Matt Keil

Matt Keil

Announcing GlobalProtect Cloud Service: Consistent Protection Delivered to Remote Networks and Mobile Users
June 13, 2017
Reasons to Attend Ignite ’17: An AWS and Microsoft Azure Focus
May 9, 2017
VM-Series Support for Azure Government
May 8, 2017
Palo Alto Networks Receives 2016 Google Cloud Global Partner Award for Solution Innovation
March 24, 2017
PAN-OS 8.0: Accelerating Large-Scale, Multi-Cloud Deployments
February 15, 2017
Cloud First, Now What?
January 11, 2017
2017 Cybersecurity Predictions: Machine Learning and AI-Driven Frameworks Shape Cloud Security
December 12, 2016
AWS Auto Scaling Integration- Another Problem Solved Through Innovation
September 30, 2016
Experience our Prevention Architecture at Microsoft Ignite
September 22, 2016
VM-Series for AWS GovCloud: Securely Enabling “Cloud First” for Government Agencies
May 18, 2016
How to Achieve PCI Compliance in AWS
April 27, 2016
Available Now: March Madness Custom App-IDs
March 17, 2016
The Best of Both Worlds: Building a Secure Hybrid Data Center with AWS
February 10, 2016
Do Organizational Changes Improve Cloud Security?
December 22, 2015
2016 Prediction #3: Public Cloud Security Moves Into the Spotlight
November 23, 2015
AWS re:Invent Recap: WAFs Protect Web Applications, We Protect Networks
October 15, 2015
AWS re:Invent is Coming – Swing By and See Us!
September 30, 2015
VMworld: Want to See a Wicked Cool Customer Use Case?
August 28, 2015
Test Drive Our Next-generation Firewall for Amazon Web Services
July 29, 2015
Now Available: On-Demand Next-generation Firewall for Amazon Web Services
June 30, 2015
A Wicked Cool Palo Alto Networks Feature That Not Everyone Knows About
May 11, 2015
Data Breach Frequency Doesn’t Have to Slow Cloud Computing Momentum
March 2, 2015
Palo Alto Networks: Solving Government’s Data Center Security Challenges
February 3, 2015
Here’s How We Move Performance Testing Forward
January 21, 2015
2015 Predictions: Datacenter
December 5, 2014
Bringing a Semblance of Order to Policy Chaos
November 4, 2014
Are Cyberlockers Making Money on Your Network?
October 8, 2014
Channeling World Cup Passion Into Smart Security
June 11, 2014
Attackers Are Hiding In Plain Sight On Your Network
June 2, 2014
Palo Alto Networks Once Again A Gartner Magic Quadrant Leader
April 18, 2014
It’s That Time Again: New App-IDs for March Madness
March 19, 2014
The PA-7050: What It Really Means
February 10, 2014
2014 Predictions: Firewall
December 6, 2013
Variations on a Theme
March 10, 2013
Applications and Threats – Analyzed Together for the First Time.
February 21, 2013
App-ID Cache Pollution Update
January 1, 2013
App-ID Cache Pollution: Merry Christmas From Check Point
December 28, 2012
User Beware: Cyber Criminals Know You Use Remote Access Tools
August 2, 2012
Policy Exception 2.0
July 3, 2012
Watch Out Corporate Networks, Here Come the Olympics!
June 27, 2012
Workers of the World Unite (and be Social)
January 26, 2012
Browser-based Filesharing Usage: Work or Entertainment?
January 18, 2012
“Active” Social Networking Up 300%; Twitter Skyrockets 700%
January 17, 2012
Dropbox and iCloud: David vs Goliath?
December 22, 2011
Another Chrome Feature; A New Hole in Your Firewall?
October 12, 2011
Industry First Next-Generation Firewall Review: Palo Alto Networks Achieves Short List Status
August 29, 2011
Streaming Audio: An Enabling Tool or Productivity Drain?
July 18, 2011
European Workers: More Social, But Not (Necessarily) Less Productive
June 3, 2011
Microsoft Hotmail Exploit Stealing Email – What’s the Exposure?
May 25, 2011
Hiding in Plain Sight: 41% of the Applications; 36% of the Bandwidth
May 12, 2011
Which is Riskier: Consumer Devices or the Applications In Use?
December 3, 2010
News Flash: Facebook Email is Already in Use!
November 14, 2010
Contrary to Popular Opinion, Webmail is Not Dead!
November 8, 2010
OMG! Facebook Users are Voyeurs!
October 28, 2010
Browser-based Filesharing: Next-Generation P2P?
October 21, 2010
App-ID and the Rule of All
September 21, 2010
Of Patience and Vigilance…
August 12, 2010
What’s Old is New…
June 30, 2010
Prepare for Soccer Hooliganism 2.0
June 11, 2010
Blocking is Only One Aspect of Control
April 21, 2010
The Battle Against Cyber Espionage 2.0
April 9, 2010
Tis the Season for Year-end Reports…
February 12, 2010
A Key Benefit of Next-Generation Firewalls: More Sleep
December 16, 2009
A Subtle Shift in File Sharing Usage
December 9, 2009
The Danger of Overreacting….
November 20, 2009
Application Usage & Risk Report: Fall 2009
November 6, 2009
Mariposa: How Exposed Are We?
November 1, 2009
Now More Than Ever.
October 20, 2009
Yikes – Employees Are Using Yoics!
October 1, 2009
Balancing the Risks and Benefits of Evasive Applications
September 8, 2009
Blocking Social Networking is an Exercise in Futility
August 21, 2009
Traffic Analysis: P2P Found 92% of the Time
July 30, 2009
IPv6 Threat – Real or Perceived?
July 22, 2009
The Case for Application Enablement
July 10, 2009
Seven Things You May Not Know About Microsoft SharePoint
July 1, 2009
Social Networking for Business Reasons…What About The Risks?
June 26, 2009
Applications are like dogs
June 16, 2009
Striking a Balance Between Control and Protection
May 29, 2009
Please Ignore That Sucking Sound…
May 22, 2009
Hulu Networks’ Battle Against External Proxies
May 12, 2009
Remote Desktop Control – Valuable Tool or Gaping Hole?
April 23, 2009
Real Data Does Not Lie – Existing Security Controls Are Failing
April 17, 2009
Security Loopholes in Google Docs – Is This Really a Surprise?
April 3, 2009
Marine One Blueprints found on P2P network
March 3, 2009
We’re Gonna Need A Bigger Boat…
March 1, 2009
Another Sign That The Application Landscape has Changed
February 23, 2009
A WAF Does Not Make You PCI Compliant
February 17, 2009
There is no such thing as a PCI Solution
February 13, 2009
Heartland Corporation: Malware Causes Largest Data Breach In History
January 21, 2009
The New Millennium – Unfettered Application for All?
November 24, 2008
Tell Us Why 400% Growth is a Good Thing
November 6, 2008
An in the Cloud Smackdown?
November 3, 2008
Dogs and Cats Living Together?
October 14, 2008
Will the Olympics Be Any Fun for Network and Security Admins?
August 8, 2008
Maybe it’s the name change?
July 1, 2008
We will take over the digital world – resistance is futile
June 30, 2008
Online file transfer – the next P2P?
June 11, 2008
P2P Networks: A Treasure Trove of Data
April 15, 2008
What is this application and what should I do with it?
April 11, 2008
File Sharing Sites On the Rise
March 23, 2008
Taking a Page From the Google Playbook?
March 13, 2008
Be Afraid. Be Very, Very Afraid.
February 29, 2008
Once You Check In, You Can’t Check Out
February 15, 2008
Could it be Just a Matter of Time?
February 11, 2008
What’s Leaking Through Your Webmail Account?
February 6, 2008
When is Facebook Considered an Enterprise Application?
January 25, 2008
If It Works Here, It’ll Work Everywhere
January 13, 2008
A Deal With the Devil?
January 10, 2008
Web Site, Application or Both – Threats related to Facebook are Increasing
January 7, 2008
LimeWire Claims: We’re #1!
December 26, 2007
To Blog or Not to Blog
December 26, 2007
Do End Users Read the Privacy Statements?
December 11, 2007
Comcast wants to block BitTorrent… How about you?
November 28, 2007
Another Subtle Reminder on the Risks of P2P…
November 12, 2007
Another Large Enterprise Sees the Web 2.0 Light…
November 2, 2007
Can Users Be Trusted to Do the Right Thing?
October 26, 2007
P2P Strikes Again!
September 27, 2007
Meebo Adds File Sharing Service
September 20, 2007
Fake Tor Application Helps Storm Worm Spread
September 11, 2007
Is there an Elephant in the Room?
September 9, 2007
Yet Another Reason To Block P2P?
September 5, 2007
Web 2.0 Tools: Productivity Gain or Security Threat?
September 4, 2007
Google Desktop Can be a Wolf in Sheep’s Clothing
August 22, 2007
Create a Conscious Policy Around Web-based File Sharing
August 14, 2007
BitTorrent Releases Streaming Video Application
August 7, 2007
How to Ruin a Good Thing…
August 2, 2007
Social Networking Permeates the Enterprise
July 29, 2007
Let the Deployments Begin
July 20, 2007
Skinkers Announces Live TV Broadcasting via P2P
July 17, 2007
The First of Many Case Studies to Come…
July 16, 2007
Web 2.0 Executives Challenge IT Professionals
July 9, 2007
Web 2.0, Enterprise 2.0 and Security – Oh My!
July 4, 2007
Enterprises Held Hostage – The List of Demands Is Short…
June 29, 2007
Veoh Networks launches VeohTV
June 25, 2007
P2P Programs Share More Than Music
June 21, 2007
Employee Records Show Up In P2P Traffic
June 18, 2007

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS