Date

By Source

By Technology

By Services

By Audience

Displaying 31 to 60 of 9108

People of Palo Alto Networks: Stephen Whyte

Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 4 Stephen Whyte Support Manager

Justin Hall,
  • 332

People of Palo Alto Networks: Karyn Priel

Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 3 Karyn Priel Executive Coordinator

Justin Hall,
  • 312

People of Palo Alto Networks: Get in on the Ground Floor

Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 2 Watch us break ground on our new campus. Big changes are in the future for us – want to be a part of it?

Justin Hall,
  • 338

People of Palo Alto Networks: Warby Warburton

Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 1 Warby Warburton Manager, Technical Marketing Engineering

Justin Hall,
  • 315

Miner certificate authentication

Hello! Could you tell me, Is there a miner with support authentification via client certificate? In particalur I need a JSON miner with this function. Thanks!

KVasiliy,
  • 1

Next-Generation Security for the Oil and Gas Industry

The oil and gas industry is the largest industry in the world. Hundreds of global enterprises are involved in exploring, extracting, refining, and transporting oil and gas products. The Palo Alto Networks Next-Generation Security Platform is the solution of choice for global oil and gas conglomerates today, ensuring the safety of intellectual property, monitoring and reporting the proper usage of networks, data, and applications, and protecting vulnerable endpoints.

  • 0
  • 565

Threat been dropped and yet allowed on the next try?

Hi all.  I am reviewing the "Threat" section on the Palo Alto firewall and I noticed some weird thing, perhaps it is normal, but I can't tell, thus this thread.  There are couple of threat in the "Critical" category indicated with the "dropped" action.  Yet when I opened the threat

UXPSystems,
  • 2

Tips & Tricks: Filtering the security policy

Manually searching through the policies can be pretty hard if there are many rules and it's been a long day. Luckily there are search functions available to you to make life a little easier. First off, you can simply type in any keyword you are looking for, which can be

reaper,
  • 0

Decline in Rig Exploit Kit

Unit 42 investigates recent developments in the EITest & pseudo-Darkleech campaigns contributing to the decline of Rig exploit kits.

Brad Duncan,
  • 0

Cyberpedia: Let’s Get to the Bottom of Cloud Security

Cyberpedia: let’s get to the bottom of cloud security.

Stephanie Johnson,
  • 0

This Is The Year to Prioritize Cloud Security In Healthcare

As medical data migrates to the cloud, 2017 will be the year to prioritize cloud security in healthcare.

Matt Mellen,
  • 0

Cloud Security: Who’s Responsible for What?

The typical journey to the cloud is based on a partnership between the cloud vendor and an enterprise or business, so the next logical question becomes: who is responsible for what, when it comes to cloud security and protecting the very important data within cloud applications? Solely relying on the cloud provider for security is not a viable approach. Rather, cloud security is a shared responsibility between the provider and the tenant that should be meticulously defined and understood by both parties. Only then can they work together to prevent …

Stephanie Johnson,
  • 0

2017 Cybersecurity Predictions: Re-shaping Cloud Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. Here’s what we predict for cloud in 2017: Sure Things A multi-cloud, hybrid security strategy will be the new normal among InfoSec teams In the last few years, the digital footprint of organizations has expanded beyond the confines of the on-premise data center and private cloud to a model that now incorporates SaaS and public clouds. To …

Sai BalabhadrapatruniMatt KeilAnuj Sawani,
  • 0

3 Fundamentals for Cloud Security

The Advantages of the Cloud Come with Certain Risk. Organizations must concentrate on a prevention-focused cloud security architecture for deployment — designed to stop threats across all potential attack vectors. For secure cloud adoption, there are three key questions to consider: 1. Who’s really responsible for our data? You. In public cloud environments, as the data owner, you’re responsible for your data — not the cloud service provider (CSP). And although the CSP will secure the underlying infrastructure, the safety of your applications and data is your responsibility. So you need a …

Will Howerton,
  • 0

can't login to web console

The web console throw the bad gateway error, also status of minemeld-web service is FATAL except for minemeld-engine and minemeld-trace which has RUNNING status. How can I fix this?

Sergey_R,
  • 1

False Positive

Hi,    Users trying to update AdobeCC are getting blocked, the PA seems to think the below files are wildfire-virus, but when uploaded to WF they are tagged as benign.   http://ccmdl.adobe.com/AdobeProducts/KCCC/1/win32/packages/ACCC_4_1_1_utils_202/Utils.zip   This triggers wildfire-virus 182090415 - Win32.WGeneric.mkcan - SHA256 -  f1edb3877014862c8a08a48384cffad392f11f5490bcfa4a46f03250ae7f2eda   and so does CreativeCloudSetup.exe is also triggering the

DarBis,
  • 3

Minemeld behind corporate proxy?

Hi,   There doesn't seem to be anything official on how to set up Minemeld to use corporate proxies. When trying to contact external URLs from within minemeld, it does not respect the proxy settings in either /etc/profile or /etc/default. It tries to access the Internet directly, and fails miserably,

ArildSaether,
  • 1

a problem with json output

Hello, I have a problem with json output. I have configured output node with "value":true configured but I still cant get indicator value in json format.     I try to get data in this way -> https://xxx.xxx.xxx.xxx/feeds/node-1498136004722?v=json But value field in reply is empty:       0   indicator

KVasiliy,
  • 0

False Positive Removal Request

Hi,   Could you please white-list our software installer as it's marked as generic.pup on virustotal.com website which should be a false-positive.   1/ File Hash: 2a20eb78c8d47b6e1da47e476a0adf13693f1c21336bfb53590dfdb980c3f523 Current VT Verdict: generic.pup Link to Virustotal for the file: https://www.virustotal.com/en/file/2a20eb78c8d47b6e1da47e476a0adf13693f1c21336bfb53590dfdb980c3f523/analysis/1498454618/ Description: False positive detection in driver-updater-setup-auslogics.exe with Palo Alto Networks definition version 20170529 on

aliya.kamaletdinova,
  • 3

Ignite '17 edition, Kiwi's favorites Part 2

Some more great questions and answers posted @ Ignite 2017. I'm sure these are very helpful to anyone with similar questions.   How do you record URLs without a URL filtering license?   Posted answer: You can record URLs without the URL filtering license BUT there will be no correct categorization.   My

kiwi,
  • 0

False Positive Removal Request

File Hash: 867a8834dcdcd53b9b61b54d950d4eee77da9bb2c2b8b95b149d47c477952c74 Link to Virustotal report for the file: https://www.virustotal.com/en/file/867a8834dcdcd53b9b61b54d950d4eee77da9bb2c2b8b95b149d47c477952c74/analysis/1498305645/ Current VirustTotal Verdict: generic.ml Description: Update tool for Network Auditor application  

jplandry,
  • 0

Customizing Parameters for Alienvault

Hello, I am new to MineMeld and was trying to figure out how to customiz the alienvault reputation prototype to only pull in values with a alienvault_reliability > 5.    I have the feed setup to an stdlib.aggregatorIPv4Generic and then to a FeedHCwithValue that I customized to drop anything with an

rrspyder,
  • 2

Migration Tool - SRX static routes import

Hi guys, I am working on migrating Juniper SRX firewall xml configs into the PAN. Everything works with the exception of the static routes. The MT logs show no errors. The version is 3.1. The vr1 instance for the interfaces shows no routes ('0').   The Juniper's xml follows this

denrom,
  • 0

Package Fetch/Repository Problem

Taken from the install guide, but is this still the correct repostitory: :~$ sudo add-apt-repository "deb http://minemeld-updates.panw.io/ubuntu trusty-minemeld main" :~$ sudo apt-get update Hit http://security.debian.org wheezy/updates Release.gpg Hit http://security.debian.org wheezy/updates Release Hit http://security.debian.org wheezy/updates/main Sources Hit http://security.debian.org wheezy/updates/main amd64 Packages Hit http://security.debian.org wheezy/updates/main Translation-en Hit http://debian.uchicago.edu wheezy Release.gpg Hit http://debian.uchicago.edu

Sam_Sylar,
  • 0

LiveWeek 23 Jun 2017

TOM, KIM, and JOE take on your questions from Ignite, with both the posted answer (but a sticky note can hold only so much info, right?) as well as more expansive responses where irresistible. We think you'll really like our dedicated Live Community engineers' perspectives on your questions. We'll continue to present more questions

editeur,
  • 0

Channel Scoop – June 23, 2017

Sit back and relax while we bring you this week’s Channel Scoop.

Lang Tibbils,
  • 434

USE CASE: On-Premise Unknown Threat Analysis for Financial Services

Advanced attacks have been able to evade traditional security measures, target specific users and vulnerable applications, steal sensitive information or commit outright fraud. One approach to preventing such advanced persistent threats (APTs) is to identify and protect against new exploits, malware and malicious URLs. This can be accomplished by “sandbox” analysis of unknown threats. Organizations such as financial institutions that are uncomfortable with cloud-based threat analysis may choose on-premise threat analysis solutions to address any data privacy concerns. Download this whitepaper to read about how Financial Services organizations can use on-premise threat analysis solutions to mitigate compliance risks and maximize prevention against cyberattacks.

  • 0
  • 29

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.

  • 2
  • 2248

Ignite '17 edition, Reaper's favorites Part 2

A couple more great questions and answers posted on the #GetAnswers wall at Ignite2017 I hope can be useful to anyone with similar questions   How can you do a wildcard search in Traffic Monitor?   Posted answer: Wildcards cannot be used in the traffic log filter.   My side

reaper,
  • 1

Threat Brief: WanaCrypt0r– What We Know

This Unit 42 blog provides an update on the threat situation surrounding the WanaCrypt0r ransomware attacks. It also well as information on the adversary playbook this attack uses.

Rick Howard,
  • 0
Displaying 31 to 60 of 9108