Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 9935

Palo Alto Networks Reports Fiscal First Quarter 2018 Financial Results

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced financial results for its fiscal first quarter 2018 ended October 31, 2017. Total revenue for the fiscal...

Santa Clara, CA
  • 0
  • 67

LiveWeek 17 November 2017

Great new and updated articles this week in AWS and Azure, cloud services, management and learning -- let's get right to it!    AWS/AZURE NEW!! Self-Inflicted AWS Auto-Scaling Failures In AWS, the auto scaling process can fail for multiple reasons. Check out some self-inflicted causes for auto-scaling failures in AWS. We

editeur,
  • 0
  • 1

Pro active monitoring for routing table

Hello,   We have faced problem where routing table is full and we had an outage where customer were unable to access Internet for specific sites.   We asked for syslog or SNMP traps on it but we received as of now, there is no provision to monitor it.  

GOC_Virtela,
  • 0
  • 1

File minemeld-web.conf doesn`t exist

I`m looking for file minemeld-web.conf  into /etc/nginx/sites-available/minemeld-web.conf  directory but it doesnt exist, there`s only default file.   I need to change HTTPS services to HTTP   I installed the super fast setup from the site https://live.paloaltonetworks.com/t5/MineMeld-Articles/Running-MineMeld-on-VMWare-desktop/ta-p/72038   Greetings

vhgambit,
  • 0
  • 0

Engine error after reboot

My Minemeld system is failing to start, giving an engine error. The last it,e in the log is   2017-11-18T17:38:06 (2843)launcher._run_chassis ERROR: Exception in chassis main procedure Traceback (most recent call last): File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/run/launcher.py", line 53, in _run_chassis c.configure(fts) File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/chassis.py", line 102, in configure config=ftconfig.get('config', {}) File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/ft/__init__.py", line

deanm,
  • 0
  • 0

Logs Retention on MineMeld

Hello,   I want to change the log retention on MineMeld. It looks that the default configuration is 7 days. I was not able to find where to change this parameter. Can you please help?

alyssonalmeida,
  • 0
  • 0

Not all SSL traffic is being decrypted

I configured the firewall to decrypt outbound SSL traffic and installed a local cert I created onto my broswer. When I monitor my port 443 traffic I see some of  it is decrypted and some of it isnt. Is this normal behavior? I thought it was suppose to decrypt all

wrainwater,
  • 0
  • 5

Ignite 2017 Open Seats: Compliance Best Practices for DevOps

To get you ready for the premier security conference of the year, we’ll be spotlighting our top session each day on the blog.

Anna Lough,
  • 0
  • 0

Channel Scoop: November 17, 2017

Dig into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 0
  • 0

Make ‘Cyber Prep’ A Part of Doing Business

You’d think that the last thing any company would want, when it has suffered a disruptive data breach, is to compound the problem. So why are so many companies doing just that, with sub-par cyber-incident response? One of the main reasons is that many are still treating cyber risk as a technology issue, when it is actually a business issue....

Sean Duca,
  • 0
  • 1

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 3
  • 38817

How to block a specific file with hash value?

Hi Guys, I am using a pair of PA820 with TP, URL Scan and WF. I received a list of hash values from my Authority but couldn't find any hits on VirusTotal. Without doubting my big boss, I wanted to manually block it in the firewall but could not find

BEASG-IT,
  • 0
  • 2

Middle East 'MuddyWater' Attacks Difficult to Clear Up

Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week. Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date

  • 0
  • 36

MineMeld - Office 365 - How can I disable miners?

I am working on Office 365 control and I have discovered that MineMeld seems to be the best way to do this.  To that end, I have set up a MineMeld server and imported the PAN-provided script for Office 365.   There are some Office 365 features that we do

scottsander,
  • 0
  • 1

Self-Inflicted AWS Auto Scaling Failures

In AWS, the auto scaling process can fail for multiple reasons. Sometimes the cause for failure can actually be self inflicted. In this article, we will discuss some self-inflicted causes for auto-scaling failures in AWS. We will also discuss how to avoid these self-inflicted failures by following a few simple

jperry1,
  • 0
  • 1

A Rocket Scientist Hacks the Cybersecurity Labor Crisis

You don’t have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021. Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now CEO of Girl Scouts of the United States...

  • 0
  • 3

Guest Post: Doing Multifactor Authentication the PCI Way

Guest post by David Mundhenk and Ben Rothke on doing multifactor authentication the PCI way.

David MundhenkBen Rothke,
  • 0
  • 0

2018 Predictions & Recommendations: Cyber Hygiene for Financial Institutions Found Non-Compliant with SWIFT Mandatory Security Controls

2018 predictions & recommendations: cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls.

Lawrence Chin,
  • 0
  • 4

Creating a lab to test ICS/SCADA protocols

Introduction Organizations with industrial control systems (ICS) have been on a path to secure the border between IT (corporate network) and OT (ICS network) for some time. The first step for many was to provide simple segmentation between the two networks using firewalls from Palo Alto Networks. This satisfied initial

kwall00,
  • 0
  • 0

Feed from Soltra Edge Feed

Hello,    I am having some trouble pulling a feed from a Soltra Edge (NH-ISAC) into a local minemeld instance and I am not entirely sure how to go about troubleshooting it since the visibile errors with the minemeld console are a unfamiliar to me.    Based on what I've

David.Heath,
  • 0
  • 0

Bridging the Miles: 1,000 Special Ops Teddy Bears En Route to U.S. Military Active Duty Families

Palo Alto Networks volunteers help assemble 1,000 special ops teddy bears to U.S. military active duty families.

Adrienne Alesandro,
  • 0
  • 0

Hiring Women Is One of the Ways to Fill the Cybersecurity Shortfall

Top-quality cybersecurity workers are in high demand. According to the ISACA, a non-profit information security advocacy group, there will be two million cybersecurity professional jobs unfilled globally by 2019. Your security teams are already affected by this situation. Go ask your security leaders how easy it is to fill an open cybersecurity position with qualified personnel today. You will be...

Rick Howard,
  • 0
  • 0

Cybersecurity and Human Factors: Why Cybersecurity Is a Human Issue Rather Than a Technical Problem

Mihoko Matsubara shares insight into why cybersecurity is a human issue rather than a technical problem.

Mihoko Matsubara,
  • 0
  • 5

Businesses Are Going Through a Rough Patch

Today, software is embedded in virtually every machine, device, and system. It drives enterprise performance, and it delivers faster and better ways to manage tasks and processes. Yet there’s a dark side to all that code: It also introduces risk. Breaches often result because hackers and attackers take advantage of code vulnerabilities. Consequently, software patching has emerged as a crucial...

Sam Greengard,
  • 0
  • 0

Japan’s New Cybersecurity Strategies Have the Right Priorities in Mind

Mihoko Matsubara shares why Japan’s new cybersecurity strategies have the right priorities in mind.

Mihoko Matsubara,
  • 0
  • 4

Muddying the Water: Targeted Attacks in the Middle East

Unit 42 discovers MuddyWater, a threat group targeting entities in the Middle East and beyond.

Tom Lancaster,
  • 0
  • 4

Advanced Endpoint Protection Protects You From Dated Antivirus

Despite attempts to pivot from outdated security methodologies, traditional antivirus (AV) continues to fail to prevent security breaches on endpoints.

  • 0
  • 32

New AutoFocus and Aperture features - November 2017

Joe Delio here from the Live Community team, bringing you the latest features that have recently been released! We will be talking about the latest features included with AutoFocus 2.0.2 and Aperture release 24.   New AutoFocus 2.0.2 features: New Widgets to Visualize Sample Verdicts and Sources: AutoFocus has added 2

jdelio,
  • 0
  • 3

NHS IT Managers Cite Prioritizing Cybersecurity as Essential to Improving Patient Trust and Care

Palo Alto Networks® (NYSE: PANW), the next-generation security company, has today released findings of independent research into the state of cybersecurity within the United Kingdom’s National Health Service (NHS).

LONDON
  • 0
  • 60

The Top 12 Hybrid Cloud Security Threats

Using a multiple-cloud architecture calls for a hybrid cloud security mindset, which tends to focus less on network security in favor of securing data wherever it may be. RightScale’s “2017 State of the Cloud” survey describes hybrid cloud as the preferred enterprise strategy, with 67 percent of the respondents using it. The interesting trend is that there is movement away from...

  • 0
  • 2
Displaying 1 to 30 of 9935