Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 9931

Engine error after reboot

My Minemeld system is failing to start, giving an engine error. The last it,e in the log is   2017-11-18T17:38:06 (2843)launcher._run_chassis ERROR: Exception in chassis main procedure Traceback (most recent call last): File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/run/launcher.py", line 53, in _run_chassis c.configure(fts) File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/chassis.py", line 102, in configure config=ftconfig.get('config', {}) File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/ft/__init__.py", line

deanm,
  • 0
  • 0

Logs Retention on MineMeld

Hello,   I want to change the log retention on MineMeld. It looks that the default configuration is 7 days. I was not able to find where to change this parameter. Can you please help?

alyssonalmeida,
  • 0
  • 0

Not all SSL traffic is being decrypted

I configured the firewall to decrypt outbound SSL traffic and installed a local cert I created onto my broswer. When I monitor my port 443 traffic I see some of  it is decrypted and some of it isnt. Is this normal behavior? I thought it was suppose to decrypt all

wrainwater,
  • 0
  • 2

Ignite 2017 Open Seats: Compliance Best Practices for DevOps

To get you ready for the premier security conference of the year, we’ll be spotlighting our top session each day on the blog.

Anna Lough,
  • 0
  • 0

Make ‘Cyber Prep’ A Part of Doing Business

You’d think that the last thing any company would want, when it has suffered a disruptive data breach, is to compound the problem. So why are so many companies doing just that, with sub-par cyber-incident response? One of the main reasons is that many are still treating cyber risk as a technology issue, when it is actually a business issue....

Sean Duca,
  • 0
  • 0

Channel Scoop: November 17, 2017

Dig into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 0
  • 0

How to block a specific file with hash value?

Hi Guys, I am using a pair of PA820 with TP, URL Scan and WF. I received a list of hash values from my Authority but couldn't find any hits on VirusTotal. Without doubting my big boss, I wanted to manually block it in the firewall but could not find

BEASG-IT,
  • 0
  • 1

Middle East 'MuddyWater' Attacks Difficult to Clear Up

Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week. Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date

  • 0
  • 26

MineMeld - Office 365 - How can I disable miners?

I am working on Office 365 control and I have discovered that MineMeld seems to be the best way to do this.  To that end, I have set up a MineMeld server and imported the PAN-provided script for Office 365.   There are some Office 365 features that we do

scottsander,
  • 0
  • 1

Self-Inflicted AWS Auto Scaling Failures

In AWS, the auto scaling process can fail for multiple reasons. Sometimes the cause for failure can actually be self inflicted. In this article, we will discuss some self inflicted causes for auto scaling failures in AWS. We will also discuss how to avoid these self inflicted failures by following

jperry1,
  • 0
  • 1

A Rocket Scientist Hacks the Cybersecurity Labor Crisis

You don’t have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021. Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now CEO of Girl Scouts of the United States...

  • 0
  • 3

Guest Post: Doing Multifactor Authentication the PCI Way

Guest post by David Mundhenk and Ben Rothke on doing multifactor authentication the PCI way.

David MundhenkBen Rothke,
  • 0
  • 0

2018 Predictions & Recommendations: Cyber Hygiene for Financial Institutions Found Non-Compliant with SWIFT Mandatory Security Controls

2018 predictions & recommendations: cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls.

Lawrence Chin,
  • 0
  • 1

Creating a lab to test ICS/SCADA protocols

Introduction Organizations with industrial control systems (ICS) have been on a path to secure the border between IT (corporate network) and OT (ICS network) for some time. The first step for many was to provide simple segmentation between the two networks using firewalls from Palo Alto Networks. This satisfied initial

kwall00,
  • 0
  • 0

Feed from Soltra Edge Feed

Hello,    I am having some trouble pulling a feed from a Soltra Edge (NH-ISAC) into a local minemeld instance and I am not entirely sure how to go about troubleshooting it since the visibile errors with the minemeld console are a unfamiliar to me.    Based on what I've

David.Heath,
  • 0
  • 0

Bridging the Miles: 1,000 Special Ops Teddy Bears En Route to U.S. Military Active Duty Families

Palo Alto Networks volunteers help assemble 1,000 special ops teddy bears to U.S. military active duty families.

Adrienne Alesandro,
  • 0
  • 0

Hiring Women Is One of the Ways to Fill the Cybersecurity Shortfall

Top-quality cybersecurity workers are in high demand. According to the ISACA, a non-profit information security advocacy group, there will be two million cybersecurity professional jobs unfilled globally by 2019. Your security teams are already affected by this situation. Go ask your security leaders how easy it is to fill an open cybersecurity position with qualified personnel today. You will be...

Rick Howard,
  • 0
  • 0

Cybersecurity and Human Factors: Why Cybersecurity Is a Human Issue Rather Than a Technical Problem

Mihoko Matsubara shares insight into why cybersecurity is a human issue rather than a technical problem.

Mihoko Matsubara,
  • 0
  • 5

Businesses Are Going Through a Rough Patch

Today, software is embedded in virtually every machine, device, and system. It drives enterprise performance, and it delivers faster and better ways to manage tasks and processes. Yet there’s a dark side to all that code: It also introduces risk. Breaches often result because hackers and attackers take advantage of code vulnerabilities. Consequently, software patching has emerged as a crucial...

Sam Greengard,
  • 0
  • 0

Japan’s New Cybersecurity Strategies Have the Right Priorities in Mind

Mihoko Matsubara shares why Japan’s new cybersecurity strategies have the right priorities in mind.

Mihoko Matsubara,
  • 0
  • 4

Muddying the Water: Targeted Attacks in the Middle East

Unit 42 discovers MuddyWater, a threat group targeting entities in the Middle East and beyond.

Tom Lancaster,
  • 0
  • 4

Advanced Endpoint Protection Protects You From Dated Antivirus

Despite attempts to pivot from outdated security methodologies, traditional antivirus (AV) continues to fail to prevent security breaches on endpoints.

  • 0
  • 28

New AutoFocus and Aperture features - November 2017

Joe Delio here from the Live Community team, bringing you the latest features that have recently been released! We will be talking about the latest features included with AutoFocus 2.0.2 and Aperture release 24.   New AutoFocus 2.0.2 features: New Widgets to Visualize Sample Verdicts and Sources: AutoFocus has added 2

jdelio,
  • 0
  • 1

NHS IT Managers Cite Prioritizing Cybersecurity as Essential to Improving Patient Trust and Care

Palo Alto Networks® (NYSE: PANW), the next-generation security company, has today released findings of independent research into the state of cybersecurity within the United Kingdom’s National Health Service (NHS).

LONDON
  • 0
  • 49

The Top 12 Hybrid Cloud Security Threats

Using a multiple-cloud architecture calls for a hybrid cloud security mindset, which tends to focus less on network security in favor of securing data wherever it may be. RightScale’s “2017 State of the Cloud” survey describes hybrid cloud as the preferred enterprise strategy, with 67 percent of the respondents using it. The interesting trend is that there is movement away from...

  • 0
  • 2

How Are ATMs Exploited? An Update on ATM Malware Methods

How simple life was three years ago when we last wrote about ATM malware. Back then, security researchers classified ATM attacks into two broad categories: ones that used skimming hardware devices attached to the outside of card readers, and ones that used various techniques to open ATMs’ cabinets and cash drawers. The skimmers were crude but effective in collecting credit and...

  • 0
  • 1

What Is Cybersecurity?

Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. According to Forbes, the global cybersecurity market is expected to reach 170 billion by 2020, fueled by an array of technology trends. This article identifies these trends and discusses why cybersecurity is a requirement to protect our digital way of life, as well as how to maintain effective cybersecurity to prevent successful breaches.

  • 0
  • 16

Ubuntu 16.04 LTS support for Minemeld

Hi @lmori,   Is there any support for Ubuntu 16.04 or later? Or is Minemeld still only supported on 14.04?   Thanks!   Regards, Bo

borising_,
  • 0
  • 2

The CyberWire Daily Podcast 11.13.17

Rick Howard from Palo Alto Networks discusses network defender best practices including Vendor in Depth and Best of Breed.

  • 0
  • 39

A rocket scientist hacks the cybersecurity labor crisis

You don't have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021. Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now president of Girl Scouts of the United States of America, has partnered with Palo Alto Networks on a stroke of genius: training young girls on cybersecurity.

  • 0
  • 40
Displaying 1 to 30 of 9931