Teneo Blog

Welcome to the Teneo Blog where we post our industry news and insights that might just spark our next conversation with you.


Here’s our round up of the news, events and stories that rocked our world this week: Blogs:  Cyberattaque Rancongiciel: comment se proteger?  https://www.teneo.net/fr/blog/cyberattaque-rancongiciel-comment-se-proteger/ Ransomware protection: Teneo 12-Step Palo Alto Networks updates https://www.teneo.net/uk/blog/ransomware-protection-palo-alto-networks-updates/ Are your Media assets available for Blackmail? https://www.teneo.net/uk/blog/media-assets-available-blackmail/ 3 real-Life examples of Phishing in the last month  https://www.teneo.net/uk/blog/examples-phishing-last-month/ Netflix ransom after production studio breached, … Continued

Read further »

Le monde virtuel a souffert d’une panique la semaine dernière : une vague de cyberattaques rançongiciel au nom de « WannaCry » a frappé à très grande vitesse de nombreuses entreprises et organisations, dont Telefónica en Espagne, les hôpitaux britanniques, et le constructeur français Renault, qui a fermé ses usines le temps de trouver une solution. Le premier … Continued

Read further »

The WanaCrypt0r ransomware attacks began on Friday, May 12, 2017 and have impacted organizations worldwide. Customers using the Palo Alto Networks Next-Generation Security Platform are advised by Teneo to implement the following 12-step best practices to keep your Palo Alto Networks technology fully updated for efficient ransomware protection. Teneo 12-Step Best Practice Palo Alto Networks … Continued

Read further »

Over the last few years with increasing reliance on IP networks, media companies are more vulnerable to criminals holding them to ransom.  By stealing completed material and pre-releasing it on the web unless the victim pays up or, by using ransomware to encrypt and denying access to their assets, causing the victim to miss deadlines, … Continued

Read further »

Over the last month I’ve been collecting up examples of simple yet serious fraudulent activities in preparation for a number of security-related meetings and events. The 3 examples I want to share with you have all been in the form of phishing, where a fraudster sends an email (or makes a phone call) to target … Continued

Read further »

The BBC reported on Monday that Larson Studios, an audio post-production company used by Netflix, along with broadcasters including ABC, Fox and National Geographic, had its security compromised posing a potential threat to many networks’ shows. The hacker, known as TheDarkOverlord, claimed to have stolen Season 5 of the Netflix drama Orange Is the New … Continued

Read further »

Traditionally a specifically technical domain, managing the risk from cyber threats is now emerging as a core responsibility for executives at businesses large and small. Driving this shift is corporations’ growing dependency on digital transformation while facing increased threats. A chief executive’s role is to balance both the risks and the opportunities for business in … Continued

Read further »

Continuing our series of blogs on “what’s new in PAN-OS 8.0?”, in this blog we look further in to the new “Breakthrough Performance Hardware” announced at the colossal security event on the 7th February 2017. With the release of the new ‘Breakthrough Performance Hardware’ models, Palo Alto have made SSL decryption a reality to safely … Continued

Read further »

Cloud Acceleration from Riverbed

By Chris Barrett
24/03/2017

After many years of hype Cloud services are now finally viewed / trusted as part of a cost efficient BAU IT services strategy. While SaaS (Software as a Service) seems to be more prolific for key applications, IaaS (Infrastructure as a Service) is starting to find its feet as well. Cloud and Software-as-a-Service (SaaS) applications both … Continued

Read further »

Continuing our series of blogs on “what’s New in PAN-OS 8.0”, in this blog we look further in to the new “Preventing Credential-Based Attacks” feature. With the “Colossal” release of PAN-OS 8.0, Palo Alto have introduced new features to add even more prevention capabilities for each step of the attack lifecycle. One of those features … Continued

Read further »