Palo Alto Networks Reports Fiscal Third Quarter 2021 Financial Results

Palo Alto Networks Reports Fiscal Third Quarter 2021 Financial Results

SANTA CLARA, Calif., May 20, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today financial results for its fiscal third quarter 2021, ended April 30, 2021. Total revenue for the fiscal third quarter 2021 grew 24% year over year to $1.1 billion, compared with total revenue of $869.4 million for the fiscal third quarter 2020. GAAP net loss for the fiscal third quarter 2021 was $145.1 million, or $1.50 per diluted share, compared with GAAP…

Read More

How to Increase Your Building’s IQ

How to Increase Your Building’s IQ

How to Increase Your Building’s IQ | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Using a Bot to Operate Your Network?! Getting Started with ChatOps

Using a Bot to Operate Your Network?! Getting Started with ChatOps

And… by popular demand (not really) we are back! I know it’s been a long time since my last post, but this last year has been really challenging for everyone, including me. Hopefully things are slowly getting back to normal and our minds will gradually also be able to readapt and focus again on the things that excited us. A foundational block for network operations, AI, and natural language processing In these months I’ve received…

Read More

#RSAC: Cyber-threat Landscape “the Worst It’s Ever Been” Due to Nation-State Behaviors

#RSAC: Cyber-threat Landscape “the Worst It’s Ever Been” Due to Nation-State Behaviors

The global cyber-threat environment is the “worst it’s ever been” due to the increasingly reckless behavior of the four major nation-state actors in this area: China, Russia, North Korea and Iran. That was the message of Dmitri Alperovitch, chairman, Silverado Policy Accelerator, and Sandra Joyce, executive vice president, head of global intelligence at FireEye, who provided the annual Global Threat Brief during a keynote session on day 3 of the 2021 RSA virtual conference. Alperovitch…

Read More

How your personal data may be exposed by misconfigured mobile apps

How your personal data may be exposed by misconfigured mobile apps

App developers are failing to properly set up and secure access to third-party services, putting user data at risk, says Check Point Research. Image: Check Point That mobile app you’ve been using could be exposing your personal data to the wrong people, not because of the way the app is designed but because of the way it taps into third-party services. As described in a report released on Thursday, cyber threat intelligence firm Check Point…

Read More

#RSAC: What Makes a Security Program Measurably More Successful?

#RSAC: What Makes a Security Program Measurably More Successful?

There are a lot of common activities that security professionals will often associate with enabling a successful security program, but which ones actually work? That’s a question that was answered in a keynote session on May 20 at the 2021 RSA Conference. Wendy Nather, head of advisory CISOs at Cisco, worked together with Wade Baker, partner and co-founder and professor at Cyentia Institute and Virginia Tech, to conduct a survey and the associated Cisco 2021 Security Outcomes Study….

Read More

Just published: SPoC Unsupported Operating Systems Annex

Just published: SPoC Unsupported Operating Systems Annex

  The PCI Security Standards Council (PCI SSC) has published a new, optional, Software-based PIN Entry on COTS (SPoC)™ Annex for Unsupported Operating Systems (“Unsupported OS Annex”) version 1.0. The purpose of this Annex is to provide additional security and testing requirements to allow solution providers to develop SPoC solutions that merchants can use on commercial off-the-shelf (COTS) devices with unsupported operating systems. The Unsupported OS Annex incorporates stakeholder feedback and comments received via a…

Read More

The 3 elements of a sound threat intelligence program

The 3 elements of a sound threat intelligence program

Because every organization has different security needs and requirements, there is no one-size-fits-all approach. Image: Yuichiro Chino/Moment/Getty Images For most organizations, securing operations, networks, infrastructure, applications and data remains a major challenge. As the headlines regularly prove, a determined attacker can break through even the best defenses.  To give themselves an edge, many organizations set up threat intelligence programs. These programs help cyber security teams and business leaders evaluate their overall risk posture, uncover where…

Read More

Intro to Google Cloud VMware Engine – Connecting a VPC to a Private Cloud – VMware Cloud Community

Intro to Google Cloud VMware Engine – Connecting a VPC to a Private Cloud – VMware Cloud Community

My previous post walked through deploying an SDDC in Google Cloud VMware Engine. This post will show the process of connecting a VPC to your Google Cloud VMware Engine environment, and we will use Terraform to do the vast majority of the work. The diagram below shows the basic concept of what I will be covering in this post. Once connected, you will be able to communicate from your VPC to your SDDC and vice versa….

Read More

USPS Reportedly Uses Clearview AI to Spy on Americans

USPS Reportedly Uses Clearview AI to Spy on Americans

The United States Postal Service (USPS) is reportedly using the facial recognition technology Clearview AI to spy on American citizens.  According to interviews and documents reviewed by Yahoo News, the use of the technology by the USPS Inspection Service is part of a program that tracks citizens’ social media activity and shares the information with law enforcement agencies.  Under the Service’s Internet Covert Operations Program (iCOP), analysts use Clearview’s collection of images scraped from public websites to “identify…

Read More
1 3,368 3,369 3,370 3,371 3,372 3,575