Here’s a roundup of top Palo Alto Networks news from the last week in July.
Black Hat USA 2014 kicks off next week, and at the conference you’ll have the chance to meet team leads from Unit 42, our threat intelligence team. They will be available to take your questions and talk about our intelligence process. Here’s where you can find them. …Continue reading
In the coming weeks we’ll announce registration details for Ignite 2015, which returns to The Cosmopolitan in Las Vegas March 30-April 1, 2015. As the largest gathering of enterprise security experts in the world, it’s the place to talk about where we’re headed as an industry.
During the closing session of Ignite 2014, Lee Klarich, our senior vice president of product management, explained how so much of the current investment in cybersecurity technology supports a detection approach — in some cases long after the bad actors have done damage. …Continue reading
Whenever you use a mobile device, you probably aren’t far from a cellular or WiFi connection. The apps on mobile devices are geared to interact with a range of content on the Internet, so connectivity demands are high, and most people just don’t think about the connection they use, as long as they can get a connection.
This is concerning because network connections rarely, if ever, provide any additional safety measures to protect their device and data. Under these conditions, the only protection comes from the app itself. There are millions of apps out there and apparently a lot of trust that those apps have the right protection.
Today, many apps are assembled out of multiple sets of libraries, allowing the developer to focus on the core app functions while relying on other code to provide supporting capabilities. Advertising is one example where code libraries are commonly reused, because app developers can monetize apps that are free to the end user. We’ve noted the problem of security risks and privacy violations in third party libraries, and highlighted many previous examples here in the Research Center. But just exactly how extensive are the issues with app security?