min-width: mobile
min-width: 400px
min-width: 550px
min-width: 750px
min-width: 1000px
min-width: 1200px

Blog & News Archive //

Understanding and Preventing Point of Sale Attacks

Posted by Kat Casey on October 28, 2015
Blog article featured on the Palo Alto Networks website.

POSTED BY: Josh Grunzweig on October 28, 2015 1:00 PM

In recent years, there have been a number of high-profile stories involving the compromise of point of sale (PoS) devices. My research often involves deep reverse engineering and analysis of various malware families targeting PoS...
Continue Reading

Sagan 1.0.0 (open source) log analysis engine released!

Posted by Champ Clark on October 23, 2015

In June 2010, we completed initial work on Sagan 0.0.1 which was a very basic outline of what we thought a real-time log analysis engine should be. Historically, people treated logs as an archive of only the past activities, and in 2010, many solutions for “log analysis” were based on command line tools and concepts like grep. ...
Continue Reading

Automation in Network Security: Friend or Foe

Posted by Kat Casey on October 08, 2015
Blog article featured on the Palo Alto Networks website.

If you are like most security professionals, you probably feel overwhelmed just thinking about your to-do list: update policies, run reports, extend protections, analyze results, find hidden threats, manage multiple deployments… That list is endless.

Automation seems to be the perfect answer, but most security...
Continue Reading