Date

By Type

By Industry

By Product Category

By Features

By Technology

By Services

By Audience

  • Business (1)

By Language

Displaying 1 to 30 of 131

Grid Cyber Lockdown: Ransomware in Critical Infrastructure

Hear from your industry peers and other security experts on the very important topic of Ransomware in Critical Infrastructure in this webinar.

  • 0
  • 262

How To (Effectively) Prevent Ransomware Infections

Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

  • 0
  • 770

Endpoint Protection in NERC CIP Environments – Compliance and APT Prevention

Compliance and security are both top-of-mind issues for electric utilities. The NERC CIP standards mandate controls that protect against malware, provide device monitoring, and enable the detection and response to cyber incidents. This webinar will explore the application of one advanced solution to meet both compliance requirements and security objectives.

  • 2
  • 593

IE End-of-Support: Three Critical Ramifications & How to Overcome Them

The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework. Its concepts around segmentation and least-privilege access were developed specifically for SCADA/control system applications. They are simple yet extremely powerful in helping to reduce the risk of compromised uptime and safety due to malicious or unintentional cyber incidents. Hear from ISA99 Managing Director Joe Weiss, Palo Alto Networks SCADA Product Marketing Manager, Del Rodillas, and an Oil & Gas SCADA security practitioner to learn about: - The essential concepts prescribed by IEC 62443 including zones, conduits, and least-privilege access - Real world use cases and cyber incidents that highlight the importance of segmentation and role-based access controls - How to realize the benefits of the IEC62443 framework using the advanced segmentation capabilities of the Palo Alto Networks Security Platform

  • 2
  • 955

Cyber Risk Management in the Digital Age

Whether a Fortune 500, local municipality, or the neighborhood pizza spot, cyber threats from a range of actors and criminals are becoming more of a risk to organizations of every size and purpose. Similarly, whether you are a board member or functional leader within the organization, you have a responsibility to understand the threats and plan for them. Everyone knows cybersecurity is a major risk…but do you know where the real risks to your organization lie? And how to find and react to them?

  • 19
  • 108

How to Architect “Zero Trust” Network Segmentation in ICS

In this webinar, we examine how an organization can and should extend a “never trust, always verify” philosophy to their endpoint security.

  • 4
  • 180

Cybersecurity: Reassessing the Cyber Threat Landscape

Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats.

  • 5
  • 73

Security Best Practices for Implementing Network Segmentation in a Healthcare Environment

In October 2015 the Center for Internet Security will release an updated version of the Critical Security Controls which outline cyber hygiene best practices for defense. One of the focuses of the updated controls is network segmentation. Network segmentation has been a security best practice in many organizations for a very long time, unfortunately many healthcare organizations have yet to embrace the technology as a viable defense. Most institutions know that segmenting systems is the right thing to do, but organizations still most often do not use the defenses at their disposal. With the proliferation of mobile computing, cloud computing, and innovative use for the Internet, no organization should take yesterday's segmentation best practices for granted. Whether it's to isolate highly sensitive data within the data center, to ensure better protection around offices that are in high-risk geographies, or to isolate mobile devices internally, maintaining good segmentation might require a different approach today than just five years ago.

  • 0
  • 394

KeyRaider iOS Malware: 225,000 iPhone Accounts Hacked

Unit 42 in conjunction with WeipTech, has identified 92 samples of a new iOS malware family that has been named KeyRaider. 225,000 valid Apple accounts with passwords were hacked, causing Unit 42 to believe this to be the largest known Apple account theft caused by malware.

  • 0
  • 100

Breach Prevention Week: Part 2

Hear Hatem and Chad discuss advanced security in the software-defined data center, and find out how the partnership between VMware and Palo Alto Networks is addressing the major security challenges organizations face. You’ll also learn why the perimeter network is still so ineffective, how to define security policy and segmentation, and what’s required to prevent breaches.

  • 0
  • 107

Breach Prevention Week: Part 4

Ryan discusses Operation Lotus Blossom and how the probable-espionage attacks were delivered via a customized backdoor, Elise. Learn how to recognize the difference between espionage and everyday malware, and find out how context, actionable data, and informed decisions can help keep your organization safe from targeted attacks.

  • 0
  • 130

Breach Prevention Week: Part 1

Hear Rene and Nir discuss why tactical security is no longer enough. Enterprises need to apply strategic security to safely enable business applications, and foster an environment of innovation, so that organizations can embrace new technologies in a new and secure manner.

  • 0
  • 216

Close Operational Gaps for Better Cybersecurity

As security solutions become more sophisticated, the challenge is not a lack of data, but how to cut through the noise quickly to understand what is actionable and where to allocate resources.

  • 0
  • 41

PCI Compliance: Compensating Controls for Increased Security

With credit card data theft growing at an alarming rate and undermining consumer confidence, organizations are investing in their network security for PCI compliance – only to realize that being compliant does not mean they're protected against advanced cyberattacks. PCI DSS was established before advanced endpoint technology existed, and patching is no longer the only way to ensure protection from known vulnerabilities.

  • 0
  • 172

Crack the Code - Defeat the Advanced Adversary

View an on-Demand webinar featuring Palo Alto Networks cybersecurity expert Scott Simkin, and have a detailed look at real attacks and how you can crack the code to defend your organization.

  • 1
  • 110

Everything you need to know about Windows 2003 End of Support

Microsoft has announced Windows Server 2003 End of Support (EOS) on July 14, 2015. Many businesses will be forced by circumstances to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In addition to various logistical issues, an out-of-support component is vulnerable to attack and may leave the business vulnerable to significant security and compliance risks.

  • 0
  • 71

Security Considerations for Private vs. Public Clouds

Hear Palo Alto Networks and the Cloud Security Alliance talk about the latest white paper that discusses security considerations for public and private clouds.

  • 0
  • 115

Next-Generation Security for Amazon Web Services

The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.

  • 1
  • 1041

Defeating the Advanced Adversary

Watch this on-demand webinar that takes a detailed look at the anatomy of real attacks carried out by advanced adversaries.

  • 0
  • 410

ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection

The growing presence of widely known and used Commercial Off-the-Shelf (COTS) systems in Industrial Control Systems (ICS) provides an increased opportunity for cyber attacks against ICS equipment. Such attacks, if successful, could have severe impact to not only process availability but also safety.

  • 1
  • 304

Extending Zero Trust to the Endpoint

In this webinar, we examine how an organization can and should extend a “never trust, always verify” philosophy to their endpoint security.

  • 0
  • 269

Revealing the Secrets: Advances in Android and iOS Attacks

In this webcast, learn about the capabilities of several new families of malware, the methods used to reach victims, and strategies to mitigate exposure to risk.

  • 0
  • 358

Getting to the REAL Numbers Behind Your Next-Generation Firewall with Application Performance Testing

This webcast explores how performance testing is integral to evaluation and emphasizes that methodologies need to move toward application-centric testing.

  • 2
  • 256

How to stop damaging attacks in Financial Services?

The volume of malware alerts received by security teams in Financial Services can now reach into the tens of thousands daily. Properly addressing these requires tools and security products that deliver a high degree of automation and eliminate many of the manual tasks that security teams still have to deal with when using traditional products. During this webinar, we describe how an integrated and streamlined approach to security can not only detect the most aggressive threats before they cause any damage, but also block any further propagation of malware through an automated closed loop approach that minimize the reliance on manual intervention.

  • 0
  • 260

What? You didn't know Computers Control you? / ICS and SCADA

This webinar focuses on some of these issues and what may be done to detect, mitigate, and recover from a SCADA security failure.

  • 0
  • 201

Protect Your Network From Today's Advanced Attack Methods

Attackers have been employing a few very popular attack methods recently in their quest for profit: spear phishing, malvertising, ransomware, to name a few. Learn about these methods and others through real examples, and the tactics you can employ to reduce your risk and protect your network from advanced threats like these.

  • 0
  • 46

Moving Beyond Proxies

In this webinar, we highlight the shortcomings of proxies, and showcase how a next-generation security platform can provide faster, simpler and more comprehensive security.

  • 0
  • 88

Threat Prevention and Security Automation to Stop Damaging Attacks

The volume of malware alerts received by security teams in Financial Services can now reach into the tens of thousands daily. Properly addressing these requires tools and security products that deliver a high degree of automation and eliminate many of the manual tasks that security teams still have to deal with when using traditional products.

  • 0
  • 330

Combat APTs with Palo Alto Networks

Advanced Persistent Threats (APTs) เป็นภัยคุกคามทางไซเบอร์ที่ก่ออันตรายต่อองค์กรทั่วโลก ด้วยความซับซ้อนและหลากหลายในการโจมตี เชิญร่วมงานสัมมนาผ่านทางเวปเพื่อรับข้อมูลเชิงลึกของการโจมตีประเภทนี้

  • 0
  • 219

Bringing Security to Mobile Computing

ทุกวันนี้อุปกรณ์พกพา ได้เข้ามามีบทบาทในการทำงานของพนักงานในองค์กรและก่อให้เกิดการเปลี่ยนแปลง ที่คุณจำเป็นต้องทำให้องค์กรมีความปลอดภัย. ตอนนี้เราเผชิญกับคำถามที่ว่า จะทำอย่างไรให้พนักงานสามารถใช้เครื่องมือที่พวกเขาต้องการ โดยในขณะเดียวกันจะต้องดูแลเรื่องความปลอดภัยของทั้งเครือข่าย, ข้อมูล และแอพพลิเคชั่นบนอุปกรณ์

  • 0
  • 26
Displaying 1 to 30 of 131