Here’s all of the top Palo Alto Networks news from this past week.
In a new study released this week, Palo Alto Networks partnered with the Ponemon Institute to understand not only what motivates cyberattackers but also how we can turn the tables on them by taking away their financial incentives to attack.
Did Operation Lotus Blossom cause Emissary Trojan Changelog to evolve? Unit 42 investigated Emissary Trojan Changelog and addressed this question.
The team also found T9000, an advanced modular backdoor that uses complex anti-analysis techniques.
Greg Day, VP & CSO, EMEA, discussed the growing role of cyber insurance.
Robert Clark reviewed "Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell" for the Cybersecurity Canon.
The Technical Documentations team released new Traps 3.3.1 documentation.
Del Rodillas and Bryan Lee discussed why power grid security is top of mind in 2016.
Ignite is coming up soon. Find out what’s new at this year’s conference, and watch this video to find out why you don’t want miss it:
Read this week's NextWave Partner Channel Scoop.
Here are upcoming events around the world that you should know about:
Virtual Ultimate Test Drive: Next Generation Firewall
Threat Prevention Ultimate Test Drive
Meet the CMO & Corporate Officer of Palo Alto Networks, René Bonvanie
Meet the CMO & Corporate Officer of Palo Alto Networks, René Bonvanie
Palo Alto Networks Data Center Security Webinar - Middle East
Meet the CMO & Corporate Officer of Palo Alto Networks, René Bonvanie
Palo Alto Networks - VMware Ortak Web Semineri
Virtual Ultimate Test Drive NGFW, Feb 11, 2016
Threat Prevention Ultimate Test Drive
Virtual Ultimate Test Drive Threat Prevention, Feb 12, 2016
Virtual Ultimate Test Drive: Next Generation Firewall
Virtual Ultimate Test Drive Threat Prevention, Feb 16, 2016
Advanced Endpoint Protection, A Traps Tutorial
Virtual Ultimate Test Drive VDC Feb 17, 2016
Scarlet Mimic: Unit 42 Reveals Cyber Espionage Campaign
Virtual Ultimate Test Drive NGFW Feb 18, 2016
Virtual Ultimate Test Drive Threat Prevention Feb 19, 2016
Tackle Your Toughest Security Challenges at Ignite 2016
The Cyber Attack Lifecycle in Government
Cybersecurity for Financial Services Industry
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.