Date

Education and Professional Services

Displaying 31 to 60 of 3413

Transformation of Cybersecurity

Bryan Lee, Principal Researcher for Unit 42, gives a quick overview of the need to automatically and immediately respond to threats.
  • 0
  • 415

Importance of Segmentation

Bryan Lee, Principal Researcher for Unit 42, discusses vulnerabilities in flat networks and the need for segmentation across your network.
  • 0
  • 415

Cloud Transformation

Bryan Lee, Principal Researcher for Unit 42, highlights the need for visibility and control in the cloud.
  • 0
  • 420

Palo Alto Networks to Announce Fiscal Third Quarter 2019 Financial Results on Wednesday, May 29, 2019

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal Third quarter 2019, ended April 30, 2019, after U.S....
Santa Clara, CA
  • 0
  • 86

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.
  • 0
  • 66

How adversaries abuse DNS traffic

Bryan Lee, principal researcher for Unit 42, discusses how attackers are using DNS in malware attacks as a way to cause harm to organizations.
  • 0

What is DNS and why is it important to secure?

Everyone uses DNS. Martin Walter, Product Line Manager at Palo Alto Networks, defines what DNS is and why securing DNS traffic is so important.
  • 0
  • 413

Muhstik Botnet Variant Targets Just-Patched Oracle WebLogic Flaw

Researchers are urging Oracle WebLogic users to update quickly – after new Muhstik botnet samples started targeting a critical flaw in the servers.
  • 0
  • 58

Cortex Data Lake Privacy Data Sheet

The Palo Alto Networks® Cortex platform unleashes a consumption model based in software as a service, or SaaS, that allows customers to dynamically engage apps to solve a nearly boundless number of the most challenging security use cases with the best technology available.
  • 0
  • 3112

Cortex XDR Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TrustArc® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 0
  • 3155

Service Provider SLR

Service Provider SLR provides an opportunity for Service Provider teams to look deeply into the threats and applications on client networks to take joint action to improve their security posture. The report details relevant findings including analysis of threats, application vulnerabilities and command and control activity
  • 0

Enterprise SLR

The Enterprise SLR provides visibility into applications, threats, SaaS application usage and malware in your network.
  • 0

Executive SLR

The Executive SLR is a condensed version of the Enterprise SLR designed for high level interpretation and summarized viewing.
  • 0

Top of Mind for a CISO

Hear what’s top of mind for Scott Howitt, CISO of MGM Resorts International. Scott discusses his top business concerns, aligning security to the business, what he looks for when evaluating security tools and technologies and much more.
  • 0

Muhstik Botnet Exploits Recent Oracle WebLogic Vulnerability

A recently observed variant of the Muhstik botnet is exploiting a recently disclosed Oracle WebLogic server vulnerability for cryptomining and distributed denial of service (DDoS) attacks.
  • 0
  • 51

Palo Alto Networks Is Putting AI To Work To Help Fight Cyberattacks

Hackers are increasingly automating their attacks, enabling them to exploit vulnerabilities more quickly.
  • 0
  • 62

Leak Reveals Iran’s Wildest Hacker Crew Stole 13,000 Passwords From 98 Organizations

Earlier this month, a prolific hacking group said to be sponsored by Iran had its cyber arsenal leaked. A bundle of tools and target information belonging to the crew, dubbed OilRig, were thrown up on the web for all and sundry to see, marking the most significant leak of Iran's cyber weaponry to date.
  • 0
  • 85

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
  • 0
  • 75

Data Sheet Buyers Guide

Don’t be fooled by misleading and cryptic datasheet numbers
  • 0
  • 69

5 Critical Mistakes When Evaluating A Next-Generation Firewall

NGFW Mistakes, Buying Myths, NGFW Evaluation, How to choose NGFW, 5 Mistakes to Avoid
  • 0

Securing a 5G-Enabled World

Watch this video to learn more about why you need a 5G-ready next generation firewall to secure your mobile network.
  • 1

Lightboard Series: DNS Security Service - Protecting against malware using DNS

Protecting against malware using DNS
  • 1

MiracleSpam: Spilling the tea on advertised diet tea

Constantly barraged by spam, it's important to understand how affiliate marketing scams operate to avoid falling victim to deceptive campaigns like MiracleSpam
  • 0

GoDaddy takes down 15,000 subdomains used for online scams

GoDaddy resets passwords for several hundred compromised accounts.
  • 0
  • 80

GoDaddy removes a massive network of bogus sales sites

GoDaddy removed a cluster of more than 15,000 fraudulent website subdomains discovered by a researcher at Palo Alto Networks' Unit 42 threat intelligence team.
  • 0
  • 68

GoDaddy Takes Down 15,000 Spammy ‘Snake Oil’ Subdomains

YOU’VE SEEN THE ads in your email or online: Celebrities supposedly hawking miracle weight-loss cures or galaxy brain supplements.
  • 0
  • 62

Delivering Infrastructure, Security and Operations as Code across Multi-cloud Environments

Watch this on-demand webinar to learn how automating infrastructure, security and operations “as code” is essential to keep pace with the dynamic pace of DevOps.
  • 1
  • 425

Cortex Data Lake

Enable AI-based innovations for cybersecurity
  • 4
  • 3888

Secure Transformation: Branch Offices Go Directly to the Cloud

Cloud transformation is changing the ways that organizations approach enterprise networking, especially at the branch office. Learn about how to implement branch security with direct-to-internet networking.
  • 0

Idaptive and Palo Alto Networks Solution Brief

Idaptive is joining forces with Palo Alto Networks to launch Intelligent MFA on Cortex. With Idaptive Next-Gen Access Cloud, organi-zations can leverage data from Cortex Data Lake to analyze event-level data and make more precise, risk-based access decisions. For example, you can now use events Cortex captures to dynamically adjust risk profiles for individual users and enforce more stringent authentication policies for high-risk access requests. Together, Palo Alto Networks and Idaptive provide more accurate and autonomous security by allowing you to constantly evolve your defenses in a seamless, frictionless way.
  • 1
Displaying 31 to 60 of 3413