How Do You Spend Your Time? A Breakdown of Fuel User Group Data

Posted by Fuel HQ on Sep 20, 2018 9:24:08 AM

Thursday, September 20, 2018

With input from George Finney and Michelle Malcher, Fuel User Group Board Members

Earlier this year at the Ignite Cybersecurity Conference in Anaheim, California, Fuel set up an interactive wall for attendees to mark areas where they are spending their time in their work, such as firewall configuration, and areas where they’d like to spend more time, such as private cloud management. The wall tells a great story—by peers, for peers—about where the industry stands. Here, we’ve broken down a few of the findings, with input from two Fuel User Group Board Members.


Read More

Topics: Fuel member stories, NetOps, DevSecOps, public cloud, Ignite 2018

Fuel Cybersecurity Question of the Month: Moving to the Cloud

Posted by Fuel HQ on Sep 14, 2018 9:22:59 AM

Friday, September 14, 2018

art-blue-skies-clouds-335907According to a prediction by Gartner, more than half of global enterprises already using the cloud today will adopt an all-in cloud security strategy by 2021. The technology has been around for a decade and in that time has allowed for more agile, scalable solutions and greater innovation from IT departments. However, companies are still experiencing growing pains as use of the cloud expands beyond the IT department. Common challenges include measuring compliance, gaining visibility across the IT infrastructure and open communication between security operations and IT groups. But it’s clear that the cloud is here to stay, and these challenges should be faced head-on.

Read More

Topics: cloud migration, the cloud, cloud management, cybersecurity question of the month

Simplifying and Properly Using Security Monitoring Stacks

Posted by Fuel HQ on Sep 7, 2018 3:40:10 PM

Friday, September 7, 2018

SecurityStacks2A security stack is a collection of resources a company uses to protect itself from cybersecurity incidents. When incidents do occur, companies often believe the solution is to increase tools in their stack. However, this may not always be the best use of the stack. In many cases, more tools can mean more work for cybersecurity analysts who are already addressing thousands of possible threats every day. Companies can simplify their security stack by eliminating redundant tools or ones that rely too heavily on manual monitoring, to improve efficiency. It’s not about having every new tool or service in your security stack — it’s about how you use them.

Read More

Topics: security stacks

An Introduction to DevSecOps

Posted by Fuel HQ on Aug 20, 2018 11:41:34 AM

Monday, August 20, 2018

By Gary Ramah, Fuel User Group Board Member

DevSecOps-1The Importance of DevSecOps

Over the past several years, there have been considerable changes to IT infrastructure. The addition of new technology, including cloud computing, dynamic provisioning and shared resources have increased the speed and agility of IT, while also affecting the cost. The result is that application development is now stronger than ever.

Because applications in the cloud are now larger and faster, the development and operations (DevOps) guidelines have to also become faster. This also means so-called “big bang” application launches are no longer prevalent, but thanks to integrated development, we now see faster releases and better stability in applications.

However, security still lags behind, which is why its incorporation from the start is paramount to the success of preventing hacks from occurring. This means the transformation of DevOps to DevSecOps.

Read More

Topics: DevSecOps

Today's Biggest Cloud Security Challenges

Posted by Fuel HQ on Aug 9, 2018 10:02:13 AM

Thursday, August 9, 2018

HVR Homepage Feature-7.18-701094-edited

Use of the cloud is growing — but so are the problems that industries are facing to make it a safe tool. Gartner predicts that, by 2021, more than half of global enterprises already using the cloud today will adopt an all-in cloud security strategy. Given the tool’s rapid growth, companies are sometimes finding more challenges than solutions. Being ahead of the curve is the best way to ensure that cloud usefulness is maximized. Here are a few areas cybersecurity professionals should keep a close eye on to ensure they’re staying on top of common challenges.   

Read More

Topics: Cloud Security Management, Cloud Security

A Refresh on Passwords

Posted by Fuel HQ on Aug 2, 2018 4:45:00 PM

Thursday, August 2, 2018

By Paul Carter, Fuel User Group volunteer

Unit42-PasswordsUnit 42 is the global threat intelligence team at Palo Alto Networks and believe threat intelligence should be free, shared and available for all. s and industry experts. Unit 42’s podcast, titled Don’t Panic, is widely regarded as an engaging and entertaining way to keep up to date with the latest in cybersecurity. We asked Fuel User Group volunteer Paul Carter to listen to an episode on passwords and share his thoughts here. You can learn more about Unit 42 here and listen to the same episode as Paul did here.

Read More

Topics: passwords, password manager, Unit 42 Podcast

How to Set Up a Palo Alto Networks PA-220 Next-Generation Firewall from Factory Defaults

Posted by Fuel HQ on Jul 23, 2018 3:41:22 PM

Monday, July 23, 2018

By Charles Buege, a Fuel User Group member

PA-220Charles Buege is a Fuel User Group member who has a home lab setup unlike most others. Using a commercial internet provider and running multiple firewalls, his home lab gives him plenty of hands-on learning experience that can translate into his daily work environment. Here he shares how he set up the Palo Alto Networks PA-220 next-generation firewall. Be sure to read his other Fuel blog post, “My Journey to SSL Decryption.”

Read More

Topics: PA-220, next-generation firewall

DevOps: A Methodology for Improved Efficiency

Posted by Fuel HQ on Jul 11, 2018 6:15:04 PM

Thursday, July 12, 2018


What is DevOps?

The DevOps movement came to life from the desire to apply principles of Agile software development to IT operations. DevOps usually involves practices such as automated testing, proactive monitoring, and Agile development. Like most tools or techniques within the cybersecurity industry, it requires effective education and research on its use and effectiveness. DevOps can be used to keep projects on schedule, improve productivity, and decrease costs.

Read More

Topics: DevOps

Leading with Disruption and Innovation: A Reflection on Palo Alto Networks Ignite 2018

Posted by Fuel HQ on Jun 18, 2018 9:49:11 AM

Monday, June 18, 2018

By John Matelski, President of Fuel User Group, Chief Innovation & Information Officer
DeKalb County, Georgia

ignite18US-facebook-sharedThe Palo Alto Networks Ignite 2018 conference has come and gone, but the value of the education and engagement that occurred in Anaheim will live on. For me, there were two big takeaways.

The first takeaway: the Palo Alto Networks Application Framework is here to stay. Palo Alto Networks continues to take a leadership role in the security industry by driving cybersecurity innovation and collaboration with its Application Framework.

Read More

Topics: application framework, Ignite 2018

Cybersecurity Question of the Month: Harnessing the Power of Machine Learning

Posted by Fuel HQ on Jun 5, 2018 2:15:53 PM

Tuesday, June 5, 2018

How can cybersecurity professionals harness the power of machine learning to its fullest capabilities?

Cybersecurity QoMMachine learning continues to be touted as one of the most powerful tools to help quickly identify threats. In theory, this frees up time for cybersecurity professionals to focus on other tasks. However, some reports indicate that machine learning, when not approached properly, can create an unmanageable amount of false positive alerts, resulting in time and money wasted.

Read More

Topics: cybersecurity question of the month, machine learning

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all