Executive summary 
The explosive growth and surge of interest in cryptocurrencies over the past couple of years is well documented—fueled in part by the stunning rise of Bitcoin, the leading cryptocurrency in use today. For many C-suite executives, the cryptocurrency phenomenon is intriguing but insanely complicated, involving “blockchain” and “distributed ledgers” and other jargon. What does the cryptocurrency boom have to do with business? 

The short answer is that cryptocurrency introduces a host of new cybersecurity threats, which in turn create new risks for the enterprise. Many companies have already fallen victim to illicit “cryptocurrency mining” without even being fully aware of the nature or cost of the attacks. 

It is increasingly urgent that business leaders understand and respond to these new risks because the sophistication of the attackers and the magnitude of the impacts are on the rise. Fortunately, defending against the risks of illicit cryptocurrency mining does not require specialized security solutions or major disruptions to current security practices. The purpose of this report is to: 

  • Summarize the nature of cryptocurrency threats to enterprises
  • Explain how these threats could impact your business and its employees
  • Provide actionable steps to mitigate the risks

The report is based on groundbreaking research and analysis from Unit 42, the global threat intelligence team at Palo Alto Networks.


Logging Service Privacy Datasheet

Logging Service Privacy Datasheet
  • 1
  • 3661

Single Pass Architecture

With the single-pass architecture, Palo Alto Networks makes it possible to add a function to a next-generation firewall, instead of adding another security device, and in such a way that the integrated approach actually offers cybersecurity benefits and advantages that discrete devices cannot.
  • 6
  • 13985

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 430

Protect IoT Opportunity with Network-Based Security

Palo Alto Networks® Next-Generation Security Platform provides advanced network-based security mechanisms that protect service provider networks, IoT systems, and interconnected networks and infrastructure. The platform identifies infected devices, prevents security attacks targeting IoT systems (controllers and devices), and establishes the basis for adding significant value to the services offered to consumers. With this capability, service providers can grow their market share in the IoT market while providing deep protection for their own infrastructure and interconnected networks.
  • 0
  • 1514

Whitepaper - Cybersecurity Reference Blueprint for BMS/BAS

This white paper presents a cybersecurity reference blueprint for Building Management/Automations Systems (BMS/BAS)
  • 0
  • 259

Selective SSL Decryption for Threat Prevention

This paper lays out a basic approach that you can use to strike an appropriate balance between security and performance by selectively decrypting and inspecting SSL traffic based on policy.
  • 0
  • 7311