Date

By Technology

By Services

By Audience

Displaying 1 to 30 of 4914

GDPR/NIS Countdown: How Ready Are Organisations to Get Their Cybersecurity in Order for the Next Decade?

This month marks the start of the 12-month countdown for organisations to be ready to comply with either – or in some cases both – the General Data Protection Regulations or the NIS Directive becoming law in Europe on the 25th and 10th of May 2018, respectively. Whether you have started working towards compliance in the last year or not,...

Greg Day,
  • 0

Threat Brief: WanaCrypt0r– What We Know

This Unit 42 blog provides an update on the threat situation surrounding the WanaCrypt0r ransomware attacks. It also well as information on the adversary playbook this attack uses.

Rick Howard,
  • 0

Palo Alto Networks News of the Week – May 20, 2017

Catch up on all the top Palo Alto Networks news of the week.

Justin Hall,
  • 903

Channel Scoop – May 19, 2017

Dive into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 949

Why Directors Feel Inadequate in Terms of Cybersecurity and What They Can Do About It

Based on a recent survey conducted by the National Association of Corporate Directors, only 19 percent of board directors feel confident that they grasp the nuance of cybersecurity risks well enough to make well-informed decisions. A whopping 59 percent of directors surveyed by the NACD say that they feel inadequate to oversee these risks.1 Those are shocking numbers since most...

Rick Howard,
  • 30

Navigating the Digital Age (Benelux Edition)

Navigating the Digital Age (Benelux Edition) includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.

  • 0
  • 35

Why Directors Feel Inadequate in Terms of Cybersecurity and What They Can Do About It

Palo Alto Networks CSO Rick Howard explores why directors feel inadequate about cybersecurity, and what they can do to become more confident when making security decisions.

Rick Howard,
  • 0

UPDATED: Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks

Our Next-Generation Security Platform automatically created, delivered and enforced protections from this attack.

Scott Simkin,
  • 0

How Japan Is Aiming to Close the Cybersecurity Skills Gap

With only three years left before the Tokyo Summer Olympic Games in 2020, Japan is facing a shortfall of cybersecurity manpower. According to the Ministry of Economy, Trade and Industry (METI), the current shortfall of IT professionals to available opportunities is 132,060, which will further increase to 193,010 in 2020. About half of end-user companies believe they are deficient in...

Mihoko Matsubara,
  • 75

FedRAMP Certification and Third Party Evaluation Is Not Enough

The following is excerpted from “Securing the Government Cloud” a recent article by Rick Howard published on FCW.com. Cloud service deployments at the federal, state and city levels that benefit from the cloud’s operational and cost efficiencies have been unprecedented. The federal government launched its Federal Risk and Authorization Management Program, or FedRAMP, to certify a consistent way for cloud...

Rick Howard,
  • 52

How Businesses Should Prepare for Australia’s New Mandatory Data Breach Notification Laws

Australia, like other countries, has not been immune to data breaches in which personal information has been exposed. The much-anticipated Privacy Amendment (Notifiable Data Breaches) Bill 2016, whereby organisations will be legally obliged to disclose data breaches, has been passed by the Australian Federal Government, and the laws will come into effect within the next 12 months. The bill applies...

Sean Duca,
  • 11

The New Branch Office IT Has to Be Cloud-Savvy and Secure

Following an era of IT centralization, one might think today’s branch office easily accepts everything that comes from corporate headquarters and seamlessly hums along, operating like a mini version of headquarters and, of course, looking just like all the other branch offices. But nothing could be further from the truth. Branch offices are alive and well and a new version...

Massimiliano Tesser,
  • 33

FedRAMP Certification and Third Party Evaluation Is Not Enough

The following is excerpted from “Securing the Government Cloud” a recent article by Rick Howard published on FCW.com. Cloud service deployments at the federal, state and city levels that benefit from the cloud’s operational and cost efficiencies have been unprecedented. The federal government launched its Federal Risk and Authorization Management Program, or FedRAMP, to certify a consistent way for cloud service...

Rick Howard,
  • 22

The Year of Mainstream Cybersecurity

The following is excerpted from 2017: The Year Cybersecurity Went Mainstream, a recent article by William H. Saito published on World Economic Forum. Last year saw a huge increase in cyber-related incidents, including big data breaches, physical infrastructure tampering, Internet of Things (IoT) devices turning on their owners, ransomware, and even allegations of election hacking that captured the public’s attention....

William H. Saito,
  • 19

Back to the Basics: A Necessary Grind for Online Retailers

If we’ve learned anything from recent security breaches faced by several unfortunate retailers, it’s that often the attacks result from a breakdown in routine cyber hygiene. This realization has catapulted basic cyber hygiene to the top of the Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) priority list. Basic IT infrastructure and security protocols – understanding where your most...

Erin Nealy Cox,
  • 83

How to Account for Geopolitics in Your Cyber Risk Analysis

In October 2016, the company Dyn fell victim to a cyber attack that had cascading effects on many large service providers in the US. The purpose of the attack remains unclear; neither money nor confidential information were stolen. But clearly, the demonstration of force and thereby strategic effect was huge, so much that some pundits were looking at the attack...

Frédérick DouzetSébastien Héon,
  • 105

Embracing Holistic Cyber Resilience

Read David Irvine’s Ten Point Cyber Resilience Checklist for Boards here.

David Irvine,
  • 40

Thoughtful Regulation for an Unregulable Concern; The Balanced Approach of the New York Cybersecurity Framework

In an effort to bolster state cybersecurity laws and bring focus to cybersecurity practices in the financial industry, the New York State Department of Financial Services (NYSDFS) recently proposed a new, first-in-the-nation, cybersecurity framework. This regulation would require financial institutions that fall under the jurisdiction of the NYSDFS to establish and maintain a cybersecurity program designed to protect consumers and...

Scott Kannry,
  • 59

Ignite 2017 Open Seats: Threat Research/Unit 42 Track

Not only will attendees walk away from these sessions with the ability to act on threat intelligence and build their security network, the first 25 attendees to arrive at each session will receive special Unit 42 swag.

Samantha Pierre,
  • 0

Ignite 2017: Announcing Our Special Musical Guest

At Ignite ’17 Security Conference, we’ll have more sessions, tracks, breakouts, experts, networking and a special guest…Daughtry!

Catherine Crandall,
  • 0

Traps Protections Against WanaCrypt0r Ransomware Attacks

Palo Alto Networks Traps advanced endpoint protection protects Palo Alto Networks customers from ransomware.

Michael Moshiri,
  • 0

Executive Advisory Report: The Economics of Cyber Crime

Cybersecurity has become so pervasive in headlines across the globe that scarcely a week passes without another high-profile breach. While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks, given the heavily technical nature of the issue. This Executive Advisory Report examines the economics of cyber crime and what it means for your company.

Unit 42,
  • 0

Executive Advisory Report: Credential Theft

Credential theft is the oxygen of malicious activity: nearly always there, necessary, but never noticed. According to the 2016 Verizon® Data Breach Report, 63 percent of confirmed data breaches leveraged credentials, and the use of stolen credentials is the most common approach in web-app attacks. Credential theft is a staple in the playbooks of sophisticated attackers, like the Sofacy threat actor group, and unsophisticated attackers alike.

Unit 42,
  • 0

Executive Advisory Report: The Rise of Ransomware

Ransomware has evolved from a low-grade nuisance to a sophisticated multimillion-dollar criminal business that now targets both individuals and corporations. It is a criminal business model that uses malicious software to cryptographically hold your personal data hostage. While an increasingly urgent challenge, ransomware can be prevented through proper training, the right risk management processes, and advanced endpoint technology.

Unit 42,
  • 4

Deterrence in Cyberspace: A Greater Role for Industry

In early 2017 I participated in a RAND conference that looked at deterrence in cyberspace (among other issues) as it applied to the U.S. – Japan alliance. During this conference I described deterrence in cyberspace as essential, unique and complex. I argued that due to these characteristics, one cannot simply apply historical models of deterrence, like the nuclear example, to...

John Davis,
  • 25

The Year of Mainstream Cybersecurity

The following is excerpted from 2017: The Year Cybersecurity Went Mainstream, a recent article by William H. Saito published on World Economic Forum. Last year saw a huge increase in cyber-related incidents, including big data breaches, physical infrastructure tampering, Internet of Things (IoT) devices turning on their owners, ransomware, and even allegations of election hacking that captured the public’s attention....

William H. Saito,
  • 0

Why Women in Cybersecurity Are Important, In Japan and Everywhere

“How many of you here have a computer science degree?” A little over half of the women (and men) at Executive Women’s Forum Meet & Greet at RSA in San Francisco in February 2017 raised their hand. As one person pointed out, this shows you can be successful in cybersecurity without a computer science degree. Cybersecurity is not just about...

  • 23

CSO Roundtable: RSA 2017 Takeaways

Palo Alto Networks Chief Security Officer, Rick Howard, leads a roundtable discussion with colleagues Ryan Gills, Vice President of Cybersecurity Strategy and Global Policy, and Ryan Olson, Sr. Director, Threat Intelligence, about key takeaways from RSA 2017. Click above to watch the entire discussion about popular event themes including enterprise security orchestration and increased information sharing from vendors to customers.

Managing Editor,
  • 3

Three Questions to Ask Your CIO About Public Cloud Security

The public cloud offers unparalleled agility benefits, allowing companies to go from idea to implementation dramatically faster than ever. Agility, digital modernization and instant scalability are often the primary engines for public cloud adoption growth. Not surprisingly, the decision to adopt public cloud services for many business initiatives is no longer the sole purview of the CIO. In fact, research...

Managing Editor,
  • 17

Poland Expands Leadership Role on Cybersecurity

At the end of September, I had the opportunity to attend the second annual CYBERSEC EU conference in Krakow, Poland. Organized by the Kosciuszko Institute (a prominent think tank), with support from Poland’s Ministry of Foreign Affairs and NATO, the conference drew more than 700 attendees, including more than 100 speakers spanning government officials, industry experts and practitioners.  While many...

Danielle Kriz,
  • 14
Displaying 1 to 30 of 4914