Palo Alto Networks
Follow
56 Followers
Follow Palo Alto Networks on their other social channels!
About Us
Founded:
2005
Company Size:
5001-10000 employees
Company Type:
Public
Location:
Santa Clara, CA
Website:
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, custom ...
Read more
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Follow
Effective Cybersecurity Is Not Easy, but It Is Achievable
Reports about data leakages – even huge data leakages – are not headline news anymore because they happen so often. I am a positivist and don’t like to focus on security incidents, but the number of incidents, especially the repetition of these security incidents, make me doubt that organizations truly understand cybersecurity. It appears to me that organizations focus on the wrong things within the cybersecurity domain. What do I mean by this? Most organizations see cybersecur ...
Follow
Channel Scoop: December 14, 2018
Sit back, relax and enjoy this week’s Channel Scoop. Get in gear with multi-year. Qualify for an additional discount on a multi-year renewal focusing on PA-220, PA-800, PA-3200 and PA-5200 series product renewals. Work with your North America distribution team on a variety of financial options and other incentives for your customers. View the promotion details. Not-for-resale (NFR) discount. Did you know you can receive discounts on PA-820, PA-850, PA-3220, PA-5220, PA-5250 and T ...
Follow
Shamoon 3 Targets Oil and Gas Organization
Summary On December 10,  a new variant of the Disttrack malware was submitted to VirusTotal (SHA256:c3ab58b3154e5f5101ba74fccfd27a9ab445e41262cdf47e8cc3be7416a5904f) that shares a considerable amount of code with the Disttrack malware used in the Shamoon 2 attacks in 2016 and 2017 that we previously published here, here, and here. While we could not identify the impacted organization from the malware, today Saipem disclosed they were attacked. In previous attacks, we were able to determine ...
Follow
The Need for Endpoint Protection in Critical Infrastructure
As cyberattacks against ICS and SCADA systems become commonplace, the need for robust endpoint protection grows. The rapid growth of the internet, with its ever-increasing need for data, has made it almost mandatory that information be made available at all times. This gluttony of data results in the need for corporations to provide connections to devices within their process control networks without fully understanding the potential outcome of such actions. Reasons for the increase in attacks T ...
Follow
Threat Brief: Twelve Tips for the Holidays
This time every year, people all over the world get new devices. Regardless of what holiday(s) you may (or may not) celebrate, the end of the year is a time for people to give and receive some of the latest devices to come on to the market. Nothing spoils a new gadget more than having some kind of security or privacy problem related to it. After that, nothing spoils the fun and excitement of unboxing and playing with an exciting new device than trying to figure out what you need to do to use it ...
Follow
Cyberthreats in 2019: The Trends That Will Continue to Move Upward
When it comes to realistic predictions for the year ahead, my philosophy is simple: there are certain trends that research shows will continue to move upward. With that said, in 2019, I believe we are going to see:   1. More Attacks With the Eventual Goal of Cryptocurrency Mining We saw a huge uptick in this at the end of last year that continued throughout 2018. Cryptocurrency mining is the process through which currencies like bitcoin are created. The “mining” process involves ...
Follow
Dear Joohn: The Sofacy Group’s Global Campaign
    As alluded to in our previous blog regarding the Cannon tool, the Sofacy group (AKA Fancy Bear, APT28, STRONTIUM, Pawn Storm, Sednit) has persistently attacked various government and private organizations around the world from mid-October 2018 through mid-November 2018. The majority of targets were NATO-aligned nation states, although several former USSR nation states were also targeted. The attacks primarily deployed variants of the Zebrocy tool, which we have previously analyzed ...
Follow
Unit 42 Cloud Security Trends and Tips
The benefits for enterprises moving to the cloud are clear: greater flexibility, agility, scalability and cost savings. However, adopting public cloud infrastructure can also magnify security risks and compliance challenges. Today, we released the latest report from Unit 42, “Cloud Security Trends and Tips: Key Learning to Secure Your AWS, Azure and Google Cloud Environments.” In this report, Unit 42 looked at new and existing threats to cloud security from late-May through early-Sep ...
Follow
A Shared Commitment Towards Cloud Security: Expanding Our Partnership with Google Cloud
At Palo Alto Networks, we have always believed that more and more security services would be delivered from the cloud. It’s also become clear that to prevent threats, machine learning and artificial intelligence need to become a bigger part of security. Today, we announced steps we’re taking to help build on our original vision through an expanded partnership with Google as we continue to offer customers support across all major public clouds. This partnership will help us grow our c ...
Follow
Channel Scoop: December 7, 2018
Sit back, relax and enjoy this week’s Channel Scoop Don’t Panic Unit 42 Podcast Returns. The first podcast of Season 3 was just released. In each episode, a big topic in cybersecurity is selected and simplified to help you understand why you don’t need to panic. Become a follower. Read more. Differentiating Palo Alto Networks. View these resources and gain insight into how to land the next deal. If you can’t find what you need, contact your channel business manager. Partn ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel