//
archives

@PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 17 years' experience in ICT/Cybersecurity industry in various sectors & positions.
@PhilipHungCao has written 2037 posts for @PhilipHungCao

Firewall 8.1: Optimizing Firewall Threat Prevention (EDU-114/214) – Certificate of Completion


The Importance of Securing Your Cloud


One of the biggest misconceptions regarding the cloud is that you can rely on the cloud provider service to protect your business, your data and everything else your firm holds dear. Take a minute to think about your own home security system. Do you just lock the doors with the key and head off to work, … Continue reading

Inclusion and Diversity: How Do We Lead?


At Palo Alto Networks, we’re committed to creating an environment where all the members of the team feel inspired to do their best work and contribute to the mission of protecting our way of life in the digital age. To do this, our team must better reflect the world we live in and secure with … Continue reading

Traps “Recommended” in NSS Labs Advanced Endpoint Protection Test


We are excited to announce that Palo Alto Networks Traps advanced endpoint protection has achieved a “Recommended” rating, and is positioned in the upper-right corner of the NSS Labs AEP Security Value Map (SVM), indicating outstanding protection and low total cost of ownership. Attackers must complete a certain sequence of events to successfully accomplish their objectives, … Continue reading

See the Graph Security API in Action at RSA Conference 2018


Today, Microsoft announced the public preview of their Microsoft Graph Security API. The security API enables a single point of programmatic access to aggregated security insights from Microsoft and partner security solutions, as well as business information from other Microsoft Graph entities (Office 365, Azure Active Directory, Intune, and more) that can add high-value context to … Continue reading

What the Skills Shortage Means for Existing Cybersecurity Practitioners


By now, most practitioners have heard (probably from a few different sources) that organizations struggle when it comes to finding, hiring and retaining the right resources for information security and/or cybersecurity professionals. There has been quite a bit written about this trend: the impact that it has on security efforts within enterprise, advice and guidance … Continue reading

Digital Transformation Gets Easier When Security Just Works


When I ask customers what they like about Palo Alto Networks, their answer is consistent: it just works. They can operate efficiently and prevent successful cyberattacks. Our Security Operating Platform is built for automation – it has to be easy to operate if we’re going to help our customers achieve digital transformation. You may not recognize the name “Security … Continue reading

Two Steps to a Robust Security Culture


By Kwinton Scarbrough, CISSP In the midst of the business and technology merge, organizations of all industries have started their journey into the cognitive era of cybersecurity. In this era, it is essential for a business to have an IT security strategy to govern how the organization will protect itself from internal and external cyber … Continue reading

Data Breach Preparation and Response in Accordance With GDPR


Many may be familiar with guidelines on personal data breach notification from Article 29 Working Party (WP29) prepared in October 2017 under Regulation 2016/679. In addition, the General Data Protection Regulation (GDPR) introduces the requirement for a personal data breach (henceforth “breach”) to be notified to the competent national supervisory authority. The basic concept of … Continue reading

Cloud Security: Embracing Change Requires a Mindset Shift


When meeting with organizations across EMEA, I often hear them cite concerns about putting security in the cloud. However, in the following discussions, they typically admit that doing just that is inevitable. There’s a mindset change here that needs to be embraced on all sides of the cybersecurity equation. I’ve worked previously with companies operating … Continue reading

Web Stats

  • 134,558 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 17 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,799 other followers

Twitter Updates

Archives

May 2018
M T W T F S S
« Apr    
 123456
78910111213
14151617181920
21222324252627
28293031