Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced that members of its Unit 42 threat intelligence team will present at government, industry and cybersecurity events in October and November 2014.
Palo Alto Networks® (NYSE: PANW), the next-generation security company, today revealed details of a new “BackStab” attack used to steal private information from mobile device backup files stored on a victim’s computer.
Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced that several of its executives and members of its Unit 42 threat intelligence team will present at RSA Conference 2015 sessions in San Francisco this week.
Palo Alto Networks® Security Operating Platform with high-capacity Next-Generation Firewalls deployed in a high-availability configuration, enabled with threat prevention and integrated cloud-based threat analysis
Founded in 1886, Ascham School is a non-selective day and boarding school for girls located in Sydney, Australia. The framework for teaching and learning at Ascham is the Dalton Plan, which encourages students to take responsibility for and ownership of their own learning, supported closely by their teachers. Students in years 5–12 are involved in the Personal Device Program which allows them to bring a device of their choice to support their learning. The program offers students flexible access to technology-rich content to facilitate and support academic achievement and encourages students to personalize their use of technology.
SunRice was formed in 1950 when ricegrowers pooled their funds to establisha co-operative and built a rice mill inLeeton, a small town in New SouthWales, Australia. Today, the company hasgrown to become a $1 billion global foodbusiness supplying diverse and nutritiousfood products to more than 60 countries,including across Asia, the Pacific, MiddleEast and the United States. SunRiceemploys more than two thousand peopleacross its global operations and is widelyconsidered to be an Australian icon.SunRice is the quintessential “local kidmakes good” story. Officially knownas Ricegrowers Limited, SunRice hasblossomed into one of the world’s largestrice food companies while retaining itsroots in the Australian farming regionwhere it was founded in 1950.
Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
Learn how to discover the hidden risks and threats of SaaS applications by utilizing a cloud access security broker (CASB) such as Prisma SaaS to protect your data through visibility and protections that are consistent across all your SaaS applications.
SaaS applications continue to provide a tremendous value to end users with easy setup and collaboration capabilities that are changing the way organizations do business. The concern over the loss of control of data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a wait and see approach to SaaS. Microsoft® Office 365™ changes all that. Now SaaS services come with the application that many consider the most indispensable tool in business today: Microsoft Office. This pushes SaaS security to the forefront of most organizations and means it can no longer be ignored.
Learn how we provide safe web browsing with our URL Filtering service
Reduce the risk of infection from dangerous websites and protect users and data from malware and credential-phishing pages
Protection across the attack lifecycle through integration with WildFire and the Next-Generation Security Platform
Keep protections synchronized with the latest threat intelligence through our cloud-based URL categorization for phishing, malware and undesired content
Full visibility and threat inspection into normally opaque web traffic through granular control over SSL decryption
Federal agencies are facing an explosion of endpoints in both volume and variety. How are Federal IT managers handling this endpoint epidemic? What¹s the best approach to building an effective, practical, and enforceable endpoint strategy? What are the challenges and what¹s the path forward? To find out, MeriTalk and Palo Alto Networks examined endpoint security strategies and efforts across the U.S. Federal government, surveying 100 Federal IT managers and 100 non-IT Federal employees.
Through our analysis, it remains clear that Nigerian cyber actors will continue to expand their attacks in terms of size, scope and capabilities. According to law enforcement organizations, the exposed losses to businesses worldwide from these threat actors are now estimated to be more than US$3 billion. Given the substantial risk these actors pose, we present techniques to enable large-scale attribution efforts to combat this threat. In doing so, we demonstrate a repeatable and sustainable process to identify SilverTerrier infrastructure and put preventive measures in place prior to the first samples of malware reaching our security products.
The City of Glendale is the fourth largest city in Los Angeles County, Eric Brumm, Deputy Chief Information Officer oversees the Infrastructure Services Division, which acts like a service provider to 14 different departments within the City of Glendale. Mr. Brumm discusses how his team replaced their legacy firewall solution with Palo Alto Networks Security Operating Platform and can now easily build powerful protection policies and have the visibility to see what is going in the background as traffic is flowing through the city’s network.
Public cloud infrastructure-as-a-service (IaaS) or Platform-as-a-service (PaaS) offerings, such as Amazon Web Services, Microsoft Azure or Google Cloud Platform, can quickly and economically accommodate unexpected or temporary business computing workloads. Many aviation organizations are extending their private data centers to the public cloud for a hybrid cloud model for competitive and operational benefits. In the aviation industry, concerns over data, workloads, siloed legacy systems, processes, infrastructure security and latency are still a major concern. Regardless of where data resides, is ultimately the target of malicious entities. Learn how Palo Alto Networks is taking care of this challenge.
CoolReaper: The Coolpad Backdoor
New research from Unit 42 confirms security risk in Coolpad devices
Palo Alto Networks researchers have uncovered CoolReaper, a backdoor contained in millions of Android devices sold by manufacturer Coolpad. CoolReaper exposes users to potential malicious activity and appears to have been installed and maintained by Coolpad despite objections from customers.
Due to the unique way Coolpad modifies the Android OS, it is difficult for Android antivirus programs to identify and remove this backdoor.
XDR must deliver a wide range of common EDR capabilities to provide efficient and effective security against modern attacks, while also integrating with other key prevention, detection, and response tools across the infrastructure. The following RFP checklist includes requirements within nine key categories to help you evaluate the quality of the platforms you’re considering. Use this checklist as a starting point and tailor it to your company’s needs to ensure you’re able to identify vendors that can best support your organization.
The number of smartphones and tablets accessing data on the corporate networks is exploding. Some of these devices are enterprise owned, while many others are user owned. The new IT challenge deals with balancing security with end-user freedom, particularly on personally owned devices. These challenges intensify when considering the increasing demand for application and data access on smartphones and tablets. These devices and apps create new threat vectors that must be addressed by IT executives to prevent data leakage of sensitive corporate information.
This paper examines the attacker’s mindset, first providing insights into the motivations and high-level methods shaping today’s threat landscape and accelerating the need for endpoint security technologies capable of preventing – not just detecting – both known and unknown threats.
Globally correlated threat intelligence and automatic, near real-time security updates create consistent protections across your entire network, endpoint and cloud – so you can prevent threats across the full attack lifecycle, stopping known threats instantly and unknown threats in minutes, instead of hours or days. This puts the largest collection of unknown malware data at your fingertips, allowing you to automatically turn analysis efforts for unique, targeted attacks into proactive protections.
Displaying 2281 to 2310 of 2584
Be the first to know.
As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.