Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.
The Palo Alto Networks® Cortex platform unleashes a consumption model based in software as a service, or SaaS,
that allows customers to dynamically engage apps to solve a nearly boundless number of the most challenging security use
cases with the best technology available.
Palo Alto Networks® engaged independent data privacy risk management provider TrustArc® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
Service Provider SLR provides an opportunity for Service Provider teams to look deeply into the threats and applications on client networks to take joint action to improve their security posture. The report details relevant findings including analysis of threats, application vulnerabilities and command and control activity
Hear what’s top of mind for Scott Howitt, CISO of MGM Resorts International. Scott discusses his top business concerns, aligning security to the business, what he looks for when evaluating security tools and technologies and much more.
Earlier this month, a prolific hacking group said to be sponsored by Iran had its cyber arsenal leaked. A bundle of tools and target information belonging to the crew, dubbed OilRig, were thrown up on the web for all and sundry to see, marking the most significant leak of Iran's cyber weaponry to date.
Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
Cloud transformation is changing the ways that organizations approach enterprise networking, especially at the branch office. Learn about how to implement branch security with direct-to-internet networking.
Idaptive is joining forces with Palo Alto Networks to launch Intelligent MFA on Cortex. With Idaptive Next-Gen Access Cloud, organi-zations can leverage data from Cortex Data Lake to analyze event-level data and make more precise, risk-based access decisions. For example, you can now use events Cortex captures to dynamically adjust risk profiles for individual users and enforce more stringent authentication policies for high-risk access requests. Together, Palo Alto Networks and Idaptive provide more accurate and autonomous security by allowing you to constantly evolve your defenses in a seamless, frictionless way.