PwC and Palo Alto Networks Launch Security Framework for Business Leaders

PwC and Palo Alto Networks Launch Security Framework for Business Leaders

Recently, we have noticed a common observation shared by many of the senior executives at our customers. With the increased awareness of cybersecurity as a business challenge, there is a commensurate need to discuss cybersecurity in business terms, specifically around how security can enable organizational agility, not slow it down. At Palo Alto Networks, we [...]

Palo Alto Networks Now A Five-Time Gartner Magic Quadrant Leader!

Palo Alto Networks Now A Five-Time Gartner Magic Quadrant Leader!

Gartner’s 2016 Magic Quadrant for Enterprise Network Firewalls has been released, and Palo Alto Networks is proud to be positioned in the Leaders quadrant for the fifth straight year. We’re thrilled that Gartner researchers continue to highlight both our ability to execute and the completeness of our vision. Once again, we are one of only [...]

How CVE-2015-7547 (GLIBC getaddrinfo) Can Bypass ASLR

How CVE-2015-7547 (GLIBC getaddrinfo) Can Bypass ASLR

Introduction On February 16, 2016 Google described a critical vulnerability in GLIBC’s getaddrinfo function. They provided a crash PoC, and so the task of producing a reliable exploit began. In this post, we will show how CVE-2015-7547 can bypass ASLR-enabled systems. The Bug getaddrinfo() is used to resolve a hostname and a service to struct [...]

Center for Cyber Safety and Education Supports Future Female Cybersecurity Leaders with Scholarships

Center for Cyber Safety and Education Supports Future Female Cybersecurity Leaders with Scholarships

The Center for Cyber Safety and EducationTM has announced the 2016 recipients of its Women’s Cybersecurity Scholarships. The scholarships, totaling US$40,000 in awards, will be provided to seven women from around the world in various levels of study to help them advance their cybersecurity careers. The Center is the nonprofit charitable foundation formed by (ISC)² [...]

Performance-Based Cybersecurity Certifications: Discerning Capability From Interest

Performance-Based Cybersecurity Certifications:  Discerning Capability From Interest

The cybersecurity field contains a professional charge like few others. Exploding into the commercial landscape over the last decade, the discipline finds itself in a perpetual state of flux. Subject to a myriad of definitions, many hopeful professionals and students know two things about cybersecurity:  first, it is important; second, it is growing. This trend [...]