article thumbnail

From Phishing to Firewalls: Solving Security with AI

Palo Alto Networks

Billy and his team are responsible for developing machine learning models to combat malware and other cyberthreats. Billy’s journey in the field of AI for security began when he first programmed AI systems to protect innocent players from trolls in popular video games, like World of Warcraft ®.

article thumbnail

This Is How We Do It — Season One Recap

Palo Alto Networks

Our blog and video series, “ This is How We Do It, ” offers a behind-the-scenes, candid exposé of how Palo Alto Networks protects its security operations center (SOC) using its own solutions. This series provides insights into a non-traditional SOC structure vs. a conventional four-tier model.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 New Aethon TUG Robot Vulnerabilities Expose Healthcare Facilities to IoMT Hackers

Ivanti

Monitor or take videos and pictures of sensitive patient medical records, as well as vulnerable patients, staff and hospital interiors. Locating all control systems behind firewalls. Shut down or obstruct hospital elevators and door-locking systems. Isolating systems such as the TUG Home Base Server from business networks.

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . And swing by Tenable’s Log4j resources page , which has links to FAQs, white papers, blogs, plugins, how-to videos, on-demand webinars and more.

article thumbnail

Telehealth and Cybersecurity: 3 Best practices to ensure data security in remote patient care

Trigent

Klara – Enables real-time video visits between caregivers and patients. Additionally, there are no firewalls protecting these services. Implementing a Web Application Firewall to protect against attacks like SQL injection. Enabling periodic anti-malware and virus scans will also check cyber threats.

article thumbnail

How to Protect Against Cyberattacks When Working from Home During COVID-19

Palo Alto Networks

These critical capabilities include: An ability to securely connect users to their business-critical cloud and on-premise applications, such as video teleconferencing applications increasingly relevant for remote work environments. Endpoint protection on all laptops and mobile devices, including VPN tools with encryption.

How To 98
article thumbnail

The Future of Security

O'Reilly Media - Ideas

For decades, security architects have focused on perimeter protection, such as firewalls and other safety measures. Ransomware is a type of malware that takes over systems and encrypts valuable company data requiring a ransom to be paid before the data is unlocked. Zero Trust Security.

Mobile 100