Learn how Western Asset Management is using Prisma Cloud to gain network visibility and access to other cloud native features that help mitigate threats.
Earlier this week Mark Anderson and I had the distinct honor of unveiling our five Global Partner Award Winners as part of our FY16 Sales Kickoff. This year’s Sales Kickoff was a …
We’re excited to be a Platinum sponsor at the Gartner Security and Risk Management Summit taking place next week (June 11-14, 2012) in Washington, DC. This summit is a great time not …
As further analysis of Flame come to light, one of the most interesting aspects of it comes from the way that it establishes trust. Or, perhaps more accurately, how it appropriated it. …
A number of years ago, I read Howard Schultz’s book “Pour Your Heart Into It: How Starbucks Built a Company One Cup at a Time”. One interesting aspect of it described how …
In previous posts , we have explored various data center security best practices in protecting the data center, and of course Palo Alto Network’s fundamental approach starts off with application visibility. Applications in the …
Several years ago while working at my former company, IT issued a notice to all employees that Internet radio was off limits. IT had concerns that the pipe to the Internet didn’t …
Today Palo Alto Networks released emergency antivirus release #756 to provide coverage for the recently discovered Flame malware. This update includes multiple signatures to detect the main module of Flame as well …
We finally wrapped up our worldwide 10-city data center summit tour last week. I personally logged more than 40,000 miles, advanced my ability to work in a cramped airline seat, and sampled …
Recently, Roger Grimes opined that the firewall was dead. Several folks chimed in to tell him that he was wrong, and much debate has ensued, citing reports about the nature of recent …
It’s a little late, but I wanted to comment on a great opinion piece by Nicholas Evans in Computerworld last week. He makes several points that Brian, Matt, and I have been …
This is the third of a three-part blog series exploring the issues and challenges with consumerization and BYOD. In part 1 of this series, we examined the challenge of dealing with the …
It’s been a busy week at InfoSec Europe, the security event held at Earl’s Court in Kensington, London. The show continues to bring together some of the best and brightest minds in …
One of the advantages of having an automated malware detection system with distributed nodes around the world is that you get to see a lot of malware. But sometimes, something interesting stands …
It’s April, spring is in the air, and that means crowds of security professionals will soon make their way to London for InfoSec Europe. This year the event will be held April …
On the heels of my last post regarding the role of the modern CIO, I thought it would make sense to delve a little into the relationship between CIOs and network security. …
Denial-of-Service (DoS) and Distributed Denial-of-Service Attacks (DDoS) have become an increasingly common problems for enterprises of all sizes. DDoS campaigns are commonly used by hacktivists to embarrass or otherwise disrupt a target …
Fresh Perspectives on Consumerization and BYOD – Part 2 This is the second of a three-part blog series exploring the issues and challenges with consumerization and BYOD. Part 1 is available here. …
Just read a great byline piece by Irving Wladawsky-Berger in the Wall Street Journal on evaluating the modern CIO. I completely agree that the old interpretation of the CIO role (internal and …
Data Center Learnings from the Road I just got back from our London Data Center Summit. We’ve had multiple data center events now in the U.S. and kicked off the international leg …
This is the first of a three-part blog series exploring the issues and challenges with consumerization and BYOD. This first post will dive into the landscape of existing approaches to consumerization and …
Earlier in the year, Palo Alto Networks researchers used WildFire to track down a new variant of the Waledac/Kelihos botnet making the rounds through Europe. You can read the original post here. …
Last week's annual RSA Security Conference in San Francisco was an exciting week. There was tremendous buzz and a sense of optimism that permeated the show floor. For us, that sense of …
My name's Kevin Butler and I'm the firewall admin at the University of Arkansas Medical Sciences campus in Little Rock, AK. I'm that guy that either allows or denies traffic over our …
Onstage today at the RSA Conference four of our customers agreed to no longer being seen by their co-workers as 'the stop police' or 'yes men.' They are granting a lot more …
It's that time of the year again; RSA Conference 2012 began yesterday and we couldn't be more excited. For those of us who make information security a part of our daily lives, …
There’s a lot of technology involved in a modern enterprise network. Some of it is a part of the network itself, some of it is to keep it reliable and secure, and …
I mentioned in my last blog that we’re kicking off a Data Center Summit starting in Dallas, Texas today. One of the special guests at our seminar will be John Kindervag from …
WildFire has recently detected a new variant of the Waledac botnet, along with a few new modifications. As a reminder, Waledac was a fairly large spamming botnet that was taken down in …
In a recent post for ReadWriteWeb (3 Ways Social Media Can Put Enterprises at Risk), I outlined a few IT security “blind spots” that many companies are currently trying to address when …
Great info from the Palo Alto Networks Product Management Team on the latest events surrounding DNSChanger. DNSChanger is a malware family that has been around for several years now, and at its …
I feel sorry for security IT admins these days. The enterprise network used to be relatively easy to protect; crunchy on the outside, chewy and soft in the middle. Protect the perimeters, …