Palo Alto Networks Showcases Leading Threat Research with Discovery of 5 Critical IE Vulnerabilities
Advanced Persistent Threats (APTs) and today’s sophisticated attackers require a deep understanding of how applications are actively exploited in the real world to compromise users and their networks. In order for attackers to exploit commonly used software, such as Microsoft Internet Explorer (IE), they must take advantage of vulnerabilities in the software itself. Once discovered, attackers can develop zero-day exploits against these vulnerabilities, which can bypass traditional security controls and carry the attack forward – escalating privileges, delivering malware, and much more. …Continue reading
Ignite 2014 is weeks away, and we’re offering you one more chance to get into the largest gathering of enterprise security experts in the world at a special discounted rate. See below for full details, including how to win $1,000 worth of #geeklove!
Today, I’m happy to announce an expanded social media presence for Palo Alto Networks government and public sector cybersecurity topics, including a new Twitter feed: @NGS_Gov.
Did you know that Palo Alto Networks serves government customers in over 70 countries across five continents? …Continue reading