Palo Alto Networks 2015 Predictions: Healthcare

Palo Alto Networks 2015 Predictions: Healthcare

As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content here.) 2015 will be a year of transition for security in healthcare where providers and organizations in the ecosystem catch up [...]

Seven Ways to Tighten The Security of Passwords


Passwords can actually represent one of the greatest security risks to an organization due to the combination of constant attacks and human weaknesses. In addition, as IT has become universally accessible, more users are adept at circumventing this basic security tool. Here are 7 tips to help organizations manage their passwords policy and reduce security [...]

When Panic Leads to Poor Decisions

When Panic Leads to Poor Decisions

We’ve all been there before. Something unforeseen happens that triggers a panic response. More often than not we look back at that response and wish we could have done things differently. What we’ve all learned along the way is that panic triggers a response that often leads to potentially catastrophic mistakes. Those mistakes come as [...]

Palo Alto Networks 2015 Predictions: Securing Industrial Control Systems

Palo Alto Networks 2015 Predictions: Securing Industrial Control Systems

As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content here.)  Recent years have made Industrial Control Systems (ICS) cybersecurity a very dynamic area, and 2014 was no different. While much [...]

Protecting Users from iOS App Provisioning Profile Abuse

Protecting Users from iOS App Provisioning Profile Abuse

Recently, we announced the discovery of WireLurker, a new family of malware that abuses app provisioning profiles to install potentially malicious apps on any iOS device, regardless of whether it is jailbroken.  Shortly after, FireEye highlighted the Masque Attack, which also relies on malware apps signed by provisioning profiles and had previously been disclosed by [...]