Cybersecurity: No Cease Fire, Who Will Win? – Insights from North America ISRM 2014


In the cybersecurity industry, you will never feel bored due to the enormous amount of buzz words and headlines—the good, the bad and the ugly. High profile data breaches have been exposed to the public one after another. Nations escalated cybersecurity to their highest priority. New regulations and standards were developed to catch up to [...]

(ISC)² 2015 Cybersecurity Predictions: Security Moves into the C-Suite

(ISC)² 2015 Cybersecurity Predictions: Security Moves into the C-Suite

The recent attack on Sony Pictures illustrates just how impactful a breach can be, and it will not be the last of its kind. While there are minimal concrete root causes known about the Sony attack, we can infer from the extent of the breach that practices and controls surrounding information access, desktop security, and [...]

Palo Alto Networks 2015 Predictions: Endpoint Security

Palo Alto Networks 2015 Predictions: Endpoint Security

As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content here.) 1. Customers will stop paying for failed technologies It has become abundantly clear that traditional approaches to endpoint security are no [...]

How Malware Trends Affect Key Industries, From Healthcare to High Tech

How Malware Trends Affect Key Industries, From Healthcare to High Tech

Today we released our first Threat Landscape Review, which takes a high-level view of how malware is delivered to networks across major industries around the world. The data used for this report was derived from Palo Alto Networks WildFire™, which automatically identifies threats from malware over a wide array of applications by executing them in [...]

Hackers vs. Hacked: The Game’s Not Over

Hackers vs. Hacked: The Game’s Not Over

The New York Times recently published an article, “Hacked vs. Hackers: Game On,” discussing the current state of network security, and in it made a couple of interesting points about the prevalence of breaches, the need for federal regulation, and how current network defense technology is failing. While I agree that better defenses are needed [...]