Six Tips to Ensure Multi-Cloud Protection

Posted by Fuel HQ on Feb 4, 2018 1:40:02 PM

Sunday, February 4, 2018

What is your multi-cloud strategy? Today it is not uncommon for organizations to be running a mix of public infrastructure as a service (IaaS) environments, such as Amazon Web Services and Microsoft Azure. In fact, a recent study concluded that one-third of the world’s companies are using four or more cloud vendors in their day-to-day operations.

Read More

Topics: Cybersecurity, Palo Alto Networks, security tools, Cloud Security Management, strategies for security, cybersecurity tools, cybersecurity protocol

Developing a Cybersecurity Protocol

Posted by Fuel HQ on Jan 24, 2018 4:05:26 PM

Wednesday, January 24, 2018

Cybersecurity threats come at a rapid pace these days—or so it seems. That leaves security professionals with very little room for error and the need to eliminate uncertainty in the process.

Here’s where protocol becomes your best friend; a clear progression of steps to take in the face of an immediate threat. Better yet, Fuel volunteer Paul Carter asks, can that protocol be standardized across organizations? He believes so and, in response, developed the DDIVE Model –which stands for Detect, Design, Implement, Validate, Establish. A security-focused response to incidents that will ensure viable options are considered, implemented and documented, DDIVE is designed to be adaptable and repeatable.

Read More

Topics: Cybersecurity, Palo Alto Networks, Fuel Volunteers, security tools, strategies for security, cybersecurity tools, cybersecurity protocol, standardization

3 Strategies for Faster Threat Detection and Response

Posted by Fuel HQ on Jan 9, 2018 10:51:53 AM

Tuseday, January 9, 2018

The ability to detect an attack and respond to it quickly can be the difference between a minor incident and a breach that costs resources and reputation. The good news is that organizations are making strides in security breach detection, according to the 2017 Trustwave Global Security Report, which examines the results of thousands of investigations into security incidents. 

When looking at incidents in 2016, the median time from intrusion to detection of a compromise fell to 49 days, down from 80.5 days in 2015. As tools such as managed security service (MSS) providers and artificial intelligence are more widely developed and deployed, the median time between intrusion and detection could fall even further this year.

Here are three strategies to consider when looking to improve detection and response before threats take root and cause damage.

Read More

Topics: Cybersecurity, Fuel Webcast, Fuel Education, Palo Alto Networks, threat prevention, Data Breaches, Webinar, artificial intelligence, security tools, strategies for security, cybersecurity tools

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all