Date

Education and Professional Services

Displaying 1 to 30 of 3410

Exposing the Top 10 Cloud Security Myths

In the first edition of SecurityRoundtable.org magazine, get the latest ideas and best practices to secure the cloud from industry experts and business executives. Your journey to the cloud starts here.
  • 1

Simplify Cybersecurity: Why Less is More

Complexity has infiltrated every aspect of cybersecurity, resulting in costly and ballooning IT infrastructure. In the second edition of SecurityRoundtable.org magazine, experts like Rick Howard, Naveen Zutshi, and Mario Chiock provide ideas on how to simplify operations to achieve more efficiency and success.
  • 0

7 Service Provider Insights on Securing 5G Networks During Commercial Deployment

This Palo Alto Networks info brief is a synopsis of 7 key findings from the 2019 Heavy Reading 5G Security Survey.
  • 0

Supercharge Your Web Security With URL Filtering

As web-based attacks become more automated and effective, organizations must go beyond web protection basics. URL Filtering enables defenders to take advanced security actions to protect against malicious sites that deliver malware or steal credentials. Read this infographic for four advanced URL Filtering capabilities you can take use to enable safe web access and why they matter.
  • 0

5 Service Provider Security Considerations to 5G / IoT Security

Five security considerations mobile network operators need to keep on top of mind for a holistic and transformative approach to security across their mobile network.
  • 0

Nigerian BEC Scammers Use Malware to Up the Ante

Nigerian email scammers have come a long way from the days of asking for money to help a member of the country's royal family.
  • 0

SilverTerrier cybergang evolving new techniques for BEC scams

actors have been attributed to more than 51,000 malware samples and 1.1 million cyber attacks over the last four years as they are gaining experience quickly as they adopt new technologies, techniques, and malware to advance their schemes, according to a May 9 blog post.
  • 0

Implementing 5G Security: 5 Service Provider Priorities & Preferences

Five strategic service provider security priorities that will guarantee successful outcomes with implementing 5G.
  • 0

Nigerian Cybercrime 'Group' Has 400 Malicious Actors

SilverTerrier is not a traditional cybercrime group. It is the collective name Unit 42 of Palo Alto Networks gives to Nigerian cybercriminals. SilverTerrier continues to grow (over 400 individual actors) and evolve (from advance fee and 419 scams to business email compromise (BEC) and malware distribution).
  • 0

Nigerian BEC Scammers Shifting to RATs As Tool of Choice

Scammers running business email compromise (BEC) fraud have grown in number, attack more often, and turn to remote access trojans as the preferred malware type to accompany their raids.
  • 0

Cybersecurity Jobs Abound. No Experience Required.

Companies like IBM and Palo Alto Networks scramble to hire hundreds of thousands of corporate hackers to defend networks and data
  • 0
  • 73

Legacy Networks: What Was There Before Zero Trust

To shift how we think about security design and deploying Zero Trust, it’s important to understand security as it predates the introduction of Zero Trust.
  • 0

Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data

Learn about seven requirements for SaaS security and how they can help you protect your employees, data, and company from cyberthreats when using SaaS applications.
  • 0

Guide to Securing G Suite for the Enterprise

Learn about the advantages and risks associated with G Suite and what your organization can do to securely use it to its fullest.
  • 0

Debunking the Myth around Implementing Zero Trust

Debunking the Myth around Implementing Zero Trust
  • 0
  • 415

What Is DNS?

DNS is as ubiquitous online as flooring is in your home – so what exactly is it, and why should you care?
  • 4

Four Ways to Improve Cloud Security and Compliance

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 0
  • 123

What Is DNS Tunneling?

DNS tunneling is one of the most damaging DNS attacks. What exactly is it, and how does it work?
  • 3
  • 88

13 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.
  • 0
  • 829

What is a Credential-Based Attack?

Credential based attacks occur when attackers steal credentials to gain access, bypass an organizations security measures, and steal critical data.
  • 1
  • 3256

Despite Doxing, OilRig APT Group Remains a Threat

Despite a doxing of its targets and tools in March, the advanced persistent threat group known as OilRig remains a significant threat to governments and businesses, researchers at Palo Alto Network's Unit 42 report.
  • 0

Extending Zero Trust to the Cloud

Learn the real-world business challenges and benefits
  • 1
  • 429

Credential-based Attacks

Bryan Lee, Principal Researcher for Unit 42, provides high-level recommendations on how to prevent credential-based attacks.
  • 0
  • 410

Importance of Segmentation

Bryan Lee, Principal Researcher for Unit 42, discusses vulnerabilities in flat networks and the need for segmentation across your network.
  • 0
  • 414

Transformation of Cybersecurity

Bryan Lee, Principal Researcher for Unit 42, gives a quick overview of the need to automatically and immediately respond to threats.
  • 0
  • 414

Cloud Transformation

Bryan Lee, Principal Researcher for Unit 42, highlights the need for visibility and control in the cloud.
  • 0
  • 418

Visibility in a Multi-cloud World

Bryan Lee, Principal Researcher for Unit 42, highlights the need for visibility across multi-cloud environments.
  • 0
  • 415

Palo Alto Networks to Announce Fiscal Third Quarter 2019 Financial Results on Wednesday, May 29, 2019

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal Third quarter 2019, ended April 30, 2019, after U.S....
Santa Clara, CA
  • 0
  • 74

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.
  • 0
  • 54

How adversaries abuse DNS traffic

Bryan Lee, principal researcher for Unit 42, discusses how attackers are using DNS in malware attacks as a way to cause harm to organizations.
  • 0
Displaying 1 to 30 of 3410