The Outlook for Biometrics Security


Deloitte Technology, Media and Telecommunications predicted recently that more than 1B devices would be reader-enabled for biometrics by the end of 2017. This is a very significant milestone for many reasons. Over the years, there has been a lot of hype about the potential of biometrics for authentication and other purposes, but the lack of [...]

Faces of ISACA: Integrity Central to Santor’s Career Success


One of the most influential conversations in Cheryl Santor’s career required plenty of gumption. Santor, working in IT at a mortgage banking firm in the 1990s, had major concerns about non-proprietary memory that had been installed, jeopardizing the main system for collecting loan information. She voiced her concerns to her CIO in no uncertain terms, [...]

Gearing Up for the Collegiate Cyber Defense Competition


It’s that time of the year when we get to root for our alma mater or favorite college competing in the Collegiate Cyber Defense Competition (CCDC). This year, Palo Alto Networks is supporting all 10 regional competitions, and the national competition, through the donation of our next-generation firewall, which CCDC teams will use to defend [...]

Traps “Can Can” Prevent RanRan Ransomware


A recent Unit 42 blog post breaks down the newly identified ransomware “RanRan,” targeting multiple Middle Eastern government organizations. Driven by what appear to be political motives, the RanRan attacker encrypts data until victims make a negative public statement against a particular political leader. Prevention against ransomware, like RanRan, is possible with Palo Alto Networks [...]

Palo Alto Networks Unit 42 Vulnerability Research March 2017 Disclosures


As part of Unit 42’s ongoing threat research, we can now disclose that Palo Alto Networks Unit 42 researchers have discovered three code execution vulnerabilities affecting Adobe Flash (APSB17-07) that were addressed in Adobe’s monthly security update release: CVE-2017-2997: Tao Yan CVE-2017-2998: Tao Yan CVE-2017-2999: Tao Yan For current customers with a Threat Prevention subscription, [...]

Connecting Business and IT Goals Through COBIT 5


Business leaders must take accountability for governing and managing IT-related assets within their units and functions just as they would other assets, such as those involving physical plant or human resources. This is critical as achieving enterprise goals becomes increasingly interconnected with successfully managing and governing its technology. COBIT 5 provides the framework needed to [...]