Date

By Source

By Technology

By Services

By Audience

Displaying 2551 to 2580 of 9204

Cyber 9/12 Challenge: The Next-Generation of Cybersecurity Experts

Earlier this month, I had the privilege of attending the Cyber 9/12 Student Challenge at American University, sponsored by the Atlantic Council. The Cyber 9/12 Student Challenge is an annual cyber policy competition for students across the globe to compete in developing national security policy recommendations tackling a fictional cyber catastrophe. During the Cyber 9/12 Student Challenge, teams were evaluated on their:

John Davis,
  • 400

Maximizing your Panorama Deployment, Part 1

Are You Maximizing Your Panorama Deployment? Like most network administrators, you are concerned with manageability, streamlined operations, and ensuring your network security deployment is bulletproof. In this three-part blog series, I’ll address those concerns by sharing the benefits of moving to a network security management solution such as Panorama and explain how you can maximize your Panorama deployment. Let’s start with the benefits of Panorama:

Joerg Sieber,
  • 257

Cybersicherheit: Pravention durch Automatisierung

Gastbeitrag von Christian Hentschel, Theater Vice President, EMEA, Palo Alto Networks zum Thema Effektive Cybersicherheit. Er erläutert, wie mittels Automatisierung der Netzwerksicherheit der Schutzlevel spürbar erhöht wird.

  • 0
  • 440

A troubling trajectory of malware and ransomware targeting OS X and iOS

Think OS X and iOS are safe from security threats? Think again. According to Kaspersky Labs, from 2010 through 2014 malware targeting OS X increased 3,600%.

  • 0
  • 403

Enabling CCEAL4 or FIPS mode in high availability

This document describes how to enable and disable CCEAL4 mode on a Palo Alto Networks firewall with high availability, with minimum impact on the network.   Before attempting this procedure, read the following article to understand the changes and impact of enabling the FIPS/ CCEAL4 mode: Changes that Occur if

abjain,
  • 0

Four Imperatives for Cybersecurity Success in the Digital Age: Part 3

Having joined Palo Alto Networks following a 35-year career in the U.S. military, the past decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader international business world. This blog post series describes what I consider to be four major imperatives for cybersecurity success in the digital age, regardless of whether your organization is a part of the public or private …

John Davis,
  • 426

Customer Spotlight: Travel Service Takes Cybersecurity to a Whole New Place

Schauinsland-Reisen, an independent travel agency based in Duisburg, Germany, is the seventh largest package tour operator in Germany and currently offers travel services to over 60 traveldestinations. This nearly 100-year-old company, with a team of over 300, provides excellent customer service, but with a growing web business and a network of over 11,600 partner travel agencies, Schauinsland-Reisen saw a steady rise in cyberthreats. Unfortunately the company’s Linux-based firewall and antivirus software did not provide adequate protection of critical network assets and endpoint devices. Since implementing the Palo Alto Networks Next-Generation …

Leiann Bonnet,
  • 399

Tips & Tricks: Custom LDAP Groups

Beginning with PAN-OS version 7.0, a new feature allows firewall administrators to create a custom LDAP group, which is defined by a search filter based on attributes.  This feature eliminates having to involve the AD administrator in creating specific user groups.  These custom LDAP groups can then be utilized in

kiwi,
  • 0

What's new in MineMeld 0.9.7

Release Date: 2016-03-24   How to update: Updating MineMeld   Nodes - Miner for ProofPoint ET Pro feeds - Miner for PAN-OS syslog messages, let you extract indicators from PAN-OS logs according to a set of rules   UI - now you can add a new static indicator directly from the NODES page

lmori,
  • 0

DNS rewrite on a Palo Alto Networks firewall

DNS rewrite (DNS doctoring) is a the capability that a NAT device offers in order to translate the DNS A-record for a particular DNS query. The Palo Alto Networks firewall as of now does not support the DNS doctoring feature, but there are a few workarounds that can be used.    Some

abjain,
  • 0

DotW: Configuring WildFire

When configuing WildFire, it's sometimes difficult to know which options to configure, since WildFire offers an array of configurable options that include supported file types as well as various actions for these files. User jprovine recently asked how to best configure WildFire in the discussion forum. Several community members responded,

jdelio,
  • 0

Huge Savings on PCNSE Exams at Ignite Conference 2016

Have you been thinking about getting your Palo Alto Networks Certified Network Security Engineer (PCNSE) certification? Well there’s no better time than now to take the exam, we’re offering a special rate of 50 percent off exams to all Ignite Conference 2016 attendees. What’s the PCNSE Exam? Taking the PCNSE exam demonstrates an in-depth knowledge of design, installation, configuration, maintenance, troubleshooting and implementation of the Palo Alto Networks platform. Why get certified?

Catherine Crandall,
  • 391

Decrypt-mirror unexpected here error on commit

Symptoms On commit, the following error may be seen:   Decrypt-mirror unexpected here  ethernet is invaid   Warning Decrypt Mirror needs a license to mirror packets on  Commit error detail Diagnosis Things to verify if you see this error: Verify the Primary (Passive) Firewall Licenses to have a Valid Decrypt-mirror License. Verify

michandras,
  • 0

Minemeld 0.9.7

Hi, whats new with 0.9.7 ? just noticed that Minemeld has been upgraded to 0.9.7 roughly 3 days ago.   Thanks

bartoq,
  • 0

Q3 NextWave Huddle Highlights

On March 10, I hosted our Q3 FY16 NextWave Huddle webcast. If you missed it, I encourage you to watch the replay. For a quick preview of what you’ll find in the full video, watch my recap. Our special guest this quarter was Executive Vice President of Worldwide Field Operations Mark Anderson. Mark highlighted the key role our partners play in achieving our goal of organically doubling the size of our company by 2017.

Ron Myers,
  • 663

Palo Alto Networks News of the Week – March 26

Check out all of the top Palo Alto Networks news from the past week right here. The Palo Alto Networks threat intelligence team, Unit 42, observed Locky ransomware installed through nuclear exploit kits. Our researchers also examined the campaign evolution of Darkleech to pseudo-Darkleech which, in recent weeks, has led to Angler EK delivering a ransomware payload, especially TeslaCrypt. Continuing momentum this week, Unit 42 shared new details and insights into the evolution of the SamSa malware family and discovered new ransomware tactics in play. Palo Alto Networks researchers Tongbo …

Anna Lough,
  • 313

Content 571 Customer Advisory

The contents of this article has been moved to the following location: https://live.paloaltonetworks.com/t5/General-Topics/Content-571-Customer-Advisory/m-p/75230   We apologize for the inconvenience.

maurisy,
  • 0

Week 13 recap

Keeping up with March Madness? Be sure to check out our custom App-ID with setup instructions. Custom App-ID for NCAA March Madness 2016 with a description of this powerful tool, best practices, detailed instructions, and XML files of the custom signatures.   See also March Madness Custom App-IDs in the

editeur,
  • 0

Palo Alto Networks Researchers Discover Critical IE Vulnerabilities

Palo Alto Networks researchers Tongbo Luo and Hui Gao were credited with the discoveries of new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9, 10 and 11 on affected Windows clients. These vulnerabilities are documented in Microsoft Security Bulletin MS15-106 and MS15-112.

Ryan Olson,
  • 358

Evolution of SamSa Malware Suggests New Ransomware Tactics In Play

Ransomware is often in the headlines as new families are discovered on an almost weekly basis. Historically, these families have shared one similarity – they have all been deployed by attackers casting a wide net and largely being victim-agnostic. In most cases, the adversaries have used phishing emails and exploit kits in a ‘spray and pray’ style tactic. However, in recent months, a new trend seems to be emerging: targeted attacks where ransomware is deployed by threat actors after successfully gaining unauthorized access to an organization’s network. One malware family …

Josh GrunzweigBryan Lee,
  • 0

Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond

In 2015, Sucuri published two blog posts, one in March describing a pseudo-Darkleech campaign targeting WordPress sites, and another about its evolution the following December. Sites compromised by this campaign redirected unsuspecting users to an exploit kit (EK). The Sucuri posts describe patterns in the injected script related to this campaign. Since December 2015, patterns associated with pseudo-Darkleech have continued to evolve. Our blog post today will examine these changes. However, before we look at the recent developments, we should understand how EKs fit into the overall picture and review …

Brad Duncan,
  • 0

Architecture Matters

Every year, record levels of money are spent on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which an organization supports a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working. It’s time to rethink IT security – not just the technology, but the way it’s approached from a strategic, architectural perspective.

  • 1
  • 778

How to duplicate settings among multiple templates

At times you may want to duplicate/reconfigure Network or Device tab settings for multiple templates. For example, if you have N number of templates but want to share the same Administrator accounts, LDAP servers, etc among all of them you can duplicate or reconfigure settings.    There are two options to

abjain,
  • 0

Deploying updates from Panorama fails with error "No matching contents package found"

Symptoms   While deploying updates from Panorama to managed devices, the install fails with the error: "No matching contents package found in panupv2-all-apps-XXX-YYYY".       Diagnosis While deploying updates from Panorama, the panupv2-all-apps-XXX-YYYY was deployed instead of panupv2-all-content-XXX-YYYY.   panupv2-all-apps-XXX-YYYY is to be deployed/installed on Panorama and Log Collectors, or firewalls not

abjain,
  • 0

Lessons from Cyber Storm V

Two weeks ago, the U.S. Department of Homeland Security (DHS) conducted a national-level exercise, Cyber Storm V, designed to test the nation’s Emergency Preparedness procedures. Palo Alto Networks participated by providing cybersecurity expertise during the planning process and as players by using the exercise to test our own internal cyber incident crisis management plan. The players, located across the United States and around world, cut across multiple sectors and spanned numerous industries, provided real-time input in order to test our ability to combat cybersecurity threats. The game’s diabolical scenario tested …

Rick Howard,
  • 518

Achieving Continuous Protection with Highly Available Next-Generation Firewall Deployments

Network outages and cyberattacks cause unplanned downtime. And most organizations are seeing dramatic growth both in data center traffic and the use of web-scale ready applications. These trends have resulted in an increased density of business-critical workloads driving requirements for high availability network designs that can handle workload mobility and business continuity. To ensure highly available and continuous protection of network infrastructures, Palo Alto Networks Next-Generation Security Platform supports active/passive and active/active high availability deployment modes. Active/passive high availability remains the most commonly deployed method of stateful failover for three …

Sai Balabhadrapatruni,
  • 246

Locky Ransomware Installed Through Nuclear EK

In February 2016, Unit 42 published detailed analysis of Locky ransomware. We certainly weren’t the only ones who saw this malware, and many others have also reported on it. Since that time, Locky has been frequently noted in various campaigns using malicious spam (malspam) to spread this relatively new strain of ransomware. When we initially reported on Locky, attackers were distributing the malware using Microsoft Office documents with malicious macros to download and execute the ransomware. Attackers quickly added another tactic, sending e-mails with zip attachments containing malicious Javascript files …

Brad Duncan,
  • 0

Lightboard Series: Autoscaling GlobalProtect in AWS

This Lightboard video is an overview on how to automatically scale GlobalProtect remote access solution up and down to meet real time demand while reducing costs.

  • 0
  • 1619

Securing SaaS For Dummies

Download Securing SaaS for Dummies now. You'll learn to find and control SaaS usage in your networks and protect sanctioned SaaS usage.

  • 4
  • 6335
Displaying 2551 to 2580 of 9204