//
archives

Palo Alto Networks

This category contains 602 posts

Palo Alto Networks Joins the European Commission’s Digital Skills and Jobs Coalition


This month Palo Alto Networks proudly joined the European Commission’s Digital Skills and Jobs Coalition. This coalition brings together European Union (EU) member states, companies, social partners, non-profit organisations and education providers, all of whom are taking action to boost digital skills in Europe. Members of the coalition have endorsed its objectives and principles: to build strong … Continue reading

CrashOverride/Industroyer: Protections for Palo Alto Networks Customers


This week, the Industrial Control System (ICS) community was again abuzz after reports of a new ICS-specific malware researchers are calling CrashOverride or Industroyer. Several reports indicate that CrashOverride or Industroyer could be the tool used in the December 17, 2016 power outage in the Ukraine. It’s imperative that ICS/SCADA environments adopt next-generation cybersecurity capabilities to prevent … Continue reading

Collaborating with Girl Scouts of the USA for First-Ever National Cybersecurity Badges!


Professionals of the future will contend with cybersecurity challenges unprecedented in scope and sophistication. Girl Scouts of the USA and Palo Alto Networks recognize that we all must work together to solve these challenges by creating the innovative cybersecurity problem solvers of tomorrow, which means educating today. Building interest in STEM at a young age … Continue reading

Announcing GlobalProtect Cloud Service: Consistent Protection Delivered to Remote Networks and Mobile Users


Today at Ignite 2017 in Vancouver, we announced GlobalProtect cloud service, a new cloud-based security infrastructure managed by Palo Alto Networks that allows you to deploy consistent next-generation security to your remote networks and mobile users using Panorama management. The old ways of thinking about perimeter security are just that: old. Organizations often have many remote … Continue reading

Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework


At Palo Alto Networks, we strive to provide the most compelling security to our customers, delivered with the utmost consistency across the network, endpoint and cloud. We are trusted by more than 39,500 customers to protect their organizations, prevent cyberattacks, and help maintain trust in the digital age. Our decade-long journey was founded on two … Continue reading

The Power of Leading From the Front: Encouraging Industry-Wide Diversity and Inclusion


At Palo Alto Networks, we believe a diverse and inclusive culture with people of different backgrounds, thoughts and ideas is instrumental in finding the most creative and effective solutions to the toughest cybersecurity challenges organizations around the world face today. This belief is an essential underpinning to achieve our mission of protecting our way of … Continue reading

Cybersecurity Automation Squared: Security Automation × Network Automation


In cybersecurity, the concept of automation is provided in two distinct yet complementary areas: network automation and security automation. Network automation simplifies the workflow to deploy and manage security devices. Security automation provides the needed interactions and intelligence to learn, adapt and prevent successful attacks. There are times in service provider cybersecurity conversations when the … Continue reading

Traps Sniffs Out Ursnif Banking Trojan


Ursnif (a.k.a Gozi), the well-known banking Trojan, continues to target millions of users all around the world. Unit 42 recently published a breakdown of the distribution networks used to deploy banking Trojans like Ursnif, specifically targeting Japan and several European nations. With its malware analysis evasion techniques, Ursnif has proven difficult for traditional security tools to … Continue reading

The Cybersecurity Canon: Cybersecurity for Business Executives Toward an Era When Everything Is Connected


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon … Continue reading

A Dissection of the “EsteemAudit” Windows Remote Desktop Exploit


Summary In April, a group known as the “Shadow Brokers” released a cache of stolen information that included multiple tools to exploit vulnerabilities in various versions of Microsoft Windows. The most famous of these is an exploit tool called “EternalBlue” which was repurposed to spread the WanaCrypt0r ransomware/worm earlier this month. Another tool released in … Continue reading

Web Stats

  • 113,186 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,953 other followers

Twitter Updates

Archives

June 2017
M T W T F S S
« May    
 1234
567891011
12131415161718
19202122232425
2627282930