Here’s a brief recap on all the happenings at Palo Alto Networks from the past week.
We added to our 2016 Cybersecurity Predictions series:
Ignite 2016 is only a few months away! Want to attend? Register before December 31 for $400 off your conference pass. Want to take the stage? The Call for Papers is open! Submit today.
In Part 3 of the Adversaries and Their Motivations blog series, Unit 42 explored the top-level actor motivations: Cyber Warfare, Cyber Terrorism, and Cyber Mischief.
Catch up on Part 1: The underlying concepts and the value proposition for exploring who is attacking a network and why; and Part 2: Cyber Espionage, Cyber Crime, and Cyber Hacktivism.
Unit 42 analyzed the Rootnik android trojan that abuses commercial rooting tool and steals private information.
Del Rodillas detailed the Security Lifecycle Report, a free assessment Palo Alto Networks offers as a way to provide users a detailed view of what applications and risks may be running in their industrial control systems (ICS) environment.
In Part 1 of Exploitation Demystified, Yiftach Keshet laid the foundation of memory corruption exploitation, and presented the basic exploitation framework. In Part 2, he covered the implementation of Overwrite and Redirect in the context of stack based buffer overflow vulnerabilities. Stay tuned for Part 3, where Yiftach will go over implementation of the exploitation framework on heap-based vulnerabilities.
Kate Taylor shared a few tips and tricks on ways to combine and use features on our platform to help our customers better secure their organizations.
Brian Kelly explained why "Metasploit: The Penetration Tester’s Guide" is worthy of inclusion in the Cybersecurity Canon.
Looking for our latest channel-specific news? We rounded up all of the recent NextWave Partner news in this week's Channel Scoop.
A reminder, it’s your last chance to register for this month's Spark User Summits in Sydney, Amsterdam, and Boston.
Here are upcoming events around the world that you should know about:
Palo Alto Networks and Tanium VIP Reception
TechSummit Japan 2015 Winter [Japanese]
Introduction to Palo Alto Networks Next Generation Firewalls
Secure the Force: Star Wars y los ciber-ataques más usados en el 2015 [Spanish]
Seguridad en el data center con Palo Alto Networks & VMware [Spanish]
12月11日(金)製品実感トレーニング(大阪) [Japanese]
Why Layered Security Strategies Don’t Work – And What You Can Do About It
Palo Alto Networks & Tanium: Webinar Malicious Behavior Detection at Scale
12月16日(水)製品導入・運用支援トレーニング [Japanese]
Threat Prevention Ultimate Test Drive
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.