On Data Privacy Day, Keep Your Data Safe by Identifying the Threats

On Data Privacy Day, Keep Your Data Safe by Identifying the Threats

Saturday, January 28th was Data Privacy Day. We’re proud champions of the National Cyber Security Alliance’s focused effort on protecting privacy and safeguarding data. But at Code42, we know that one day isn’t enough. We dedicate an entire month each year to reaffirm our critical role in keeping our customers’ data safe. This year, we [...]

The First 90 Days Brings Both Unintended Consequences and Opportunities for the Federal Workforce

The First 90 Days Brings Both Unintended Consequences and Opportunities for the Federal Workforce

During its first few weeks, the Trump administration issued several executive orders that left heads spinning, with many federal personnel unclear of the implications. One particular order that is causing significant anxiety among federal cybersecurity personnel – including thousands of (ISC)² members -- is the hiring freeze. How is the freeze impacting our U.S. government member [...]

2017 Cybersecurity Predictions: Sure Things and Long Shots

2017 Cybersecurity Predictions: Sure Things and Long Shots

This year’s Cybersecurity Predictions blog series examined Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. Here’s a round-up of what cybersecurity experts from Palo Alto Networks predict for 2017. Be sure to click into each post for even more predictions. [...]

Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments

Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments

Palo Alto Networks Traps Advanced Endpoint Protection recently prevented recent attacks that we believe are part of a campaign linked to DustySky. DustySky is a campaign which others have attributed to the Gaza Cybergang group, a group that targets government interests in the region. This report shares our researchers’ analysis of the attack and Remote [...]

Resilience and Security Risk Management in the Future of the IoT

Resilience and Security Risk Management in the Future of the IoT

The IoT, or “Internet of Things” (everyday objects and systems that have connections to a network to provide data-sharing and virtual control), is a fast-growing arena of technology growth. The potential uses of the IoT to build a “smart world” of connected devices is enormously convenient and brings a whole new level of mobile management [...]