Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
In our last entry in this ongoing series about the threat model against mobile devices, we explored the techniques for an attacker to get on an otherwise protected wireless network. This week, I …
Recently, you might have heard that the Palo Alto Networks Gang of Geeks hit the road to visit customers around the world to discuss security strategies and review the conclusions from our …
The past few days have been a whirlwind here at the Gartner Security & Risk Management Summit. The conversations I’ve had covered a lot of ground, as I’ve met with business leaders …
If you think about how furniture markets have evolved, you may have noticed some interesting trends. Over time, furniture shifted from something designed as a final product to something that’s been designed …
Palo Alto Networks wrapped up a busy week at the Aruba Atmosphere 2015 in Las Vegas, including keynote talks from Aruba Networks CEO Dominic Orr who graciously shared the stage with Chad Kinzelberg, …