Here’s a Look at the First Palo Alto Networks Intern Tech Week!

Here’s a Look at the First Palo Alto Networks Intern Tech Week!

This past week, Palo Alto Networks hosted our very first Intern Tech Week to give our interns the chance to connect with teams from different branches of the company. It was an opportunity to not only learn more about Palo Alto Networks products but also see how they are made. We kicked off the week [...]

A Career Path That Leads From Economics to Data Analytics

A Career Path That Leads From Economics to Data Analytics

When speaking to people who never considered a career in cyber or information security, we often find an audience put off by the perception that it is only for the technically minded. This couldn’t be further from the truth! Lucy Chaplin, a young consultant from the United Kingdom (U.K.) who became an Associate of (ISC)2 [...]

The Quest for Leadership Presence: Finding Your Voice

The Quest for Leadership Presence:  Finding Your Voice

When you listen to Indra Nooyi, PepsiCo CEO, you hear calm, measured confidence. When you listen to Sheryl Sandberg, Facebook COO, you hear upbeat, energized confidence. And when you listen to Mary Barra, GM CEO, you hear the concise messaging and confidence of a been-there-done-that leader. Each of these women telegraphs leadership through her voice. [...]

Finding Humor in Governance, Risk and Control

Finding Humor in Governance, Risk and Control

Andrew Tarvin is a best-selling author and professional stand-up and improv comedian. He teaches people and organizations how to use humor to be more effective and productive. Tarvin has worked with more than 100 organizations including Procter & Gamble, GE and Western & Southern Life Insurance, speaking, training, and coaching on topics ranging from humor [...]

Recent MNKit Exploit Activity Reveals Some Common Threads

Recent MNKit Exploit Activity Reveals Some Common Threads

Unit 42 recently identified a variant of MNKit-weaponized documents being used to deliver LURK0 Gh0st, NetTraveler, and Saker payloads. The documents were delivered to targets involved with universities, NGOs, and political/human rights groups concerning Islam and South Asia. Reuse of this MNKit variant, sender email addresses, email subject lines, attachment filenames, command and control domains, [...]