Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 9529

Establish An Effective Security Posture In Next-Generation Mobile Networks

Mobile network operators need a new approach to security that will keep up with rapid network evolution and growing threats.

  • 0
  • 197

Rethink Network Availability

Mobile network operators are now facing new malware-based incidents that threaten network availability as well as subscriber confidentiality.

  • 1
  • 203

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.

  • 5
  • 387

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.

  • 2
  • 199

Aligning Cybersecurity With Business Goals: 5 Steps to Success

Cybersecurity oversight can be unsettling for C-suite executives and board members. The connection between the board room and those managing technical infrastructure is critical, yet C-suite executives or board members typically don’t have the skills or knowledge of the threat landscape or technologies involved in cybersecurity programs to flatten the management structure enough for top-to-bottom direct management. For the foreseeable...

Larry Jones,
  • 0
  • 2

Highlighting Japan-India Cybersecurity Cooperation in the “Confluence of the Two Seas”

CSO Japan Mihoko Matsubara highlights the cooperation of Japan and India as an example of global cybersecurity collaboration.

Mihoko Matsubara,
  • 0
  • 0

Analyzing the Various Layers of AgentTesla’s Packing

Palo Alto Networks Unit 42 analyzes the layers of AgentTesla's Packing.

Jeff White,
  • 0
  • 0

Palo Alto Networks News of the Week – September 23, 2017

Catch up on all the top Palo Alto Networks news of the week.

Justin Hall,
  • 0
  • 6

Detection off, Prevention on

Learn how Palo Alto Networks prevention strategy can help you to protect your enterprise.

  • 0
  • 3

LiveWeek 22 Sep 2017

NEW RELEASE: TRAPS 4.1 NEW!! Traps 4.1 - Expanded protection against ransomware @joboyd @jdelio Traps 4.1. continues to develop our innovative, multi-method prevention approach to endpoint security with a specific focus on preventing ransomware. New capabilities in Traps 4.1 monitor ransomware behavior and upon detection, shut down an attack and block new exploit

editeur,
  • 0
  • 0

Channel Scoop – September 22, 2017

Dig into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 0
  • 0

Extract Even More Value From Your Palo Alto Networks Environments at .conf2017

Extract even more value from your Palo Alto Networks environments at .conf2017

Lee Space,
  • 0
  • 3

DNS Signature generic:www.indocommco.com

Hi team,   This is false positive, please check: File Hash: - URL only Link to Virustotal report for the file: https://www.virustotal.com/#/url/1dfc3433bd62b0f90d67c55eddae355dcb2886a8f77d3542243e2dc326cbd584/detection Current VirustTotal Verdict: No engines detected this URL, 0/64 Description: Found in PANDB PAN-DB Categorization URL Category: indocommco.com <-> Business and Economy www.indocommco.com <-> Malware Unique Threat ID: 180875763 Create

MG,
  • 0
  • 3

proofpoint credentials in the node prototype

I created input, process and output nodes for proofpoint. Its asking me for proofpoint credentials.   Where we can put the proofpoint credentials in the node prototype?

Saadabdulmajeed,
  • 0
  • 1

Palo Alto Networks Opens Doors to Its New Santa Clara Headquarters

New Campus, Triple in Size, Offers Collaborative Workspaces for Thousands of Silicon Valley Employees

Santa Clara, CA
  • 0
  • 115

Welcoming the APAC WildFire Cloud

Announcing the APAC WildFire cloud, located in Singapore, which extends our regional cloud approach to cover Asia-Pacific, the European Union, Japan and North America.

Scott Simkin,
  • 0
  • 3

Head-to-Head Comparisons: PA-5000 Series vs. PA-5200 Series NGFWs

Palo Alto Networks continue to design new Next-Generation Firewall appliances to handle demanding throughput needs and help deliver the next generation of security capabilities anywhere in the network and enable businesses to deploy next-generation security in all locations.

  • 0
  • 22

Migrationtool disk size for AppID-Adoption

Hi, Guys,   Today we have a problem with MigrationTool when we use it for AppID-Adoption. We forward PA logs do MigrationTool server, but it was only 18GB disk space for /var/log. Even for small environments, it is very little storage.    To fix it today, we need root the

pauloraponi,
  • 0
  • 0

Palo Alto Networks Unveils APAC WildFire Cloud in Singapore

SINGAPORE, 21 September, 2017 -- Palo Alto Networks® (NYSE: PANW), the next-generation security company, today unveiled its APAC WildFire™ cloud, located in Singapore. The service allows customers in the region to benefit from Palo Alto Networks WildFire cloud-delivered threat analysis and prevention capabilities, while addressing customer’s data privacy concerns, via an APAC-based cloud. WildFire is now available with regional-specific clouds in Asia-Pacific (APAC), the European Union, Japan, and North America.

Singapore
  • 0
  • 107

Simplify PCI Compliance With Network Segmentation for airlines

PCI compliancy is mandatory for the airlines, the scope extends to all system components that are included in or connected to the Cardholder Data Environment (CDE).

  • 0
  • 6

Migration tool 3.3.15 Debug Error

I'm able to merge my configs but the file outputs are empty. I'm seeing this error in the debug logs and wondering if this may be the cause. Anyone else experiencing this?   [:error] [pid 5186] [client 192.168.32.1:29538] PHP Warning: scandir(../Templates): failed to open dir: No such file or directory

GeneGibson,
  • 0
  • 0

False Positive: Hamster Free Video Converter

I think this is a false positive. Only 1 other virus engine besides PA is saying it is bad.   File Hash: 0617c8c1be55ea923fbfef8d0a92957b8a753e47fb77d847d33778ae563e011c Link to Virustotal report: https://www.virustotal.com/#/file/0617c8c1be55ea923fbfef8d0a92957b8a753e47fb77d847d33778ae563e011c Current VirusTotal Verdict: PA says "generic.ml". Rising says "Malware.Undefined!8.C (CLOUD)" Description: This is the installer for "Hamster Free Video Convter". Basically a

amorrow,
  • 0
  • 0

Traps 4.1 - Expanded protection against ransomware

From Joel Boyd @joboyd   Traps 4.1 strengthens ransomware prevention by adding new capabilities that include monitoring for ransomware behavior and upon detection, shutting down an attack and blocking new exploit techniques leveraged during recent WannaCry and NotPetya attacks. This latest version also brings granular child process protection and DLL

jdelio,
  • 0
  • 1

Q1 FY18 NextWave Huddle Key Takeaways

Get our key takeaways from the Q1 FY18 NextWave Partner Huddle.

Ron Myers,
  • 0
  • 0

Global Study: The Meaning of Security in the 21st Century

The increasing volume, variety, and velocity of security threats are no longer solely an IT issue. Business leaders are keenly aware of the financial, operational, legal, and reputational challenges presented by both cyber security and physical security. Many enterprises—often led by forward-thinking C-suite executives and board members—are now getting out ahead of the curve to address the root causes of...

Security Roundtable Staff,
  • 0
  • 10

MineMeld export custom prototypes

Hey all, Can anybody tell me how we can export (and import) custom created prototypes (for backup purposes). The config does not include these, so if we need to rebuild the MineMeld instance we have an issue. Kind regards

mr.linus,
  • 0
  • 1

Traps Advanced Endpoint Protection Technology Overview

Most organizations deploy a number of security products to protect their endpoints, including one or more traditional antivirus solutions. Nevertheless, cyber breaches continue to increase in frequency, variety and sophistication. Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint. Palo Alto Networks® Traps™ advanced endpoint protection replaces traditional antivirus with a unique combination of the most effective, purpose-built, malware and exploit prevention methods that pre-emptively block known and unknown threats from compromising a system.

Santa Clara, CA
  • 4
  • 26591

Palo Alto Networks Strengthens Ransomware Prevention Capabilities With New Traps Advanced Endpoint Functionality

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced enhancements to its Traps™ advanced endpoint protection offering that strengthen current ransomware...

Santa Clara, CA
  • 1
  • 197

How to Block TOR

The Tor network disguises user identity by moving their data across different Tor servers, and encrypting that traffic so it isn't traced back to the user. Anyone who tries to trace would see traffic coming from random nodes on the Tor network, rather than the user's computer.    The following configurations

vsathiamoo,
  • 0
  • 3

3 Steps to Improving Cybercrime Prevention

  Cybercrime is a huge industry—in fact, it is one of the fastest growing industries in the world. By some estimates, cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion just a year ago. And, as in any industry, opportunity fuels more investment and innovation. The best way to get an industry to collapse...

Security Roundtable Staff,
  • 0
  • 3
Displaying 1 to 30 of 9529