Palo Alto Networks to Announce Fiscal Third Quarter 2022 Financial Results on Thursday, May 19, 2022

Palo Alto Networks to Announce Fiscal Third Quarter 2022 Financial Results on Thursday, May 19, 2022

SANTA CLARA, Calif., May 3, 2022 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal third quarter 2022, ending April 30, 2022, after U.S. markets close on Thursday, May 19, 2022. Palo Alto Networks will host a video webcast that day at 1:30 p.m. Pacific time (4:30 p.m. Eastern time) to discuss the results. A live video webcast will be accessible…

Read More

Arista CEO details supply chain woes, mulls price hike

Arista CEO details supply chain woes, mulls price hike

Like its competitors in the past few days Arista Networks spent a lot of its financial analysts call this week detailing the impact of the ongoing  supply chain problem and trying to find a light at the end of the tunnel. Arista, like competitors Juniper and Extreme, says it is doing well financially—quarterly revenues up 31.4% to $877.1 million from $667.5 year-over-year, a record for the company. But the supply chain issues are getting worse,…

Read More

Arista CEO details supply chain woes, mulls price hikes

Arista CEO details supply chain woes, mulls price hike

Like its competitors in the past few days Arista Networks spent a lot of its financial analysts call this week detailing the impact of the ongoing  supply chain problem and trying to find a light at the end of the tunnel. Arista, like competitors Juniper and Extreme, says it is doing well financially—quarterly revenues up 31.4% to $877.1 million from $667.5 year-over-year, a record for the company. But the supply chain issues are getting worse,…

Read More

Meet Jorge from Cisco’s partner marketing advocacy community

Meet Jorge from Cisco’s partner marketing advocacy community

Cisco’s partner relationships play an integral role in Cisco’s business, and we’re happy to spotlight Jorge Alanis, COO with Evox. Jorge is an active member in Cisco’s partner marketing advocacy community that helps professionals connect with each other, share best practices, and learn from peers. Hi, Jorge! I’m so excited to chat with you and learn more about your professional and personal journey! Let’s start with this: Have you always wanted to work in IT?…

Read More

TLS implementation flaws open Aruba and Avaya network switches to RCE attacks

TLS implementation flaws open Aruba and Avaya network switches to RCE attacks

Multiple series of network switches manufactured by Aruba Networks, owned by Hewlett Packard Enterprise, and Avaya, owned by Extreme Networks, are vulnerable to attacks that could allow attackers to break network segmentation, exfiltrate data from internal networks to the internet, and escape captive portals. The flaws stem from mistakes made by the vendors when implementing a popular embedded TLS library. The vulnerabilities are rated critical and can lead to remote code execution (RCE), according to…

Read More

May The Fourth Be with You: Jedi Mind Tricks and Scams

May The Fourth Be with You: Jedi Mind Tricks and Scams

Over the past few years, I’ve used Star Wars Day as a way to talk about two of my favourite things – Star Wars and cybersecurity. I wrote about scammers in 2020 and IoT in 2021, and I really thought I’d write about IoT again this year. After all, there’s no shortage of IoT blunders to talk about and tie into the Star Wars mythos. Instead, an article that I saw changed the direction of…

Read More

Why Do You Need a Malware Sandbox?

Why Do You Need a Malware Sandbox?

By ANY.RUN Team To solve the problem of identifying previously unknown malware samples help malware sandboxes – protection systems that allow you to evaluate the security of software by running and analyzing it in an isolated virtual environment. This article will lead you through all the details of what it is and why any organization needs this service. What is a malware sandbox? Malware sandbox is an established class of solutions on the market. The…

Read More

6 key challenges of complex cloud environments — and how to manage them

6 key challenges of complex cloud environments — and how to manage them

The dramatic shift to cloud services over the past few years has given organizations unprecedented flexibility and scalability, enabling them to forge ahead with digital transformation efforts. For many, it has also led to intermingled, complex strategies that threaten to take away some of the luster of the cloud. Enterprises don’t typically deploy one cloud service and call it a day. They rely on multiple offerings from various vendors for everything from procuring key business…

Read More

Mental Health and Prayer Apps Fail the Privacy Test

Mental Health and Prayer Apps Fail the Privacy Test

Over 90% of mental wellness and prayer apps contain serious privacy issues, while many others raise cybersecurity concerns, according to a new analysis from Mozilla. The non-profit behind the open-source Firefox web browser used the start of Mental Health Awareness Month to update its Privacy Not Included guide. It found 29 out of the 32 apps appraised did not pass Mozilla’s privacy requirements, while 25 out of 32 did not meet its Minimum Security Standards, which…

Read More

Car Rental Giant Sixt Hit by Cyber-Attack

Car Rental Giant Sixt Hit by Cyber-Attack

Global car rental firm Sixt has admitted that some of its business operations and services are suffering disruption after a cyber-attack struck the firm over the weekend. The German-headquartered company, which has thousands of locations in over 100 countries worldwide, released a brief statement on Sunday via parent company Sixt SE confirming the incident. It claimed that “IT irregularities” were first detected on Friday, April 29, when incident response plans kicked in. After discovering the…

Read More
1 3,100 3,101 3,102 3,103 3,104 4,135