System News
 1 2 3 4 next
Archived Palo Alto Networks News Articles
31 May 2017
open to premium members only
Palo Alto Networks Reports Fiscal Third Quarter 2017 Financial Results [63977]
Palo Alto Networks, May 31st 2017

Palo Alto Networks, the next-generation security company, announced financial results for its fiscal third quarter 2017 ended April 30, 2017.

Total revenue for the fiscal third quarter 2017 grew 25 percent year over year to $431.8 million, compared with total revenue of $345.8 million for the fiscal third quarter 2016. GAAP net loss for the fiscal third quarter 2017 was $60.9 million, or $0.67 per diluted share, compared with GAAP net loss of $64.1 million, or $0.73 per diluted share, for the fiscal third quarter 2016.
(Get More Information . .)

25 May 2017
open to premium members only
Ignite 2017 Open Seats: Migrating Data Center Security from Legacy to Cloud Architectures [63801]
Palo Alto Networks, May 25th 2017

Anna Lough blogs, "Ignite '17 Security Conference is right around the corner. To get you ready for the premier security conference of the year, we'll be spotlighting our top session each day on the blog. Register now, seats fill up quickly!

As data centers migrate from legacy architectures to Cloud and SDN, how do you embed security into the architecture? Doing so in greenfield data centers is straight-forward, but how do you approach it for a brownfield data center? What do you need to do to change your security architecture design so that it doesn't add complexity to the migration efforts? In this session, we will discuss in detail, security best practices being followed by organizations across the world as they migrate their brownfield data center deployments..."
(Get More Information . .)

18 May 2017
open to premium members only
Why Directors Feel Inadequate in Terms of Cybersecurity and What They Can Do About It [63574]
Palo Alto, May 18th 2017

The National Association of Corporate Directors says that directors do not feel adequate in terms of mitigating cybersecurity issues. The problem is that we have led ourselves to believe that cybersecurity risk is somehow different from all the other risks that directors deal with daily. This is incorrect. The same risk strategies apply: acceptance, avoidance, mitigation and/or transfer. The needed change is that directors must insist that their technical C-level executives transform technical risk into business risk.

The board needs to help them with this because many are not comfortable doing it. But once done, all that is left to do is for the board to learn and understand at a high level some of the technical issues involved in these strategies. Start with the Cybersecurity Canon Project: a collection of network defender-recommended books about all aspects of security. As a priority, read these three books first: "Navigating the Digital Age," "How to Measure Anything in Cybersecurity Risk," and "Measuring and Managing Information Risk: A FAIR Approach."
(Get More Information . .)

16 May 2017
open to premium members only
Threat Brief: WanaCrypt0r- What We Know [63573]
Palo Alto, May 16th 2017

Rick Howard blog, "This Unit 42 blog provides an update on the threat situation surrounding the WanaCrypt0r ransomware attacks and how the attack propagates.

Initial reports said that the WanaCrypt0r attack began as part of a spam/phishing campaign. Unit 42 and other researchers have concluded that these reports are not substantiated. While the initial attack vector for these attacks is unknown, it is certain that the spread of the ransomware occurs through active exploitation of the ETERNALBLUE vulnerability (CVE-2017-0144) in Microsoft Windows. Patches for this vulnerability for all supported versions of Windows have been available since March 2017. On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks..."
(Get More Information . .)

08 May 2017
open to premium members only
Verge Health Secures Protected Health Information on AWS Cloud With the Palo Alto Networks Next-Generation Security Platform [63353]
Palo Alto Networks, May 8th 2017

Palo Alto Networks, the next-generation security company, today announced that Verge Health - a global provider of software as a service (SaaS) solutions for healthcare governance, risk and compliance - has selected the Palo Alto Networks Next-Generation Security Platform to prevent cyberattacks targeting protected health information.

Verge Health's SaaS platform, Converge, is used by more than 900 hospitals to securely work with quality and patient safety data, while protecting caregivers and their organizations against errors, adverse events and policy violations. To do this, the company required an automated and integrated cybersecurity platform, optimized for Amazon Web Services and able to defend against threat actors in pursuit of highly coveted patient medical records and personal information. Due to the sensitive nature of this data, ensuring high availability of the security platform on AWS was a top priority.
(Get More Information . .)

13 Apr 2017
open to premium members only
Credential Theft: The Key to Shamoon 2 Data Destruction [62428]
Palo Alto Networks, April 13th 2017

Christopher Budd of Palo Alto Networks, writes in "The Cypher Brief", "The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full scope are two different things. The Shamoon 2 attacks targeting critical organizations across Saudi Arabia should serve as a clear demonstration about how significant the problem of credential theft is and how taking steps to prevent it can yield truly significant, tangible results in protecting against attacks.

For context, the Shamoon attacks of 2012 and the recent Shamoon 2 attacks of 2016 and 2017 are among the most noteworthy attacks in cybersecurity...
(Get More Information . .)

 
 1 2 3 4 next