Palo Alto Networks

Seriously?! Can You Not Do That? | Chapter II

Even with new technologies abound, we’ve come to rely on passwords as our primary means of managing access to systems, applications and data. In reality, passwords are our first—and in most cases, only—line of defense when it comes to protecting against unauthorized access, misuse and theft.

Seriously?! Can You Not Do That? | Prologue

Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.

What Could The Next Ransomware Note Say? Let’s Learn from 2016

When lives are on the line when the latest Ransomware message comes in, perhaps we'll wish we looked back over time to predict what could happen in the future.

Security Framework: A Guide For Business Leaders

Security Framework: A Guide For Business Leaders

While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue.

Information security expert Eric Schou looks at 4 steps to consider when adopting a security framework that is focused on prevention.