Palo Alto Networks

This category contains 619 posts

A More Effective Cloud Security Approach: NGFW for Inline CASB

Cloud applications have changed the way organizations do business, introducing new security risks in the process. These applications are easy to set up and use for collaboration, and as a result, the volume and sensitivity of data being transferred, stored and shared in these cloud environments continues to increase. Simultaneously, users are constantly moving to … Continue reading

Cybersecurity and Human Factors: Why Cybersecurity Is a Human Issue Rather Than a Technical Problem

I recently had a discussion with Japanese business executives on cybersecurity challenges during which one of them asked me about the biggest difference between Japan and other countries regarding their approach to cybersecurity. I answered, “Each country and sector are different; but if I compare Japan and the United States, the Japanese tend to think … Continue reading

New PCNSE Exam Now Available

Our Palo Alto Networks Education and Certification team is pleased to announce the availability of the new Palo Alto Networks Certified Security Engineer (PCNSE) exam. This new role-based certification replaces the previous technology versioned certifications to better prepare you for your career leveraging Palo Alto Networks Next Generation Security platform. The exam covers topics related to … Continue reading

Threat Brief: Information on Bad Rabbit Ransomware Attacks

This Unit 42 blog post provides an update on the threat situation surrounding the Bad Rabbit ransomware attacks.   Attack Overview Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe. While not spreading as widely as the Petya/NotPetya attacks, reports indicate that where Bad Rabbit has hit, … Continue reading

Threat Brief: Drive-by Mining – Adapting an Old Attack to Mine Cryptocurrencies

On January 2, 2017, one Bitcoin was worth US $985.56. By October 16, 2017, that same Bitcoin was worth US $ 5,707.40: a 579% increase in value in ten and a half months. By comparison, Ethereum has gone from US $8.15 per ether on January 2, 2017 to US $342.83 per ether on October 16, 2017: a jump of … Continue reading

Welcoming the APAC WildFire Cloud

In service of delivering superior security outcomes, we must aggregate massive quantities of unknown threat data from a global community of users. Once this data is brought together, it should be rapidly processed, correlated and acted upon as new prevention controls. In order to support thousands of customers and petabytes of data in one central … Continue reading

Palo Alto Networks Day Japan 2017: Evolving Cybersecurity Efforts to Increase Trust in the Digital Age and Prevent Cyberattacks

Palo Alto Networks Day 2017, our third annual global cybersecurity conference in Japan, was a great success, attracting over 2,600 registrations. The number of attendees has more than doubled each year of the conference; and the spike in attendance reflects growing interest in cybersecurity updates on next-generation technology, the current cyberthreat landscape, Japan’s cybersecurity policy, … Continue reading

Threat Brief: Patch Today and Don’t Get Burned by an Android Toast Overlay

Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform. Patches for this vulnerability are available as part of the September 2017 Android Security Bulletin. This new vulnerability does NOT affect Android 8.0 Oreo, the latest version; but it does affect all prior versions of Android. … Continue reading

What Do Best-of-Breed Security Products and Top NFL Draft Picks Have in Common?

Analyzed individually, they can’t predict success. “Poor build, skinny. Lacks great physical stature and strength, lacks mobility and ability to avoid the rush, lacks a really strong arm, can’t drive the ball downfield … gets knocked down easily.” Whether you’re a football fan or not, if asked from whose NFL scouting report this quote was … Continue reading

The Cybersecurity Canon: Cybersecurity: Geopolitics, Law, and Policy

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon … Continue reading

Web Stats

  • 126,468 hits


@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,652 other followers

Twitter Updates


January 2018
« Dec