World cup soccer is upon us and millions of people world wide will be clamoring for the latest updates on their favorite teams. In the US, the games are being streamed live by ESPN3, an easily accessible website that can deliver updates during common work hours. But the...
One of my colleagues recently observed that 2010 is the year when every firewall vendor jumps on the “application control” bandwagon and says they do what Palo Alto Networks does. Specifically identify and control applications. Firewall vendors are taking the path of le...
Whereas early social engineering efforts convinced someone to provide a password or other information via a convincing phone call or conversation, today’s social engineering efforts are fare more nefarious, as evidenced in great detail within the recently published repo...
One of my many roles as a founder and CTO is to meet with customers and talk about their network security issues. These visits are not only informative, they can be humorous as well. For example, a recent visit to a large, fortune 500 company, they told me that one of o...
There’s a great article on SearchEnterpriseWAN about a Palo Alto Networks customer. IDT spoke to SearchEnterpriseWAN about its experiences using next-generation firewalls from Palo Alto Networks, and discussed...
There is a somewhat erroneous assumption that the web provides anonymity – in particular when someone is posting a comment on an article. And then there is the old saying that knowledge is power. The challenge some people face is what to do with it. (more…)
Now more than ever, business and security teams need to align their business priorities. Case in point, highlighted by two recent articles on social networking use in the business world. The first article, published in eWeek UK, states that most CIOs are blocking (or trying to block) social networki...
We often use the term evasive as a means of describing how an application can bypass a traditional stateful inspection firewall. “Applications use tactics such as port hopping, non-standard ports, SSL encryptio...
This Mashable news article talks about how companies are blocking social networking sites. I would call this an exercise in futility. I say this because users will find a way. Social networking, along with IM,...
As some of you may have heard, Palo Alto Networks dropped an iPhone app late last week. We built it primarily so that our customers and partners could have an in-pocket version of our Applipedia, but there are a couple fun features in there too (e.g., access to this bl...
The most recent discovery of the first lady’s safe house (Laura Bush) and a detailed list of the civilian nuclear complex, including precise locations of weapons grade nuclear fuel follows closely on the heals...
This Network World article talks about the hidden threat posed by rogue IPv6 usage. To a certain extent, this is a bit of a red herring and here’s why. For IPv6 to traverse the corporate network, the routers, switches and infrastructure components need to (a) support IP...
What do LinkedIn, Twitter, Blogging and Wikis have in common? According to this article, they are increasingly used within enterprises with a quarter of organizations actually rolling out these types of tools across all departments, up from...
SharePoint is Microsoft’s collaboration tool that can be used to host web sites and provide access to shared workspaces, documents and specialized applications such as wikis and blogs. SharePoint sites are actu...
A recent survey assembled by RSA and IDG on the “hyper-extended enterprise” highlighted the challenges enterprises face as they move at light speed into the new applications landscape and two points stuck out. The first point was that enter...
Since we began shipping our firewall, we have heard from a small but vocal contingent that they should be allowed to do what they want at work. We see it in the comments on some of the articles about us and we...
This TechCrunch article outlines how Hulu Networks, the rapidly growing purveyor of streaming HD content, is taking some fairly extreme steps to make sure that their content is only accessed by users in the US....
Today’s post will cover several interesting tidbits of data about remote control products. The first tidbit comes from the recently released Verizon Data Breach Report which paints a detailed picture of how cyb...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.