Fuel HQ

Recent Posts

Six Tips to Ensure Multi-Cloud Protection

Posted by Fuel HQ on Feb 4, 2018 1:40:02 PM

Sunday, February 4, 2018

What is your multi-cloud strategy? Today it is not uncommon for organizations to be running a mix of public infrastructure as a service (IaaS) environments, such as Amazon Web Services and Microsoft Azure. In fact, a recent study concluded that one-third of the world’s companies are using four or more cloud vendors in their day-to-day operations.

Read More

Topics: Cybersecurity, Palo Alto Networks, security tools, Cloud Security Management, strategies for security, cybersecurity tools, cybersecurity protocol

Network Time Protocol: A Fuel Best Practice Tip

Posted by Fuel HQ on Feb 2, 2018 10:06:31 AM

Friday, February 2, 2018

Have you taken advantage of the Palo Alto Networks Best Practices Booklet? Released last June, it contains 300+ pages of specific, immediately useful advice for improving security, performance, manageability, and high availability.

We continue to provide our members with resources for useful guidance of the booklet. One such resource is the Fuel Tip of the Week Forum. Let’s take a look at one of the latest tips highlighted in this forum.

Read More

Topics: Cybersecurity, Palo Alto Networks, best practices, Best Practices Booklet, Tip of the Week, Network Time Protocol

Why Volunteering Works: Four Compelling Reasons

Posted by Fuel HQ on Jan 26, 2018 1:35:00 PM

Friday, January 26, 2018

The act of volunteering—helping your neighbors without recompense—offers more than just a helping hand, it benefits you and those you help in different ways. And there are many ways in which you can volunteer—whether related to your career via professional user group or something completely unrelated.

Read More

Topics: Cybersecurity, Palo Alto Networks, Fuel Volunteers, strategies for security, cybersecurity protocol

Developing a Cybersecurity Protocol

Posted by Fuel HQ on Jan 24, 2018 4:05:26 PM

Wednesday, January 24, 2018

Cybersecurity threats come at a rapid pace these days—or so it seems. That leaves security professionals with very little room for error and the need to eliminate uncertainty in the process.

Here’s where protocol becomes your best friend; a clear progression of steps to take in the face of an immediate threat. Better yet, Fuel volunteer Paul Carter asks, can that protocol be standardized across organizations? He believes so and, in response, developed the DDIVE Model –which stands for Detect, Design, Implement, Validate, Establish. A security-focused response to incidents that will ensure viable options are considered, implemented and documented, DDIVE is designed to be adaptable and repeatable.

Read More

Topics: Cybersecurity, Palo Alto Networks, Fuel Volunteers, security tools, strategies for security, cybersecurity tools, cybersecurity protocol, standardization

3 Strategies for Faster Threat Detection and Response

Posted by Fuel HQ on Jan 9, 2018 10:51:53 AM

Tuseday, January 9, 2018

The ability to detect an attack and respond to it quickly can be the difference between a minor incident and a breach that costs resources and reputation. The good news is that organizations are making strides in security breach detection, according to the 2017 Trustwave Global Security Report, which examines the results of thousands of investigations into security incidents. 

When looking at incidents in 2016, the median time from intrusion to detection of a compromise fell to 49 days, down from 80.5 days in 2015. As tools such as managed security service (MSS) providers and artificial intelligence are more widely developed and deployed, the median time between intrusion and detection could fall even further this year.

Here are three strategies to consider when looking to improve detection and response before threats take root and cause damage.

Read More

Topics: Cybersecurity, Fuel Webcast, Fuel Education, Palo Alto Networks, threat prevention, Data Breaches, Webinar, artificial intelligence, security tools, strategies for security, cybersecurity tools

Cybersecurity Question of the Month: Tools for Increased Efficiency

Posted by Fuel HQ on Jan 2, 2018 11:20:15 AM

We share your responses to the December Cybersecurity Question of the Month
Tuesday, January 2, 2018

Each month, we ask Fuel members to weigh in with their opinions on the Cybersecurity Question of the Month, and we’re sharing their answers here.

Fuel Member Asim Saleem shared his perspective on the most recent Cybersecurity Question of the Month.

Read More

Topics: Cybersecurity, Palo Alto Networks, cybersecurity question of the month, Fuel member, cybersecurity tools

Best of Fuel for Thought 2017

Posted by Fuel HQ on Dec 26, 2017 10:01:20 AM

Tuseday, December 26, 2017

Catch up on the latest in cybersecurity news with tips and insights from Fuel members. Here are the top viewed Fuel for Thought blog posts from 2017.  

Read More

Topics: Cybersecurity, Fuel Education, Palo Alto Networks, PAN-OS 8.0, SSL decryption, Best Practices Booklet, strategies for security, cybersecurity tools

Friday Fuel Up | 22 December 2017 | Network Visibility | Cybersecurity Talent Gap | Best Practices Booklet

Posted by Fuel HQ on Dec 22, 2017 11:15:00 AM

FUEL_0400115_SocialMedia_FFT110x180_2by Fuel HQ
Friday, December 22, 2017 
 
Friday Fuel Up is the weekly round-up of what Fuel members need to know in the news and in their community. This week's edition highlights the importance of network visibility in a growing threat landscape, one Fuel member's thoughts on how to address the cybersecurity talent gap and tips from the Best Practices Booklet. 
 
Read More

Topics: Network Security, Cybersecurity, Friday Fuel Up, Fuel Chapters, Fuel Meetings, cybersecurity careers, Fuel member stories, Best Practices Booklet, network visibility

The Importance of Network Visibility in a Growing Threat Landscape

Posted by Fuel HQ on Dec 19, 2017 9:15:45 AM

Tuseday, December 19, 2017

Network security is increasingly complex, and busy security teams face the challenge of needing full visibility and threat detection capabilities. Network visibility is a key step in preventing cybersecurity attacks, but the reality is that resource-constrained teams already support a wide range of security appliances to help guard their companies from a growing threat landscape. In some cases, they are managing more than any one person, or even team, can use effectively. What can cybersecurity professionals do to address this concern while maintaining efficiency and avoiding resource strain?     

Read More

Topics: Cybersecurity, Fuel Webcast, Fuel Education, Palo Alto Networks, Data Breaches, Webinar, strategies for security, network visibility, cybersecurity tools

Cybersecurity Question of the Month: Addressing the Cybersecurity Talent Gap

Posted by Fuel HQ on Dec 12, 2017 11:45:00 AM

We share your responses to the November Cybersecurity Question of the Month
Tuesday, December 12, 2017

Each month, we ask Fuel members to weigh in with their opinions on the Cybersecurity Question of the Month, and we’re sharing their answers here.

Fuel User Group member Jeff Donaldson shared his perspective on the most recent Cybersecurity Question of the Month. 

Read More

Topics: Cybersecurity, Palo Alto Networks, cybersecurity question of the month, cybersecurity skills gap, cybersecurity careers, Fuel member

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all