Blog

Mar 23, 2016 By Andrey Zhuk In Blog

Palo Alto NGFW & VMware NSX Integration- Use Cases Highlight Security Benefits

Everyone in IT has heard how Software Defined Networking (SDN) will change our world and that now, thanks to VMware and VMware’s NSX SDN solution, the Software Defined Data Center (SDDC) has become a reality. Of course, once you enter SDDC world, you have a new set of challenges: Lack of visibility into East-West (VM-to-VM) traffic Manual,...

Read More

Mar 09, 2016 By Jean-Paul Bergeaux In Blog

Today’s Hackers are High Tech Conmen. Plan Your Security Strategy Accordingly.

Today’s security strategies are predicated on attacks being technology based. Even after dismissing perimeter defense as passé, vendors point to end-point defense, east/west containers, internal network defense, catching Indicators of Compromise (IoCs) early, pitting our technological defenses against the hackers.  In fact, a key factor for...

Read More

Feb 24, 2016 By Andrey Zhuk In Blog

What to look for in a Next Generation Firewall (NGFW)

Your legacy Cisco ASA firewalls are nearing the end of life (EOL) and so now your boss has tasked you with selecting a new firewall solution. You’ve heard that the Next Generation Firewall (NGFW) is the next big thing when it comes to protecting network perimeters, but you really don’t know a lot about it. Where do you start? What do you...

Read More

Feb 10, 2016 By Andrey Zhuk In Blog

Advanced Persistent Threat (APT) – Revisiting the Definition

In today’s connected world, we hear a lot of talk about advanced persistent threats (APTs). In fact, the term “APT” is thrown around so often that many people have forgotten what it means. They just know it is something bad, relates to computers, and may be caused by a nation state. So I think it will be useful to revisit the definition...

Read More

Jan 28, 2016 By Jean-Paul Bergeaux In Blog

Your security infrastructure doesn’t cover mobile use

For many workers, a laptop is essential for them to be productive when away from the office. They take their laptops on travel. They bring them home in the evenings and on weekends, perhaps to catch up on work or be on call to handle emergencies.  A new report by CYREN highlights how attackers are using the habits of remote and mobile workers...

Read More

Dec 22, 2015 By Brian Reynolds In Blog

‘Tis to the Season: Give Your Family the Gift of Security

The holidays are upon us.  It really is the most wonderful time of the year.  I don’t know about you, but I for one love giving gifts, especially to my children and other family members.  Nothing is more thrilling than watching their excitement. I still remember the birthday dinner for my oldest son when he turned 13 years old and got his...

Read More

Dec 09, 2015 By Jean-Paul Bergeaux In Blog

Solutions for Endpoint Problems: Digging into MeriTalk’s Federal Survey

Palo Alto Networks has been working hard to solve agencies’ endpoint problems with Traps™, its new next-generation endpoint product.  It’s a good product to look at. Recently, the Palo Alto Public Sector team hired MeriTalk to survey federal managers and employees and produce a report on endpoint security.  The report offers some...

Read More

Dec 02, 2015 By Brian Reynolds In Blog

OPM Information Breach - "Fed Up!"

I recently received a USPS-delivered “official business” letter from the US Office of Personnel Management regarding last summer’s cyber security breach at the agency. The letter began, “As you may know, the Office of Personnel Management (OPM) was the target of a malicious cyber intrusion carried out against the US Government, which...

Read More

Nov 19, 2015 By Andrey Zhuk In Blog

Translating the NIST Cybersecurity Framework into Practice

If you are an IT professional, you undoubtedly have heard of the NIST Cybersecurity Framework. And if you are an IT professional in the federal government, you have probably been in meetings with upper management discussing what the NIST Cybersecurity Framework guidance means for your agency. The problem that most technical folks have with...

Read More

Nov 10, 2015 By Jean-Paul Bergeaux In Blog

How Phishing Sites Use ‘Reverse Proxies’ and Why You Should be Worried About It

Many IT savvy folks are too careful to get caught by phishing Emails, but most also believe that even if they do get caught, they would never fall for a phishing site.  Paying close attention to the details will protect them. Not so fast. The cyber-criminal and cyber-espionage groups have gone high tech and are now using Application Delivery...

Read More