See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

Watch CNBC’s full Davos interview with Palo Alto Networks CEO Nikesh Arora

Cybersecurity is a growing concern for CEOs, who are spending more to protect their Networks. Palo Alto Networks is one of the leaders in the industry working to reduce the threat of cyberattacks. Nikesh Arora, CEO of Palo Alto Networks, joins “Squawk Box” at the World Economic Forum in Davos to discuss.
See more

Hacking becoming a profession: Palo Alto Networks CEO

Palo Alto Networks CEO Nikesh Arora argues cyber threats will only get worse as there is increasing demand for user data, but that servers are more secure now than they were even a few years ago.
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
Displaying 1831 - 1860 of 1922
  • 1
  • 2
  • …
  • 61
  • 62
  • 63
  • 64
  • 65

In The News

First-generation firewalls fail in Web 2.0

July 13, 2010

In The News

Intrusion Prevention News and Errata

This week the Ponemon Institute released a study of almost 600 IT security professionals who overwhelmingly reported an increase in advanced threats and a lack of proper security mechanisms to deal with them.
July 9, 2010

In The News

Palo Alto Networks Extends Firewall Visibility to Remote Endpoints

More and more applications are moving to cloud and more users are moving off-premise.
June 28, 2010

In The News

Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Deny Service

Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can cause denial of service conditions.
June 10, 2010

In The News

Palo Alto Allows Enterprises to Control Employee Usage of Facebook

When pitching venture firms, entrepreneurs typically include a slide that shows revenue curving sharply up and to the right shortly after launch – what’s known as the “hockey stick” – but even the best companies rarely meet those projections.
June 8, 2010

In The News

Next-Gen Firewalls: Control Apps and Protect Networks

In the past, firewalls worked based on their protocol to apply to all available applications. Next generation firewalls, like those being developed by Palo Alto Networks need to better control apps to protect the network. This Info Tech report discusses next-gen firewalls and how compliance and application usage is changing the role of the firewall in network security.
June 7, 2010

In The News

PAN Makes Facebook ''Read-Only'' With New Tool

Other than obliterating productivity, Facebook represents a substantial security risk in the corporate world. However, it's also becoming a powerful marketing tool. So, how do you leverage Facebook without opening the company up to all kinds of malware?
June 7, 2010

In The News

Tech Brief

The iPad app that was famous for a few hours, a web browser that strips away adverts, and the man who bought his local police website as revenge for a speeding ticket.
June 7, 2010

In The News

Financial Services Firms Face Social Media Compliance Challenges

Brokerages and other financial services firms turning to sites like Facebook and Twitter for marketing and customer outreach face a number of thorny social media compliance issues.
June 6, 2010

In The News

Back to the Future

The life of leisure has been postponed. Instead, Michael Lehman has gone back to the future in a sense, taking on the CFO role at Palo Alto Networks, a pre-IPO company in the enterprise network-security industry.
April 26, 2010

In The News

Top Concerns of Silicon Valley Business Leaders

For seven years the Silicon Valley Leadership Group has asked member companies in high tech, biotech, financial services and related industries to participate in a business climate survey.
April 17, 2010

In The News

Appliance Approach Secures Australian Blue Chips

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
April 4, 2010

In The News

Interview: Nir Zuk, Chief Technology Officer, Palo Alto Networks

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
April 4, 2010

In The News

Magic Quadrant Says Now is the Time for Next-Generation Firewalls

You've heard the buzz about next-generation firewalls -- intelligent firewalls that dig deeper than port number and into application visibility.
March 30, 2010

In The News

Social Networking Risks Under Little Control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks.
March 30, 2010

In The News

Social Networks Pervasive in Regulated Industries

The spread of social networks in the enterprise is happening at a far greater rate than is generally believed, according to a report just released by network security firm Palo Alto Networks.
March 30, 2010

In The News

Security Risks Rise as Enterprises Go Social

Sure, social networks are all the rage on the consumer Web, and industry observers have noted that enterprises aren't far behind. But the rush to embrace social technologies carries a heightened security risk, experts warn.
March 30, 2010

In The News

Facebook, Google Apps Use Soars in Enterprises, Security Firm Says

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
March 29, 2010

In The News

Enterprise Networking: Google Apps, Facebook Devour Enterprise Network Bandwidth

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
March 29, 2010

In The News

Security: Shining a Spotlight on Social Media Risks

New reports from Palo Alto Networks and Webroot indicate that security consciousness is growing among social networkers but so are the risks, especially in highly regulated industries. Channel Insider takes a closer look at what this means for the channel.
March 29, 2010

In The News

Tech Apocalypse: Five Doomsday Scenarios for IT

Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
March 14, 2010

In The News

Innovation is Discovered at RSA 2010

The RSA Conference is wrapping up, and it was a much more upbeat experience than the past couple of years. Exhibitors were happy with the booth traffic, many interviewed executives reported sizable year-over-year revenue gains, and most were optimistic about prospects for the balance of 2010.
March 4, 2010

In The News

Cell user? Online Networker? Prepare to be Hacked!

With the hue and cry at this year’s RSA Security Conference in San Francisco about the lack of security for users in the mobile “cloud,” it begs the question: what are people doing about it?
March 3, 2010

In The News

Products of the Week

Next-generation firewalls from Palo Alto Networks combine three identification technologies to provide the unprecedented visibility and policy control over applications, users and content – all in a high-performance firewall platform.
February 28, 2010

In The News

How to Safely Enable Enterprise 2.0 Applications in the Workplace

The adoption and usage of Enterprise 2.0 applications in the workplace is growing at astronomical rates. While there is ample proof of the business benefits of their use, there continue to be major security and compliance risks associated with them.
February 2, 2010

In The News

Social Networking Everywhere

The growth of applications like Twitter and Facebook over the last year has been astounding. At Palo Alto Networks, Worldwide Marketing VP Rene Bonvanie says that presents a problem for many employers.
January 11, 2010

In The News

Powerful Firewall Protection

Firewalls first came out in the late 1980s when security breaches drew attention to the need to make networks more secure. In those early days, just having a firewall made a network more secure, because hackers hadn’t yet written applications that could get around it. But as hackers have created new applications, the firewall has become like a utility belt with more and more necessary gadgets—URL filtering, content filtering, intrusion detection—to block new threats that can dodge the firewall’s port-based security.
December 17, 2009

In The News

A Key Benefit of Next-Generation Firewalls: More Sleep

There’s a great article on SearchEnterpriseWAN about a Palo Alto Networks customer. IDT spoke to SearchEnterpriseWAN about its experiences using next-generation firewalls from Palo Alto Networks, and discussed some of the benefits and changes their team recognized in managing security across their enterprise.
December 16, 2009

In The News

Global Carrier Simplifies WAN Security with Next-Generation Firewalls

Wide area network (WAN) operations should include more than security management, but one global telecom operator drowning in thousands of firewall requests for its data centers around the world found little time to do much else.
December 15, 2009

In The News

The Top 100 IT Projects of 2009

2009 InfoWorld 100 Awards: IT remains the lifeblood of forward-thinking organizations, as this year's recipients of InfoWorld's highest honor attest.
November 22, 2009
Displaying 1831 - 1860 of 1922
  • 1
  • 2
  • …
  • 61
  • 62
  • 63
  • 64
  • 65

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.