Moving Across National Borders in Information Security

Moving Across National Borders in Information Security

I am originally from the U.S. and relocated to New Zealand in 2014. Prior to coming to New Zealand, I worked as an IT auditor in Phoenix, Arizona, U.S. Long before engaging in IT related work, I obtained an undergraduate degree in Aerospace Engineering from University of Arizona and also an MBA from Thunderbird School [...]

Palo Alto Networks Joins U.S. Department of Commerce-Led Cybersecurity Business Development Mission to Asia

Palo Alto Networks Joins U.S. Department of Commerce-Led Cybersecurity Business Development Mission to Asia

Palo Alto Networks joined a cybersecurity business development mission of 14 U.S. ICT companies to Japan, Korea and Taiwan from May 16–24, 2016. The mission, led by U.S. Assistant Secretary of Commerce Marcus Jadotte, aimed to foster cooperation with these countries on cybersecurity from both a policy and business angle, exchanging challenges, experiences, ideas and [...]

Reeling in Those Pesky Phishing Attacks

Reeling in Those Pesky Phishing Attacks

We often hear about cyberattacks consisting of exploits or malware meant to gain control of victim machines, and the term “phishing” has become more widely used and understood. Even my dad now knows what phishing is, not because I told him, but because of headlines in news publications like these: BBC News Engadget Business Wire [...]

The Necessity of SoD

The Necessity of SoD

Segregation of duties (SoD) has been a source of guidance for audit and accounting systems for a long time; nevertheless, many IT security controls imposed by recent trends and regulations can be viewed through its lenses. Privacy by design and privacy by default, for example, as required by the new EU regulation recently approved by [...]

Malware: A Complex Threat Calls for Complex Controls

Malware: A Complex Threat Calls for Complex Controls

Malware can be challenging to remediate because it comes in an endless number of varieties and a wide range of threats, including low-end scareware, medium-level ransomware, to high-level advanced volatile threats (AVTs) and advanced persistent threats (APTs). Ransomware made the news recently and has become a concern. This sort of infection often starts with a [...]