Palo Alto Networks

This category contains 568 posts

PAN-OS 8.0: Three New Features in Panorama That Will Make Your Job Easier

Network security management tools should make your life easier. Panorama network security management is intelligent, fast, and plugs into your security ecosystem via application programming interfaces (APIs). It does the heavy lifting of correlating indicators of compromise across millions of log lines obtained from next-generation firewalls and endpoints; takes automated actions that you have pre-programmed; … Continue reading

PAN-OS 8.0: Thinking Beyond the Point Channel Strategy

When we launched PAN-OS 8.0 on February 7 (watch replay), it was more than just the largest release in Palo Alto Networks history. It solidified our channel strategy to think beyond the point – beyond point products and beyond the initial customer pain point. Success as a channel partner in the security market has evolved … Continue reading

The Cyber Threat Alliance: How Far We’ve Come and Where We’re Going

In 2015, I published a blog post about the completion of a 90-day proof-of-concept experiment, called Project Redstone. The experiment, conducted by the Cyber Threat Alliance (CTA), tested the theory that, if cybersecurity vendors collaborated in their efforts to combat cyberattacks, they’d be more effective as a group than as individual companies. In that post, … Continue reading

PAN-OS 8.0: Empowering the Financial Sector to Prevent Advanced Threats

Our recently released PAN-OS 8.0 offers scalable prevention through automation, speed and accuracy. It builds on the powerful capabilities of the Palo Alto Networks Next-Generation Security Platform and empowers financial institutions to prevent today’s advanced threats with better integration and information sharing across the network, endpoints and cloud. This is achieved through automated workflows and … Continue reading

Cyber Threat Alliance Expands: Working Together to Prevent Cyber Breaches

Yesterday, I stepped on a stage in San Francisco with CEOs and leaders from five other cybersecurity companies – Check Point, Cisco, Fortinet, Intel Security and Symantec – to announce the revamped, bigger and now-independent Cyber Threat Alliance. Normally, we are competitors. However, the Cyber Threat Alliance brings us all together in good faith to … Continue reading

PAN-OS 8.0: Protecting Industrial Automation and Control Systems by Securing the Network

Our recent announcement of PAN-OS 8.0 provides scalable prevention through automation, speed and accuracy – three areas by which all cybersecurity deployments should be measured. Traditional security implementations require too much manual intervention, fail to stop attacks in time, and hinder business with numerous false positives. To address these shortcomings, Palo Alto Networks spearheaded the … Continue reading

Unique Office Loader Deploying Multiple Malware Families

Palo Alto Networks has recently analyzed a unique loader for Microsoft Office that leverages malicious macros that is being used to deploy numerous malware families. The loader was originally witnessed in early December of 2016, and over 650 unique samples have been observed since then. These samples account for 12,000 malicious sessions targeting numerous industries. … Continue reading

StegBaus: Because Sometimes XOR Just Isn’t Enough

This past week, our team has identified a group of malware samples that matched behavioral heuristics for multiple known malware families.  These samples all displayed their typical respective malware characteristics and contacted known command and control (C2) servers from those families. However, initial static analysis revealed that all of these samples appear to be identical … Continue reading

PAN-OS 8.0: New Non-IP Protocol Control Feature Secures ICS Layer-2 Networks

A key reason for the growing adoption of our Next-Generation Firewall within OT environments is our App-ID technology, which enables Layer-7 visibility and control over many ICS/SCADA protocols and applications, both standards-based and vendor-specific.  Furthermore, through App-ID decoders, users can create dozens of command- and/or function- level custom App-IDs to bring even deeper insight and … Continue reading

Exploring the Cybercrime Underground: Part 4 – Darknet Markets

Introduction Parts 1, 2 and 3 of our Cybercrime Underground the cybercrime series discussed some of the concepts and definitions around cybercrime, and how cybercriminals collaborate in cybercrime forums in buying and selling malicious tools and services. This latest report in our cybercrime series will provide a glimpse of the darknet markets where cybercriminals buy … Continue reading

Web Stats

  • 104,546 hits


@PhilipHungCao, SACS, CISM, CASP, CCSP, CCSK, CIW-WSP, PCNSE7, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years experience in ICT industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,614 other followers

Twitter Updates


February 2017
« Jan