Date

By Source

By Technology

By Services

By Audience

Displaying 2551 to 2580 of 9517

Nexum

Nexum, Inc. is a cybersecurity and networking company located in Chicago, Ill. Nexum builds and secures global networks for organizations across multiple verticals around the world. In its various roles as a reseller, professional services consultant, support center, training center, and monitored and managed security services provider, Nexum makes use of the complete Palo Alto Networks security platform.

  • 0
  • 649

Mobile Malware auf dem Vormarsch

Im Interview erklärt Thorsten Henning von Palo Alto Networks, welche Mobile Malware auf dem Vormarsch ist und warum Ransomware wirklich jeden treffen kann.

  • 0
  • 783

What's new in MineMeld 0.9.12

Release Date: 2016-05-25   How to update: Updating MineMeld   Core - we have introduced a new trace service to record indicators movements across the graph   Nodes - STIX/TAXII Miner now supports client certificates, and TAXII user credentials can now be supplied via WebUI   UI - now you can visualize and query

lmori,
  • 0
  • 0

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

We have observed an attack led by the APT group Wekby targeting a US-based organization in recent weeks. Wekby is a group that has been active for a number of years, targeting various industries such as healthcare, telecommunications, aerospace, defense, and high tech. The group is known to leverage recently released exploits very shortly after those exploits are available, such as in the case of HackingTeam’s Flash zero-day exploit. The malware used by the Wekby group has ties to the HTTPBrowser malware family, and uses DNS requests as a command …

Josh GrunzweigMike ScottBryan Lee,
  • 0
  • 0

Rick Howard Enters a Lion’s Den of Journalists

Amy Zegart is the Co-Director of the Stanford Center for International Security and Cooperation. This year, she invited me to join the advisory council for the Stanford Cyber Policy Advisory Program; a multi-year working group think tank designed to develop cyber strategy, doctrine, and fundamental ideas for the U.S. government. She also helps run the Stanford Cyber Boot Camp series, a program that aims to educate various communities around the country about cybersecurity issues. This week, she targeted journalists and invited me, and some other prominent network defenders, to have an off-the-record conversation regarding …

Rick Howard,
  • 0
  • 0

Calma! Nem todas as ameaças representam sério risco à segurança

Empresas buscam aprimorar inteligência de ameaças para preparar suas equipes sobre novos métodos de ataques e sobre como detê-los

  • 0
  • 762

Actionable threat intelligence: Key to comprehensive security in the healthcare industry

Advances in healthcare technology across the world and in Asia-Pacific have resulted in improved patient care, more accurate diagnostics, faster turnaround times, and a host of other benefits. However, a rise in the number of cyber attacks on the healthcare industry in 2015 has exposed vulnerabilities and risks that were previously not on the radars of many healthcare organizations.

  • 0
  • 748

New Threat Vault

Palo Alto Networks has been listening to your requirements for the Threat Vault and has responded with a new and improved Threat Vault that will address many of your requests and suggestions. The new Threat Vault includes more features and functions, and is redesigned to allow for better use,  search

jdelio,
  • 0
  • 0

William Saito: The G7’s Opportunity To Push Cybersecurity As A Business Enabler

G7 leaders are gathering this month in Japan, and the meeting is a huge opportunity to position cybersecurity as an enabler of business growth, writes William Saito, CSO and Vice Chairman, Japan, at Palo Alto Networks, in a new article for the World Economic Forum. G7 leaders, notes William, “must collaborate with stakeholders in business, academia and civil society to promote the secure expansion of ICT. It can enhance efficiency and productivity, as well as add value and real revenue growth – not only in developed countries but developing ones …

Chad Berndtson,
  • 0
  • 0

DotW: HA Lite

In this week's Discussion of the Week, we're taking a closer look at community member Doug_Hogue's question regarding High Availability on a PA-200.   An important thing to note when deploying a pair of PA-200 in High Availability is that these devices have a scaled down version of High Availability

reaper,
  • 0
  • 1

Viewing the Log Collector system log in the Panorama appliance

Issue  After upgrading we're unable to see the system log sent from the Log Collector in the Panorama appliance. (Both the Panorama appliance and the Log Collector were upgraded.) Even if "request log-fwd-ctrl action start-from-lastack device" is performed, the issue is not resolved. The issue is seen if the Local

TShimizu,
  • 0
  • 1

Application override port range

Hi,    I have a 3020 running v7.1.0 and Migration Tool v3.3.10   I have an application override policy with a port range (1024-65535): After importing this configuration to Migration Tool, the port range is converted to a single port (1024).  

Tormod,
  • 0
  • 1

Parameter adjust-tcp-mss unexpected

Hi,    I am importing a 7.1.0 xml-config from a 3020 appliance into Migration Tool v3.3.10.  Then I go to the output tab, generate and download the XML output file. When trying to import this configuration into the 3020 again, I get an error when loading configuration:        Looking

Tormod,
  • 0

Security Framework Guide for Business Leaders

This white paper gives corporate leaders a practical framework for addressing the people, process and technology elements of the cybersecurity challenge.

  • 2
  • 2390

Week 21 Recap

Hey there, Live Community—   Open Registration in the Live Community New sign-ups in the Live Community are booming! That means more people, ideas, dialog, and support. Get answers to your questions and share what you know with others—that's community. Access the power of more than 30,000 cybersecurity professionals in

editeur,
  • 0
  • 0

GlobalProtect Users and Internal Resources

Sometime even if the configuration is correct, GlobalProtect users are  unable to access internal resources. This situation may result because the subnet assigned to GlobalProtect is used somewhere in the network or there is a routing issue.     A workaround is to put the tunnel interface used in the

pankaj.kumar,
  • 0
  • 1

Palo Alto Networks News of the Week – May 21

It’s the weekend! Take some time to check out our top news from this past week. Mihoko Matsubara, CSO Japan, Palo Alto Networks K.K. shared key takeaways from the G7 ICT Multi-Stakeholders Conference in Japan. Global Head of Channel Operations Melissa Nacerino and Director, Americas Channel Marketing Kandyce Tripp were honored in CRN’s 2016 Women of the Channel and Power 100 lists.

Anna Lough,
  • 0
  • 0

People of Palo Alto Networks: Chuck Konrad

Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 11 Chuck Konrad Director, Global Technical Recruiting and Veterans Programs

Justin Hall,
  • 0
  • 0

Customer Spotlight: CAME Group Saves Over $2.5 Million with Consolidated, Preventive Network and Endpoint Security

CAME Group (CAME) provides automation systems for residential and industrial entrances, parking lots, and access control points. With business operations in 118 countries, CAME relies on a global network to connect employees, customers and partners, and was uniquely challenged to provide a network architecture that ensured both secure network access and secure endpoints. In fact, CAME frequently experienced targeted attacks by sophisticated exploits on the endpoint, many of which were nearly impossible to detect. “It’s a huge challenge to provide consistent endpoint protection wherever a user is working from,” notes …

Leiann Bonnet,
  • 0
  • 0

Fisher-Titus Medical Center

Dylan Border from Fisher-Titus Medical Center, a nonprofit community hospital located in North Central Ohio, discusses how the Palo Alto Networks Next-Generation Security Platform helps detect and prevent unknown cyberthreats. WildFire's proactive and automatic prevention of advanced and targeted attacks, helps give Fisher-Titus the insight and analytics to prevent future attacks.

  • 0
  • 793

O modelo de negócios do ransomware

O modelo de negócios por trás do crime mudou. No passado, os agentes maliciosos geralmente lucravam com seus esforços para roubar identidades, ou números de cartões de crédito, e vender os dados no mercado ilegal por um valor baixo.Nos últimos anos, o preço dos registros roubados despencou, caindo de $25 por registro em 2011 para apenas $6 em 2016.

  • 0
  • 771

Connect button in the Option List of GlobalProtect Agent inactive after Portal IP address change

Issue   If Global Protect VPN realized in “on-demand” mode remote GlobalProtect Agent clients will be able to connect to VPN network by doing a right click on GlobalProtect Agent icon on the Taskbar and choosing the “Connect” option from the drop down list, as shown in the following picture:

djoksimovic,
  • 0
  • 0

Burwood Group

Justin Flynn, Sales Engineering Manager at Burwood Group, a Palo Alto Networks partner and customer talks about consolidating on one platform, leveraging that platform for visibility and ease of management and doing everything possible to achieve prevention.

  • 0
  • 502

Warren Rogers Associates

Hear Matthew McLimans, Sr. Network Security Engineer at Warren Rogers Associates discuss how the Palo Alto Networks Next-Generation Security Platform deployed in Amazon Web Services (AWS) segments network traffic coming from thousands of remote data collection devices, prevents malicious traffic from infiltrating fuel system diagnostics and reporting systems, white-lists applications and services, and segments cardholder data to ensure PCI compliance in the company’s cloud-based data center.

  • 0
  • 476

Key Takeaways from the G7 ICT Multi-Stakeholders Conference in Japan

With our global economy more and more reliant on the digital systems that connect our individual national infrastructures, ministers from Japan, Britain, Canada, France, Germany, Italy, the U.S., and the European Union made coordination on information and communication technology (ICT) policy a major initiative during their G7 ICT Ministers Meeting held April 29–30 in Takamatsu, Japan. They also agreed multi-stakeholder approaches are essential for ICT and cybersecurity efforts. As host of the G7 meeting, the Japanese government put that agreement into action, organizing the first-ever G7 ICT Multi-Stakeholders Conference in …

Mihoko Matsubara,
  • 0
  • 0

URL Filtering Log Quota in Logging and Reporting Settings

Symptoms When you navigate to Device > Setup > Management > Logging and Reporting settings, there is no provision to set the log quota for URL filtering logs.   Diagnosis URL filtering log database is a part of the threat database. Solution Because URL filtering log database is a part

rchougale,
  • 0
  • 0

Palo Alto Networks to Present at Upcoming Investor Conferences

Palo Alto Networks (NYSE: PANW), the next-generation security company, today announced that its management will be presenting at the following financial community events:

Santa Clara, CA
  • 0
  • 464

Using Delete Password under Manage Data Protection

Issue   What is deleted when 'Delete Password' is used under Manage Data Protection?   To restrict access to captured data within the Data Filtering logs gathered as a result of matching Data Filtering patterns, many administrators use the "Set Password" functionality under Device -> Setup -> Content-ID -> Content-ID

rcole,
  • 0
  • 0

Register for Upcoming Spark User Summits from Fuel User Group

Don’t miss your chance to join Fuel User Group at its upcoming Spark User Summit one-day events, where attendees will hear subject matter experts discuss PAN-OS 7.1, the latest threat intelligence updates, virtualization and more. Spark User Summit attendance and Fuel User Group membership are provided free of cost: join today.

Megan Scofield,
  • 0
  • 0
Displaying 2551 to 2580 of 9517