst of both words: 'Gorgon' hackers practice both general cybercrime and targeted government attacks

A hacking group apparently based in Pakistan has been straddling the fence between cybercriminal activity and nation-state espionage, leveraging the same malicious infrastructure to both launch email spam campaigns and target government agencies in U.S., UK, Russia and Spain
  • 0
  • 60

Android apps infected with umm… *Windows* malware

145 ANDROID APPS YANKED FROM OFFICIAL GOOGLE PLAY STORE.
  • 0
  • 127

Android Apps Infected With Windows Keylogger Removed From Google Play Store

Google has removed 145 Android apps infected with Windows malware from the official Play Store after a report from security researchers at Palo Alto Networks.
  • 0
  • 94

The Security Platform for Managed Security Service Providers (MSSPs)

The world's leading MSSPs power profitable growth and high customer satisfaction with the Palo Alto Networks Next-Generation Security Platform.
  • 0
  • 845

4 Benefits of Network Security Consolidation in Government

SECURE YOUR DATA, CITIZENS AND NATION
  • 0
  • 48

PALO ALTO NETWORKS SOC2 CERTIFICATION

Palo Alto Networks® strives to protect our way of life in the digital age by safely enabling applications and ensuring that customer data is secure, everywhere. As a leading cybersecurity company, we are focused on both the security and privacy of our customers, and we have developed our Next-Generation Security Platform from the ground up to support both. Download this document to learn more on WildFire and Aperture SOC2 certification.
  • 2
  • 1189

Palo Alto Networks Logging Service

Download the Logging Service datasheet to learn the features and benefits of scalable log storage delivered from the cloud. Find out how Logging Service can simplify log management and power an ecosystem of innovative Application Framework apps.
  • 2
  • 3556

VM-SERIES in AWS for automotive enterprise and connected vehicles

Get more information for securely enablin the cloud https://www.paloaltonetworks.com/cyberpedia/cloud-security
  • 0
  • 3053

Cyber Threat Report: Reconnaissance 2.0

Learn the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance, as well as how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 84

City of Glendale

The City of Glendale is the fourth largest city in Los Angeles County, Eric Brumm, Deputy Chief Information Officer oversees the Infrastructure Services Division, which acts like a service provider to 14 different departments within the City of Glendale. Mr. Brumm discusses how his team replaced their legacy firewall solution with Palo Alto Networks Security Operating Platform and can now easily build powerful protection policies and have the visibility to see what is going in the background as traffic is flowing through the city’s network.
  • 0
  • 43

Tick Group Malware Campaign Highlights Need for Stronger Supply Chain Security

Security researchers recently observed a malware campaign that leverages a particular type of USB drive to target specific Windows machines.
  • 0
  • 337

Cybersecurity Reference Blueprint for Financial Services IT

Learn how financial institutions may prevent successful cyberattacks by incorporating various elements of the Palo Alto Networks security operating platform into their overall cybersecurity program.
  • 2
  • 1473

Mirai, Gafgyt IoT Botnet Attacks Intensify

Security researchers are warning of a new wave of attacks associated with two infamous Internet of Things (IoT) botnets: Mirai and Gafgyt.
  • 0
  • 287

Endpoint protection for automotive

Please download more about Palo Alto Networks Security Operating Platform https://www.paloaltonetworks.com/resources/datasheets/security-operating-platform-aag
  • 0
  • 35

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 26
  • 13610

Securing the Unpatchable in Financial Services

Learn how unpatched and even end-of-support financial industry systems and devices may be secured with advanced endpoint protection against both malware and exploits.
  • 3
  • 342

Logging Service Privacy

The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 0
  • 3098

Securing SSL in Education Datasheet

Selectively decrypt TLS/SSL traffic to maintain network security and stop malware
  • 0
  • 3035

Closing the Loop: Benefits of Combining Network and Endpoint Security

Integrating network and endpoint security results in enhanced threat prevention and detection across your entire security architecture.
  • 0
  • 64
Displaying 1 to 30 of 2966