What’s in a Name? Unit 42 Breaks Down Threat Actor Naming

Posted by Fuel HQ on Feb 27, 2019 12:28:51 PM

Wednesday, February 27, 2019

Unit 42 Podcast Threat Actor NamingIn a recent episode of Unit 42’s podcast, Don’t Panic (S3E3, "Threat Actor Names"), Rick Howard, Palo Alto Networks CSO, and Ryan Olson, Palo Alto Networks senior director of threat intelligence, hash out threat actor naming.

Read More

How the Fuel Sacramento Chapter Formed a PCNSE Study Group

Posted by Fuel HQ on Jan 30, 2019 1:21:36 PM

Wednesday, January 30, 2019

By Raphael Carrillo, Fuel Sacramento Chapter Lead

business-conference-learning-7095During our June Fuel Chapter preparation meeting, held between Roger Schotsal and myself, the conversation of getting a study group to prepare for the Palo Alto Networks Certified Network Security Engineer (PCNSE) certification came up. We thought of it as a small get together with some folks to see how we could prepare to take the test. We agreed that the best way to market that was at our Fuel Chapter meeting. We announced it at the end of the gathering and it seemed that people were interested.  

Read More

How to Build an IPSec Tunnel Between Two Palo Alto Networks Firewalls

Posted by Charles Buege on Jan 7, 2019 12:55:33 PM

Monday, January 7, 2018

By Charles Buege, Fuel User Group Member 

IPSec Tunnel Header ImageSetting up a connection between two sites is a very common thing to do. With a Palo Alto Networks firewall to any provider, it’s very simple. With a Palo Alto Networks firewall to another Palo Alto Networks firewall, it’s even easier. Here’s a step-by-step process for how to get an IPSec tunnel built between two Palo Alto Network firewalls.

Read More

Topics: Charles Buege

Full Packet Capture for Full Network Visibility

Posted by Fuel HQ on Dec 27, 2018 11:48:00 AM

Thursday, December 27, 2018

PublicSectorIt can be tempting for companies to emphasize the adaptation and usage of new security tools. New tools with better features can be flashy, easy to justify and widely available. However, new tools are of no use if they aren't able to be deployed with speed and accuracy to respond to cybersecurity attacks.

Cyberattacks can happen at a moment’s notice. In a recent Fuel webinar, David Monahan, managing research director of security and risk management at Enterprise Management Associates (EMA), warned about five main attacks that security teams face. These include internet-based reconnaissance and direct attacks; phishing emails; malicious websites, links, and malvertising; rogue software; and tainted programs.

Read More

3 Resources to Fuel Professional Growth

Posted by Fuel HQ on Dec 20, 2018 3:09:41 PM

Thursday, December 20, 2018

Professional DevelopmentAs the year comes to a close, it’s a great time to reflect on professional development. What challenges did you face this year, and how will you grow in the new year? One way to do this is to make time for continued education. In a fast-paced, evolving industry, setting aside such time can be difficult, but the benefits are well worth the effort.

Whether you’re inclined to learn by interacting with a presentation, reading or listening to a podcast, here are three can’t-miss resources to assist in your professional development.

Read More

Pop Quiz! Test Your Cybersecurity Knowledge

Posted by Fuel HQ on Nov 27, 2018 10:19:54 AM

Tuesday, November 27, 2018

QuizAre you an all-star when it comes to cybersecurity know-how? Do you know the ins-and-outs of the details that make the industry tick? Put your knowledge to the test in this quiz from Fuel.




Read More

Implementing and Using Hardware Security Modules

Posted by Fuel HQ on Nov 2, 2018 5:13:22 PM

Friday, November 2, 2018

HSM The Online Trust Alliance (OTA) named 2017 “the worst year ever in data breaches and cyber incidents around the world.” In fact, OTA’s Cyber Incident & Breach Trends Report found that there were almost 160,000 cyber incidents targeting businesses in 2017. Because many cyber incidents are not reported, the firm estimated the actual number could be closer to 350,000. With such a high number of incidents, businesses should be looking at various security options. One such option is a hardware security module (HSM).

Read More

An Update from the Fuel Sacramento Chapter

Posted by Fuel HQ on Oct 24, 2018 3:47:05 PM

Wednesday, October 24, 2018

By Raphael Carrillo, Fuel User Group member and head of the Fuel Sacramento Chapter 

Sacramento-1Editor's note: In this article, Fuel User Group member and head of the Fuel Sacramento Chapter Raphael Carrillo gives us a peek behind the scenes at his local chapter – how they got started, the ways in which they’ve grown, and key learnings from a recent meeting focused on SSL decryption, how to get the most out of a TAC and a mobile office kit.

Read More

‘Embracing a Mindset of Lifelong Learning’: A Q&A with George Finney, New Fuel Board Member

Posted by Fuel HQ on Oct 11, 2018 11:58:00 AM

Thursday, October 11, 2018

George FinneyGeorge Finney is the chief security officer for Southern Methodist University and a new member to the Fuel Board of Directors. Finney is a licensed attorney for the state of Texas and a consummate cybersecurity professional, with three industry certifications to his name: a Certified Information Privacy Professional, a Certified Information Security Manager and a Certified Information Security Systems Professional.

We spoke with Finney to learn why he joined Fuel, what drives his passion for all things cybersecurity, trends and changes he’s observed in the industry, plus his advice for cultivating the next generation of cybersecurity professionals.    

Read More

Setting up SSH on a Non-Standard Port Using Certificate Authentication

Posted by Charles Buege on Oct 5, 2018 3:21:11 PM

Then Permitting Access Through a Palo Alto PA-220 Next-Generation Firewall to Destination Server

By Charles Buege, Fuel User Group Member | Friday, October 5, 2018

Fuel_SSH How To
Being able to securely connect with an SSH connection is one item that IT professionals need to do all the time, and knowing that the pathway to your system is as secure as possible is of vital importance. In this article, I will review the following items:


  • Setting up a second instance of SSH on a non-standard port number
  • Configuring SSH to require a certificate for authentication instead of a username and password
  • Configuring your Palo Alto PA-220 next-generation firewall (PA-220) to allow the connection through that port 

Read More

Topics: Charles Buege, SSH Connection

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all