SunRice was formed in 1950 when ricegrowers pooled their funds to establisha co-operative and built a rice mill inLeeton, a small town in New SouthWales, Australia. Today, the company hasgrown to become a $1 billion global foodbusiness supplying diverse and nutritiousfood products to more than 60 countries,including across Asia, the Pacific, MiddleEast and the United States. SunRiceemploys more than two thousand peopleacross its global operations and is widelyconsidered to be an Australian icon.SunRice is the quintessential “local kidmakes good” story. Officially knownas Ricegrowers Limited, SunRice hasblossomed into one of the world’s largestrice food companies while retaining itsroots in the Australian farming regionwhere it was founded in 1950.
Another vendor has joined the crowd of voices urging infosec pros to enable two-factor or multi-factor authentication where they can to better secure IT systems. Effective prevention of credential theft should focus on four strategies: Having more than one factor of authentication, one-time passwords, password managers and employee training, a discussion paper released Tuesday by the Unit 42 intelligence division of Palo Alto Networks.
Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week.
Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date
How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory
Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.
•Challenges with AV today
•Difference between exploits and malware
What is malware? What is an exploit? How to prevent against both attack vectors
•Prevention is better than a cure
Having a multiple method approach against APTs
•Automated Prevention Platform via Palo Alto Networks
Demo of live hack against Traps 4.1
Social networks are pervasive among most of today's Internet users. They are also important tools used by employees and organizations for outreach. Unfortunately, social networks are also rife with risk that can lead to exploitation of accounts, end points and loss of reputation. In this webcast, learn the risks social networking brings to enterprises, including targeted attacks, phishing, exploitation of accounts, spread of malware and loss of company reputation. Then learn how to enable valuable social networking tools securely.
Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.
Whether it's ransomware or a data breach, it feels like every day we read about a new cyberattack that leaves our organizations - or us, as individuals - at risk for cybertheft. Understanding the threat landscape is critical to prevent cyberattacks, and regardless of your title within the organization, understanding more of that landscape contributes to the well-being of the organization. October is National Cyber Security Awareness Month, so I sat down with Rick Howard, CSO at Palo Alto Networks to talk about the top five cybersecurity books that he recommends every CIO read to learn more about the cyberthreat playing field.
A lack of real world experience and metrics in order to aid security professionals is harming communication and capabilities. Speaking at the launch of the book Navigating the Digital Age, produced by Palo Alto Networks and Forbes, Palo Alto Networks CSO Greg Day said that the intention of the book was creating an understanding of responsibilities by distilling duties down, and highlight what are some of the things you can ask to go beyond the yes/no instance that you get from your team.
The joint development between VMware and Palo Alto is the most concrete example yet of the synergies between virtual network overlays and application services. The product illustrates the improvements in service granularity, automation and separation of administrative roles that is possible in virtual networks. It will be interesting to see if other security, load balancing, WAN optimization and monitoring/forensics products follow Palo Alto's lead by jumping on the NSX bandwagon. Given the elegance of this this design, we expect there will be many.
With all the healthcare breaches in the past few years it’s easy to blame HIPAA, the lone US healthcare data privacy regulation. I often hear complaints like “HIPAA is not specific enough” and “HHS isn’t even enforcing HIPAA.” In light of HIPAA’s 20-year anniversary this month (to be specific, it was signed into law on Aug. 21, 1996), I’m going to share a brief history of HIPAA revisions over the years and my thoughts on the overall regulation as a useful driver for security.
Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today shared research that uncovers a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia.
A relatively new Windows Trojan is capable of loading malicious applications onto Android and iOS devices connected to the infected machine via USB. The threat, dubbed “DualToy” by Palo Alto Networks, has been around since January 2015. While the malware has mainly targeted users in China, the security firm reported that individuals and organizations in the United States, United Kingdom, Thailand, Spain and Ireland were also impacted.
Palo Alto Networks is making major updates to its PAN-OS, the company announced Tuesday, adding new features across its entire technology platform. The new PAN-OS 8.0 launch adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention and new hardware. All in all, Palo Alto Networks added more than 70 new features across those platform categories with the operating system update.
Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
Learn how to discover the hidden risks and threats of SaaS applications by utilizing a cloud access security broker (CASB) such as Prisma SaaS to protect your data through visibility and protections that are consistent across all your SaaS applications.
Learn how we provide safe web browsing with our URL Filtering service
Reduce the risk of infection from dangerous websites and protect users and data from malware and credential-phishing pages
Protection across the attack lifecycle through integration with WildFire and the Next-Generation Security Platform
Keep protections synchronized with the latest threat intelligence through our cloud-based URL categorization for phishing, malware and undesired content
Full visibility and threat inspection into normally opaque web traffic through granular control over SSL decryption
SaaS applications continue to provide a tremendous value to end users with easy setup and collaboration capabilities that are changing the way organizations do business. The concern over the loss of control of data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a wait and see approach to SaaS. Microsoft® Office 365™ changes all that. Now SaaS services come with the application that many consider the most indispensable tool in business today: Microsoft Office. This pushes SaaS security to the forefront of most organizations and means it can no longer be ignored.
Federal agencies are facing an explosion of endpoints in both volume and variety. How are Federal IT managers handling this endpoint epidemic? What¹s the best approach to building an effective, practical, and enforceable endpoint strategy? What are the challenges and what¹s the path forward? To find out, MeriTalk and Palo Alto Networks examined endpoint security strategies and efforts across the U.S. Federal government, surveying 100 Federal IT managers and 100 non-IT Federal employees.
Public cloud infrastructure-as-a-service (IaaS) or Platform-as-a-service (PaaS) offerings, such as Amazon Web Services, Microsoft Azure or Google Cloud Platform, can quickly and economically accommodate unexpected or temporary business computing workloads. Many aviation organizations are extending their private data centers to the public cloud for a hybrid cloud model for competitive and operational benefits. In the aviation industry, concerns over data, workloads, siloed legacy systems, processes, infrastructure security and latency are still a major concern. Regardless of where data resides, is ultimately the target of malicious entities. Learn how Palo Alto Networks is taking care of this challenge.
Through our analysis, it remains clear that Nigerian cyber actors will continue to expand their attacks in terms of size, scope and capabilities. According to law enforcement organizations, the exposed losses to businesses worldwide from these threat actors are now estimated to be more than US$3 billion. Given the substantial risk these actors pose, we present techniques to enable large-scale attribution efforts to combat this threat. In doing so, we demonstrate a repeatable and sustainable process to identify SilverTerrier infrastructure and put preventive measures in place prior to the first samples of malware reaching our security products.
CoolReaper: The Coolpad Backdoor
New research from Unit 42 confirms security risk in Coolpad devices
Palo Alto Networks researchers have uncovered CoolReaper, a backdoor contained in millions of Android devices sold by manufacturer Coolpad. CoolReaper exposes users to potential malicious activity and appears to have been installed and maintained by Coolpad despite objections from customers.
Due to the unique way Coolpad modifies the Android OS, it is difficult for Android antivirus programs to identify and remove this backdoor.
The use of SaaS (software as a service) applications is creating new risks and gaps in security visibility for malware propagation, data leakage and regulatory non-compliance. Prisma SaaS delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications, providing detailed analysis and analytics on usage without requiring any additional hardware, software or network changes.
This paper examines the attacker’s mindset, first providing insights into the motivations and high-level methods shaping today’s threat landscape and accelerating the need for endpoint security technologies capable of preventing – not just detecting – both known and unknown threats.
Palo Alto Networks and Net Optics have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability network, the loss of a single device or power source must not be allowed to disrupt network connectivity. Adding a network security device to protect the network should not introduce any single point of failure. Combining Palo Alto Networks next-generation firewall with Net Optics’ Bypass Switches provides the necessary full threat prevention transparently and without reducing reliability.
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.
In this session, get details on:
Why the platform plays a critical role towards disrupting credential-based attacks
Preventing the theft of credentials, using new PAN-OS 8.0 technologies
Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework. Its concepts around segmentation and least-privilege access were developed specifically for SCADA/control system applications. They are simple yet extremely powerful in helping to reduce the risk of compromised uptime and safety due to malicious or unintentional cyber incidents. Hear from ISA99 Managing Director Joe Weiss, Palo Alto Networks SCADA Product Marketing Manager, Del Rodillas, and an Oil & Gas SCADA security practitioner to learn about:
- The essential concepts prescribed by IEC 62443 including zones, conduits, and least-privilege access
- Real world use cases and cyber incidents that highlight the importance of segmentation and role-based access controls
- How to realize the benefits of the IEC62443 framework using the advanced segmentation capabilities of the Palo Alto Networks Security Platform
Idaptive is joining forces with Palo Alto Networks to launch Intelligent MFA on Cortex. With Idaptive Next-Gen Access Cloud, organi-zations can leverage data from Cortex Data Lake to analyze event-level data and make more precise, risk-based access decisions. For example, you can now use events Cortex captures to dynamically adjust risk profiles for individual users and enforce more stringent authentication policies for high-risk access requests. Together, Palo Alto Networks and Idaptive provide more accurate and autonomous security by allowing you to constantly evolve your defenses in a seamless, frictionless way.
Displaying 2251 to 2280 of 2536
Be the first to know.
As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.