Rick Howard

Rick Howard

The Cybersecurity Canon – How to Measure Anything: Finding the Value of ‘Intangibles’ in Business
July 19, 2017
Threat Brief: Petya Ransomware
June 27, 2017
Collaborating with Girl Scouts of the USA for First-Ever National Cybersecurity Badges!
June 13, 2017
Why Directors Feel Inadequate in Terms of Cybersecurity and What They Can Do About It
May 18, 2017
Threat Brief: WanaCrypt0r– What We Know
May 16, 2017
And the 2017 Cybersecurity Canon Winners Are…
May 11, 2017
The 2017 Cybersecurity Canon Bracket Challenge: Vote Now for Round 5
April 10, 2017
The 2017 Cybersecurity Canon Bracket Challenge: Vote Now for Round 4
April 3, 2017
The 2017 Cybersecurity Canon Bracket Challenge: Vote Now for Round 3
March 27, 2017
The 2017 Cybersecurity Canon Bracket Challenge: Vote Now for Round 2
March 20, 2017
The 2017 Cybersecurity Canon Bracket Challenge: Vote Now for Round 1
March 13, 2017
The Cyber Threat Alliance: How Far We’ve Come and Where We’re Going
February 15, 2017
2017 Cybersecurity Predictions: Automation and Playbook Models Take On Key Roles in Threat Intelligence Sharing
December 29, 2016
The Cybersecurity Canon: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
October 21, 2016
Awkward Conversations About Cybersecurity (and How to Avoid Them)
October 13, 2016
The Cybersecurity Canon: The Cynja: Volume 1 and Code of the Cynja: Volume 2
August 22, 2016
Are the Security Issues Facing the Industrial IoT Over-Hyped?
August 10, 2016
Rick Howard Enters a Lion’s Den of Journalists
May 24, 2016
Rejoice! Eight New Books Inducted into the Cybersecurity Canon
April 5, 2016
Lessons from Cyber Storm V
March 23, 2016
THE POLLS ARE OPEN: VOTE FOR THE CYBERSECURITY CANON (Week 6)
March 21, 2016
The Polls Are Open: Vote for the Cybersecurity Canon (Week 5)
March 14, 2016
The Polls Are Open: Vote for the Cybersecurity Canon (Week 4)
March 7, 2016
First Principles for Network Defenders: A Unified Theory for Security Practitioners
March 3, 2016
The Polls Are Open: Vote for the Cybersecurity Canon (Week 3)
February 29, 2016
The Polls Are Open: Vote for the Cybersecurity Canon (Week 2)
February 22, 2016
The Polls Are Open: Vote For The Cybersecurity Canon (Week 1)
February 15, 2016
The Cybersecurity Canon: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers
January 18, 2016
Palo Alto Networks Honors Our Wounded Warriors at Army-Navy Football Game
December 16, 2015
CryptoWall 3, the Cyber Threat Alliance and the Future of Information Sharing
October 29, 2015
National Cyber Security Awareness Month: There Is Something New To Talk About
October 19, 2015
The Cybersecurity Canon: Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
July 16, 2015
Cybersecurity Canon 2016: Get Cracking On Your Reviews
July 1, 2015
NSS Labs Releases Latest Next-Generation IPS Report – Palo Alto Networks Achieves Superior Security Efficacy
April 20, 2015
Congratulations To This Year’s Cybersecurity Canon Honorees!
April 2, 2015
Attribution is Hard to Do – But Necessary to Evaluate Risk
March 17, 2015
White House Summit on Cybersecurity: What Happens Now?
February 24, 2015
Vote Now for The Cybersecurity Canon
February 1, 2015
Some Thoughts On Alan Turing and ‘The Imitation Game’
January 31, 2015
The Cybersecurity Canon: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
January 28, 2015
The Cybersecurity Canon: Inside Cyber Warfare: Mapping the Cyber Underworld
January 23, 2015
The Cybersecurity Canon: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
January 20, 2015
The Cybersecurity Canon: Winning As a CISO
January 12, 2015
The Cybersecurity Canon: Where Wizards Stay Up Late
December 11, 2014
The Cybersecurity Canon: Read Rick Howard’s First-Look Review of SPAM Nation by Brian Krebs
November 17, 2014
The Cybersecurity Canon: The Practice of Network Security Monitoring
November 10, 2014
How You Can Be Involved In the Cybersecurity Canon
November 3, 2014
When We Say Information Sharing, We Mean It: Symantec and McAfee Join Palo Alto Networks and Fortinet in Founding the Cyber Threat Alliance
September 8, 2014
The Cybersecurity Canon: Lexicon
August 27, 2014
The Cybersecurity Canon: No Place to Hide (Part 2)
July 16, 2014
The Cybersecurity Canon: No Place to Hide (Part 1)
July 15, 2014
How the Role of the CSO is Fundamentally Changing, Part 3
July 3, 2014
How the Role of the CSO is Fundamentally Changing, Part 2
July 2, 2014
How the Role of the CSO is Fundamentally Changing, Part 1
July 1, 2014
How Well Do You Understand Your Cyber Adversary? – Part 3
May 21, 2014
How Well Do You Understand Your Cyber Adversary? – Part 2
May 20, 2014
How Well Do You Understand Your Cyber Adversary? – Part 1
May 19, 2014
The Cybersecurity Canon: Secrets and Lies
May 8, 2014
8 Tips For Dealing With Heartbleed Right Now
April 12, 2014
Announcing Cybersecurity Canon Honors At Ignite 2014
April 2, 2014
The Cybersecurity Canon: The Girl With the Dragon Tattoo
March 26, 2014
What Our Cyvera and Morta Acquisitions Mean For Palo Alto Networks and You
March 24, 2014
The Cybersecurity Canon: Fatal System Error
February 20, 2014
The Cybersecurity Canon: Daemon and Freedom™
February 18, 2014
The Cybersecurity Canon: Kingpin
February 11, 2014
The Cybersecurity Canon: Worm
February 4, 2014
The Cybersecurity Canon: The Blue Nowhere
January 30, 2014
The Cybersecurity Canon: Reamde
January 28, 2014
Security Budgets: How To Get Your C-Suite’s Attention
January 27, 2014
The Cybersecurity Canon: Security Metrics
January 23, 2014
The Cybersecurity Canon: Breakpoint
January 21, 2014
The Cybersecurity Canon: Cyber War
January 15, 2014
The Cybersecurity Canon: Trojan Horse
January 14, 2014
The Cybersecurity Canon: Zero Day
January 9, 2014
The Cybersecurity Canon: Confront and Conceal
January 7, 2014
The Cybersecurity Canon: Snow Crash
January 2, 2014
The Cybersecurity Canon: Neuromancer
December 31, 2013
The Cybersecurity Canon: The CERT Guide To Insider Threats
December 26, 2013
The Cybersecurity Canon: The Cuckoo’s Egg
December 24, 2013
The Cybersecurity Canon: Cryptonomicon
December 19, 2013
The Cybersecurity Canon: We Are Anonymous
December 17, 2013
Introducing The Cybersecurity Canon: Books You Should Have Read
December 17, 2013

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS