Join Us for a New Series on Industrial Control Systems Security and IT-OT Integration

posted by: on September 17, 2014 4:00 PM

filed in: Cybersecurity, SCADA & ICS
tagged: , , ,

Join us on September 24th for the first of three webinars focused on Industrial Control Systems cybersecurity featuring our guest speaker and ICS cybersecurity expert and author, Joe Weiss, who is also Managing Director of ISA 99.

Throughout the series, we will have the opportunity to hear both IT and OT perspectives on various topics from risks in ICS, to what’s required for success, as well as some of the best practices and technologies which help to address the unique needs of control systems cybersecurity. …Continue reading

Palo Alto Networks at Cyber Endeavor 2014

For the past few weeks, Palo Alto Networks has been proud to play an important role in a pan-European military communications exercise, US European Command’s Combined Endeavor 2014. The Combined Endeavor exercise, hosted by US European Command in Germany, exercised C4 (command, control, communications and computer) systems to prepare NATO and Partnership for Peace militaries for multinational operations.

I was quite excited to see the role Palo Alto Networks products were playing in the broader Combined Endeavor exercise. Now that the exercise is complete, we will share more details in an upcoming post on the visibility to applications, content and users we provided on the mission network during this important exercise among the 17 NATO and 11 Partnership for Peace nations. For now, let me share my own perspective. …Continue reading

Visit Palo Alto Networks at Infosecurity The Netherlands!

posted by: on September 16, 2014 1:30 PM

filed in: Cybersecurity, Events
tagged: , ,

Palo Alto Networks returns to Infosecurity The Netherlands October 29-30 at Jaarbeurs Utrecht.


Visit us at Booth D115 throughout the conference and hear about threats hiding in plain sight on your network and all of the most important information from our 2014 Application Usage and Threat Report, including the intertwined relationship between cyberattacks and applications and the role of SSL in malicious activity.  …Continue reading

Older posts →