Guiding Auditors in an SAP Environment

Enterprise resource planning (ERP) systems automate and integrate the majority of a company’s business processes, producing consistency. They do this by sharing common data and practices across an organization, leveraging one-time data entry, and providing access to information in real time. To help in this working environment, ISACA recently released a go-to reference book for […]

Continue Reading

Using Cybersecurity Economics to Gain the Upper-hand Against Attackers

Favoring a more integrated approach to cybersecurity, businesses are taking a hard look at ways to improve security by increasing spend, developing talent and managing policies. But the price tag associated with these changes begs the question: How much does one need to spend in order to gain footing against attackers?  In a recent column for SecurityWeek, Scott Gainey […]

Continue Reading

Security Talent Management: Leveraging the “Cool”

When governments routinely address cybersecurity as part of their policy, you know that the topic is of national interest. When vulnerabilities are found in—and researchers demonstrate attacks against—computer systems in medical devices, automobiles and airplanes, you know that the significance extends even farther. While that kind of recognition is important for the profession as a […]

Continue Reading

Test Drive Our Next-generation Firewall for Amazon Web Services

Want to see for yourself how well our VM-Series firewall works with Amazon Web Services? You can. Head here to access a guided tour of Palo Alto Networks VM-Series using hands-on lab exercises in AWS. The Test Drive lasts about one hour and allows you to build policies, troubleshoot, execute a simulated attack that is then […]

Continue Reading
%d bloggers like this: