• Home
    • Blog
    • Support
    • Live
  • Get Support
    • USA (ENGLISH)
    • AUSTRALIA (ENGLISH)
    • BRAZIL (PORTUGUÉS)
    • CANADA (ENGLISH)
    • CHINA (简体中文)
    • FRANCE (FRANÇAIS)
    • GERMANY (DEUTSCH)
    • INDIA (ENGLISH)
    • ITALY (ITALIANO)
    • JAPAN (日本語)
    • KOREA (한국어)
    • LATIN AMERICA (ESPAÑOL)
    • MEXICO (ESPAÑOL)
    • SINGAPORE (ENGLISH)
    • SPAIN (ESPAÑOL)
    • TAIWAN (繁體中文)
    • UK (ENGLISH)
  • Home
  • Blog
  • Support
  • Live
  • What We Do
  • Products
  • Services
  • Resources
  • Partners
  • Company
  • Get Support
  • EN [change]
Blog Home > October 2016
Joy Osborne, October 31, 2016
EDITION: Events

Palo Alto Networks Celebrates Women in Computing at Gra…

In late October over 15,000 women and 1,000 men in technology descended on Houston, Texas, to attend the Grace Hopper Celebration (GHC) 2016.  The Grace Hopper Celebration of Women in Computing is th …
3,854 (0)
Justin Hall
Justin Hall, October 29, 2016
EDITION: News of the Week

Palo Alto Networks News of the Week – October 29, 2016

Did you miss any of this week’s Palo Alto Networks action? Don’t worry, we’ve rounded up the top news right here. Lawrence Chin explained why ATMs need better protection from Malware. Mihoko Mat …
3,617 (0)
Nicola Burr
Nicola Burr, October 28, 2016
EDITION: Cybersecurity

The Cybersecurity Canon: The Psychology of Information …

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting h …
5,714 (0)
Robert Falcone
Robert Falcone, October 28, 2016
EDITION: Unit 42
Unit 42

PSA: Conference Invite used as a Lure by Operation Lotu…

Actors related to the Operation Lotus Blossom campaign continue their attack campaigns in the Asia Pacific region. It appears that these threat actors have begun using Palo Alto Networks upcoming Cybe …
17,696 (5)
Stephanie Johnson
Stephanie Johnson, October 26, 2016
EDITION: Cybersecurity

The Cybersecurity Download: User-Based Access Controls

Do you know who is accessing your network? To maintain a strong security posture and prevent successful cyber breaches, organizations should apply user-based access controls to identify and manage who …
3,701 (1)
Mihoko Matsubara
Mihoko Matsubara, October 25, 2016
EDITION: CIO/CISO, CSO Perspective
CSO Perspective

How Japanese Businesses Are Cultivating Cybersecurity P…

(This blog post is also available in Japanese.) There’s a shortage in Japan of both IT and cybersecurity professionals, and the country is in urgent need of human resources development. According to …
5,234 (0)
Anthony Kasza
Anthony Kasza and Esmid Idrizovic, October 25, 2016
EDITION: Unit 42
Unit 42

Houdini’s Magic Reappearance

Unit 42 has observed a new version of Hworm (or Houdini) being used within multiple attacks. This blog outlines technical details of this new Hworm version and documents an attack campaign making use …
10,872 (0)

Posts navigation

← Older posts

SUBSCRIBE TO NEWSLETTERS

company

  • Company
  • Careers
  • Sitemap
  • Report a Vulnerability

LEGAL NOTICES

  • Privacy
  • Terms of Use
  • Documents
  • GDPR Readiness

ACCOUNT

  • Manage Subscription

Trending Topics

  • Cloud Security: Top 3 Security Considerations
  • What is Cybersecurity?
  • Endpoint Protection
  • SaaS Security: A Next-Generation Platform Approach
  • Advanced Endpoint Protection Protects You From Dated Antivirus

© 2018 Palo Alto Networks, Inc. All rights reserved.

  • SALES > 866.320.4788
    • Request a Call Back
    • Find a local office
    • Find a partner
  • SEE A DEMO
    • Attend live webcast
    • Watch on-demand
    • Schedule meeting
    • Free threat assessment
  • TEST DRIVE FROM HOME