Don’t Forget to Vote for Palo Alto Networks!

posted by: on August 31, 2014 6:00 PM

filed in: Cybersecurity, Events
tagged: , , ,

EBA6A446-C190-439C-9DFB-A5B9FA842532[27]

We’re a finalist for five categories in this year’s Computing Security Awards, and the vote is decided by you! Head on over to the awards site if you’re in the mood to show us some love. …Continue reading


Palo Alto Networks News of the Week – August 29

posted by: on August 29, 2014 4:20 PM

filed in: Events, News of the Week
tagged: , ,

Here’s a roundup of this week’s top Palo Alto Networks news.

News of the Week

Following a recent study of apps in the Google Play Store, Unit 42 discusses several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking.

figure 1_google play …Continue reading


The Inversion for Security in the Internet of Things

posted by: on August 29, 2014 1:00 PM

filed in: Cybersecurity, Mobility
tagged: , , , , , ,

By and large, there’s been a lot of talk about the Internet of Things. So far, however, most of the focus concerns what happens when attackers sets their sights upon a device. These stories derive from the notion that many of these devices are potentially vulnerable and essentially unpatchable. Many network-connected devices have vulnerabilities that cannot be fixed easily. This became glaringly obvious with the growing awareness on the vulnerabilities found in SCADA devices, which led to the development of better sets of best practices for network segmentation and isolation as well as threat prevention against the vulnerabilities of these systems.

In recent months, a new narrative has taken shape on the Internet of Things, which stems from an inversion of the hypothesis above. Instead of thinking about how to protect against an attack on a network connected device, what can we do about the network connected devices that are doing the attacking? …Continue reading


Older posts →