Will Government Be An Effective Cybersecurity Leader or Passive Bystander?

Our industry has been discussing the need for updates to critical public electronic communications laws and policies; reductions in corporate liability for intelligence sharing; national data breach legislation to replace the morass of US state laws; and increases in funding for cybersecurity education, research and standards for many years. There are two milestones that make […]

Continue Reading

Enterprise IT Governance: What? Why? How?

2014 has been called the year of the breach, with organizations from Home Depot to Sony experiencing attacks. Information technology failures are serious—to the point that companies can lose customers and market share. Now the question is: what measures should be taken to encounter severe threats? After having a lot of experience through years of […]

Continue Reading

Securing Large-Scale Network Architectures Without Adding Complexity

Large-scale network architectures, including private cloud and service provider networks, rely on a complex mix of routing protocols, virtualization, SDN, and Orchestration/Programmability  priorities to function properly. Palo Alto Networks virtual firewalls fit into many of these large-scale network architectures, supporting multiple hypervisors, private and public cloud vendors, multiple routing protocols, and orchestration integration via our […]

Continue Reading

Raising the Bar for Cyberattacks at the Point-of-Sale (POS)

Many retailers, large and small, brick-and-mortar and online, had their brands tarnished by cyberattacks in 2014. While news stories focused on Point-of-Sales (POS) breaches, often the initial intrusion took place in the back-office and through a business partner. Bottom line, to protect their reputation and the trust of their customers, retailers must reevaluate the level […]

Continue Reading
%d bloggers like this: