LiveWeek 2 Feb 2018

Community Team Member

THE EPIC CLOUD SECURITY EVENT

Join Us this Tuesday February 6 for the Epic Cloud Security Event!

It's on! Join us Tuesday for real-world success stories from cloud pioneers and global organizations in a candid, fast-paced and enlightening cloud conversation.

Read more...

 

Don't want to watch at your desk or from home alone? Come to a viewing party at a great city near you!

 

Epic Cloud Security Event Livestream Viewing Party Locations

Do you want to watch the Epic Cloud Security Event, but prefer to be with others you can interact with at the same time? Good news! We have 10 locations across the US and Canada for you to attend an exclusive livestream viewing party. 

Read more...

 

CLOUD SERVICES | PANORAMA IN AWS

New Cloud Service offerings! Part 3 of 3 - Panorama in AWS  

Last in our series of new cloud service offerings discusses Panorama in AWS. Click to read more and watch the video. Be sure to give us a thumbs up if you like it or if it helped answer a question or solve a problem for you.

 

BLOCK ATTACKS IN THEIR TRACKS

Magnifier Behavioural Analytics 

Quickly find and stop the stealthiest network threats with Magnifier. Analyze rich network, endpoint and cloud data with machine learning, Magnifier accurately identifies targeted attacks, malicious insiders and malware. Block attacks before the damage is done.

 

URL FILTERING

URL Filtering Test Pages

How do you test to see if your URL Filtering service is enforcing your organization’s policies for malicious and benign URLs properly? For benign categories, this is relatively straightforward, you simply visit the website and see if the designed policy is being logged and enforced. But what about the gray areas 

 

LIVE COMMUNITY ON YOUTUBE

#GetAnswers | YouTube

JOIN US!

Live Community YouTube channel

 

LIVE COMMUNITY ON TWITTER

#GetAnswers | Twitter

Check out our Live Community Twitter, and follow us for all the latest.

 

AROUND PALO ALTO NETWORKS

 Tweets 

LinkedIn/Facebook/Google+ Posts              

  • Unit 42’s continued look into OilRig reveals the use of an Internet Information Services backdoor deployed on Middle East government-owned webservers http://bit.ly/2EuRbs0
  • Highlights from Davos: how executives should approach cybersecurity traininghttp://bit.ly/2E0rpxU
  • Fourth on Palo Alto Networks list of critical mistakes to avoid when purchasing a new NGFW is not accounting for ease of integration and scalability. Learn how to avoid this mistake http://bit.ly/2nqTuEe
  • Unit 42 tracks a series of attacks that use a remote backdoor malware family named #Comnie. Dig into the research: http://bit.ly/2nouzlw 

Cybersecurity Canon

Education

Thought Leadership

Next-generation Firewall

Unit 42

 

THANKS TO ALL OUR CONTRIBUTORS!

 

Till next time--

Gail

@editeur

6,365 Views
Ask Questions Get Answers Join the Live Community
Labels