Latest news with #PaloAltoNetworks
Yahoo
7 hours ago
- Business
- Yahoo
Exploring High Growth Tech Opportunities in US Markets
Over the last 7 days, the United States market has remained flat, yet it is up 11% over the past year with earnings forecasted to grow by 14% annually. In this environment, identifying high growth tech stocks involves looking for companies that demonstrate strong innovation and scalability potential to capitalize on these favorable conditions. Name Revenue Growth Earnings Growth Growth Rating Super Micro Computer 26.38% 39.09% ★★★★★★ Mereo BioPharma Group 53.63% 66.57% ★★★★★★ Ardelyx 20.78% 59.46% ★★★★★★ TG Therapeutics 26.46% 38.75% ★★★★★★ AVITA Medical 27.36% 60.93% ★★★★★★ Blueprint Medicines 21.12% 60.77% ★★★★★★ Alnylam Pharmaceuticals 23.63% 60.71% ★★★★★★ Alkami Technology 20.54% 76.67% ★★★★★★ Ascendis Pharma 35.07% 59.92% ★★★★★★ Lumentum Holdings 22.99% 103.97% ★★★★★★ Click here to see the full list of 233 stocks from our US High Growth Tech and AI Stocks screener. Here's a peek at a few of the choices from the screener. Simply Wall St Growth Rating: ★★★★☆☆ Overview: Palo Alto Networks, Inc. is a global provider of cybersecurity solutions with a market capitalization of $130.87 billion. Operations: The company generates revenue primarily from its Security Software & Services segment, amounting to $8.87 billion. Palo Alto Networks' strategic maneuvers, such as its recent partnership with Binary Defense, underscore its commitment to enhancing security operations through AI-driven platforms like Cortex XSIAM. This collaboration not only broadens the implementation and MDR services but also customizes support to fit diverse organizational needs, reflecting Palo Alto's adaptability in a high-stakes cybersecurity landscape. Moreover, their consistent R&D investment, which recently accounted for approximately 12.6% of their revenue, fuels innovations that keep them at the forefront of cybersecurity solutions. These efforts are pivotal as they navigate a competitive market where maintaining technological leadership is crucial for growth and client trust. Take a closer look at Palo Alto Networks' potential here in our health report. Assess Palo Alto Networks' past performance with our detailed historical performance reports. Simply Wall St Growth Rating: ★★★★★☆ Overview: Take-Two Interactive Software, Inc. is a global developer, publisher, and marketer of interactive entertainment solutions with a market cap of approximately $42.11 billion. Operations: The company generates revenue primarily through its publishing segment, which accounts for $5.63 billion. Take-Two Interactive Software has been actively expanding its financial and operational scope, as evidenced by recent strategic moves including a $1B public offering aimed at funding acquisitions and debt repayment. This aligns with their aggressive R&D investment strategy, crucial for fostering innovation in the highly competitive gaming sector. Despite reporting a net loss, Take-Two projects significant revenue growth ranging from $5.95B to $6.05B next fiscal year, underpinned by robust annualized revenue and earnings growth rates of 14.2% and 89.3%, respectively. These figures suggest a resilient adaptation to market demands and potential future profitability, positioning them well within the high-growth tech landscape despite current financial setbacks. Click here and access our complete health analysis report to understand the dynamics of Take-Two Interactive Software. Gain insights into Take-Two Interactive Software's historical performance by reviewing our past performance report. Simply Wall St Growth Rating: ★★★★★☆ Overview: Spotify Technology S.A., along with its subsidiaries, offers audio streaming subscription services globally and has a market capitalization of approximately $145.76 billion. Operations: Spotify generates revenue primarily through its Premium subscription service, which accounts for €14.34 billion, and its Ad-Supported segment, contributing €1.88 billion. Spotify Technology has demonstrated robust financial performance, with a notable increase in sales from EUR 3.64 billion to EUR 4.19 billion year-over-year and an uplift in net income to EUR 225 million. This growth is underpinned by a strategic emphasis on R&D, crucial for sustaining innovation and competitiveness in the dynamic tech landscape; indeed, Spotify's R&D expenses have consistently aligned with its revenue growth, ensuring continuous product evolution and market relevance. Moreover, the company's forward-looking revenue projection of $4.3 billion underscores its operational optimism and potential for sustained expansion within the tech sector. Click here to discover the nuances of Spotify Technology with our detailed analytical health report. Learn about Spotify Technology's historical performance. Explore the 233 names from our US High Growth Tech and AI Stocks screener here. Have you diversified into these companies? Leverage the power of Simply Wall St's portfolio to keep a close eye on market movements affecting your investments. Take control of your financial future using Simply Wall St, offering free, in-depth knowledge of international markets to every investor. Explore high-performing small cap companies that haven't yet garnered significant analyst attention. Fuel your portfolio with companies showing strong growth potential, backed by optimistic outlooks both from analysts and management. Find companies with promising cash flow potential yet trading below their fair value. This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned. Companies discussed in this article include PANW TTWO and SPOT. Have feedback on this article? Concerned about the content? with us directly. Alternatively, email editorial-team@ Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Boston Globe
13 hours ago
- Politics
- Boston Globe
China unleashes hackers against its friend Russia, seeking war secrets
Advertisement China is far wealthier than Russia and has plenty of homegrown scientific and military expertise, but Chinese military experts often lament that Chinese troops lack battlefield experience. Experts say that China sees the war in Ukraine as a chance to collect information about modern warfare tactics, Western weaponry, and what works against them. 'China likely seeks to gather intelligence on Russia's activities, including on its military operation in Ukraine, defense developments, and other geopolitical maneuvers,' said Che Chang, a researcher with TeamT5. It is unclear how successful these attempts have been, partly because Russian officials have never publicly acknowledged these intrusions. But a classified counterintelligence document from Russia's domestic security agency, known as the FSB, makes clear that intelligence officials are concerned. The document, obtained by The New York Times, says that China is seeking Russian defense expertise and technology and is trying to learn from Russia's military experience in Ukraine. The document refers to China as an 'enemy.' Advertisement With Putin largely cut off from the West, his country has come to rely on China to buy its oil and sell it technology that is essential to its war effort. Moscow and Beijing have formed a bloc against Washington and its allies, alarming Western leaders. The FSB document presents a more complicated relationship than the 'no-limits' partnership that Xi and Putin describe. Allies have been known to spy on one another, but the extent of China's hacking activities against Russia suggests both a higher level of mutual distrust and a reluctance by the Kremlin to share all that it is learning on the battlefield in Ukraine. Drone warfare and software are of particular interest to China, the document says. 'The war in Ukraine fundamentally shifted intelligence priorities for both countries,' said Itay Cohen, a senior researcher with cybersecurity firm Palo Alto Networks who has followed Chinese hacking groups for years. Experts say, and the document indicates, that China wants to learn from Russia's war experience to bolster its own preparedness for potential future conflicts. Taiwan, in particular, is a major potential flashpoint with the West. One Chinese government-funded group has targeted Rostec, the powerful Russian state-owned defense conglomerate, seeking information on satellite communications, radar and electronic warfare, according to Palo Alto Networks. Others have used malicious files, intended to exploit vulnerabilities in Microsoft Word, to penetrate Russian aviation industry targets and state bodies. Advertisement Messages seeking comment were left with the Kremlin and the Chinese Embassy in Moscow. Not all Chinese hacking groups operate at the behest of the government. But security experts have seen evidence of government ties. Russian cybersecurity firm Positive Technologies, for example, said in 2023 that cyberattacks had been mounted on several Russian targets, including in the aerospace, private security, and defense sectors. The attackers used a tool known as Deed RAT, which is widely deployed by Chinese state-sponsored hackers. Cybersecurity experts say Deed RAT is considered 'proprietary' among these groups and is not available for purchase on the dark web like other malware tools. That has enabled state-backed hacking groups in China to use it more widely because it is tough for their adversaries to find a way to combat the malware. Chinese state-sponsored hacking groups have often targeted international companies and government institutions, including in the United States and Europe. But hacking groups appear to have become more interested in Russian targets after the country's February 2022 invasion of Ukraine. Chang said he and his colleagues tracked several Chinese hacking groups targeting Russia. Among them was one of the country's most active hacking groups, known as Mustang Panda. Little is known about Mustang Panda's origins or where it operates inside China, according to researchers who have studied the group. Its activities often accompanied China's Belt and Road economic development initiative, according to Rafe Pilling, director of threat intelligence at security firm Sophos. As China invested in development projects in West Africa and Southeast Asia, he said, hacking soon followed. That is most likely because China invests in countries where it has political and economic interests, which motivates state-sponsored hackers, Pilling said. Advertisement After Russia invaded Ukraine, TeamT5 said that Mustang Panda expanded its scope to target governmental organizations in Russia and the European Union. Pilling, who has been monitoring Mustang Panda's activities for several years, says he suspects that the group is backed by China's Ministry of State Security, its main intelligence body. The ministry supports threat groups that attack targets around the world, he said. In 2022, Mustang Panda targeted Russian military officials and border guard units near the Siberian border with China. 'The targeting we've observed tends to be political and military intelligence-gathering,' Pilling said. That is true of all Chinese hacking groups targeting Russia, he said. 'I think of them as being one of the main tools that the Chinese state has for gathering political and economic intelligence.' Mustang Panda has also attracted the attention of US authorities. In January, the Justice Department and the FBI said that Mustang Panda's malware had infected thousands of computer systems, seeking to steal information. Many of the targets were American, but the malware was also found on computers belonging to Chinese dissidents and European and Asian governments, according to a federal indictment. The indictment makes clear that the United States believes that Mustang Panda is a state-sponsored group. Other Chinese groups have targeted Russia, too. Chang said his team was following another threat group, Slime19, that is continuously targeting the Russian government, energy, and defense sectors. In agreements in 2009 and 2015, China and Russia promised not to carry out cyberattacks targeting each other. But even at the time, analysts suggested that the announcement was largely symbolic. Chinese hacking in Russia did not begin with the war in Ukraine. A 2021 cyberattack, for example, targeted Russian submarine designers. But experts say the war prompted a spike in computer intrusions. Advertisement 'The activity — we saw it immediately in the months following Russia's full-scale invasion of Ukraine,' Cohen said. 'Even though the public narrative was of close ties between Russia and China.' This article originally appeared in


Business Wire
a day ago
- Business
- Business Wire
Scott Gainey Joins Checkmarx as Chief Marketing Officer to Spearhead New Growth Strategies
BUSINESS WIRE)-- Checkmarx, the leader in agentic AI-driven, cloud-native application security that helps enterprise developers build trust at scale and speed, welcomes security industry veteran Scott Gainey to its executive leadership team as chief marketing officer. Gainey will lead the company's global marketing strategy, branding, messaging, communications, demand generation and partner marketing development efforts. Key goals include scaling new business growth by aligning and executing with sales and partners to deliver significant value to customers. 'Checkmarx is hyper focused on aggressive growth, so Scott's history of success and scale in leading marketing in high-growth companies will be an important component of our continued growth and success,' said Checkmarx CEO Sandeep Johri. Share 'Checkmarx is hyper focused on aggressive growth, so Scott's history of success and scale in leading marketing in high-growth companies will be an important component of our continued growth and success,' said Checkmarx CEO Sandeep Johri. 'As a company, Checkmarx is in a uniquely strong position with a solid foundation of innovative, market-leading products and a fully engaged worldwide team. With Scott's leadership driving the brand and demand, Checkmarx is poised to continue leading the application security industry well into the future.' Gainey brings over 20 years of marketing leadership experience to Checkmarx, having served as CMO and in other leadership positions at disruptive technology companies including Palo Alto Networks, SentinelOne, Cisco Security and NetApp. He joins Checkmarx from Nile, where as CMO he led go-to-market strategy launching a solution with a new AI networking architecture that delivers enterprise networks entirely as a service with zero-trust security. Gainey received his B.S. from California Polytechnic State University, Humboldt and has studied business and leadership at Stanford GSB and West Point's Thayer Leadership Development Group. 'It's such an exciting time to be joining Checkmarx as our agentic AI for AppSec vision is redefining enterprise application security,' Gainey remarked. 'I look forward to collaborating with the entire team to ensure that our impact in securing the code that drives global business is well understood in the market. With a large and thriving customer base and the right combination of innovation and support, Checkmarx will continue to lead and to ensure the success of the global companies we serve.' For more information on Checkmarx, visit the website. Checkmarx is the leader in agentic AI, cloud-native application security that empowers the world's largest development organizations with real-time scanning and closed-loop remediation to boost developer productivity on security tasks by up to 50%. Based on the powerful Checkmarx One platform that scans over six trillion lines of code each year, Checkmarx is designed for large-scale, hybrid human and AI-assisted development teams. Checkmarx. Always Ready to Run. Follow Checkmarx on LinkedIn, YouTube and X.
Yahoo
a day ago
- Business
- Yahoo
Zero Trust Network Access (ZTNA) Industry Report 2025: Growth Trends and Investment Opportunities Through 2029 & 2034 Featuring IBM, Cisco Systems, Palo Alto Networks, and Other Leading Players
Rise in remote work and cyber threats are key drivers. Major players include IBM, Cisco, and Palo Alto Networks. Zero Trust Network Access Market Dublin, June 19, 2025 (GLOBE NEWSWIRE) -- "Zero Trust Network Access Market Report 2025" has been added to Zero Trust Network Access Market report delivers an in-depth analysis of the market's key characteristics, including size, growth potential, and segmentation. It provides a detailed breakdown of the market across major regions and leading countries, highlighting historical data and future growth projections. The report also examines the competitive landscape, market share insights, emerging trends, and strategic developments shaping the market. The zero trust network access market size has grown exponentially in recent years. It will grow from $41.28 billion in 2024 to $52.18 billion in 2025 at a compound annual growth rate (CAGR) of 26.4%. The expansion during the historic period can be linked to the increasing use of mobile devices, the surge in digital transformation efforts, the growing number of cyber threats, the rise of remote work, and the heightened dependence on mobile zero trust network access market size is expected to see exponential growth in the next few years. It will grow to $131.97 billion in 2029 at a compound annual growth rate (CAGR) of 26.1%. The growth during the forecast period can be attributed to the rising frequency of targeted cyberattacks, the increasing adoption of cloud services, the growing reliance on mobile applications, the expanding use of telehealth solutions, and the rising number of data breaches. Key trends in the forecast period include the adoption of cloud technology and IoT devices, advancements in technology, emerging threats in 5G networks, the integration of artificial intelligence (AI) and machine learning, and continuous technological increasing trend of remote work is expected to drive the growth of the zero-trust network access market in the coming years. For example, in September 2023, the Australian Institute of Health and Welfare (AIHW), an Australian government agency, reported that in April 2022, 46% of individuals had worked from home at least once per week in the previous four weeks, marking the highest level recorded since the pandemic. As a result, the expanding remote work trend is fueling the growth of the zero-trust network access companies in the zero-trust network access market are incorporating innovative technologies, such as cloud scalability, to strengthen security, optimize management, and enhance flexibility in safeguarding digital environments. For instance, in December 2024, 42Gears Mobility Systems Private Limited, a US-based mobile services company, introduced SureAccess, an advanced zero-trust network access solution. SureAccess enhances enterprise security by verifying access attempts and permitting only authenticated users and trusted devices to connect to resources. It features WireGuard encryption, split tunneling, advanced authentication, and scalable cloud support to improve secure remote January 2024, SonicWall Inc., a US-based cybersecurity company, acquired Banyan Security Inc. for an undisclosed amount. Through this acquisition, SonicWall Inc. seeks to enhance its cloud security offerings and expand its secure access service edge (SASE) capabilities with zero-trust security tailored for modern work environments. Banyan Security Inc. is a US-based cybersecurity company specializing in zero-trust network access (ZTNA) America was the largest region in the zero trust network access market in 2024. Asia-Pacific is expected to be the fastest-growing region in the forecast period. The regions covered in zero trust network access report are Asia-Pacific, Western Europe, Eastern Europe, North America, South America, Middle East and Africa. The countries covered in the zero trust network access market report are Australia, Brazil, China, France, Germany, India, Indonesia, Japan, Russia, South Korea, UK, USA, Canada, Italy, Spain. Report Scope Markets Covered:1) by Component: Services; Solutions2) by Authentication Mechanism: Multi-Factor Authentication; Single-Factor Authentication3) by Deployment Platform: Applications; Endpoint Devices; Network Infrastructure4) by Organization Size: Large Enterprises; Small and Medium Enterprises (SMEs)5) by Industry Vertical: Banking, Financial Services, and Insurance (BFSI); Energy and Utilities; Government and Defense; Healthcare and Life Sciences; Retail and Ecommerce; Telecom and Information TechnologySubsegments:1) Services: Consulting and Advisory Services; Integration and Deployment Services; Support and Maintenance Services; Managed Security Services2) Solutions: Software-Defined Perimeter (SDP); Identity and Access Management (IAM); Endpoint Security Solutions; Network Security SolutionsKey Companies Profiled: International Business Machines Corporation; Cisco Systems Inc.; Palo Alto Networks Inc.; Fortinet Inc.; Citrix Systems Series: Five years historic and ten years Ratios of market size and growth to related markets, GDP proportions, expenditure per Segmentation: Country and regional historic and forecast data, market share of competitors, market Attributes Report Attribute Details No. of Pages 175 Forecast Period 2025-2029 Estimated Market Value (USD) in 2025 $52.18 Billion Forecasted Market Value (USD) by 2029 $131.97 Billion Compound Annual Growth Rate 26.1% Regions Covered Global The companies featured in this Zero Trust Network Access market report include: International Business Machines Corporation Cisco Systems Inc. Palo Alto Networks Inc. Fortinet Inc. Citrix Systems Inc. Check Point Software Technologies India Pvt. Ltd. Tata Communications Ltd. Okta Inc. Zscaler Softech India Private Limited Cloudflare Inc. Cyxtera Technologies Inc. Forcepoint LLC CyberArk Software Ltd. McAfee LLC SonicWall Inc. Cato Networks Ltd. Appgate Cybersecurity Inc. Menlo Security Inc. Illumio Inc. Sophos Limited Netskope Inc. KEMP Technologies Inc. Twingate Inc. For more information about this report visit About is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends. Attachment Zero Trust Network Access Market CONTACT: CONTACT: Laura Wood,Senior Press Manager press@ For E.S.T Office Hours Call 1-917-300-0470 For U.S./ CAN Toll Free Call 1-800-526-8630 For GMT Office Hours Call +353-1-416-8900Sign in to access your portfolio
Yahoo
a day ago
- Business
- Yahoo
Why Palo Alto Networks is focusing on just a few big gen AI bets
To help figure out how AI will make its workers more productive, cybersecurity provider Palo Alto Networks polled every one of its departments for its best ideas. But when choosing which suggestions to pursue, Palo Alto wanted to invest only in those that provided the biggest financial bang for the buck. 'We went after four use cases,' says Meerah Rajavel, Palo Alto Networks' chief information officer. Those four included an AI agent called Panda AI that gives automated responses to employees who submit questions related to the IT, HR, and finance departments. There's also an AI code generation tool for engineers, AI tools for customer support specialists, and another AI tool for customers needing help resolving problems they're having with Palo Alto's products. Rajavel's approach to AI led to some changed expectations within the company as the technology evolved over the past few years. For example, soon after OpenAI's AI chatbot ChatGPT debuted in 2022, Rajavel heard from her boss, CEO Nikesh Arora, who said he wanted up to 90% of the 480,000 employee requests submitted annually to be resolved using generative AI. Those worker inquiries span questions about health benefits, changing login passwords, and approval to buy new software from an outside vendor. But Palo Alto did some research and determined that AI could only solve 18% of those issues by summarizing information, the task that large language models are best at. 'This is about someone asking for an action that needs to be done,' says Rajavel, referring to what most employees are seeking with their questions. 'It has to complete the task. It cannot just guide the task.' That led Palo Alto to create Panda, which now fields many employee requests. Today, close to 60% of Palo Alto's employee-generated tickets are autonomously handled by Panda, and Rajavel says over time, this figure could rise to as high as 80%. Thanks to the help AI provides, the company has ditched a phone line, a dedicated Slack channel, and online portal that employees previously used to submit requests. Now, all employees are first routed to the AI agent. In cases in which an issue can't be solved by AI, a ticket is sent to a human agent to tackle. So where does the cost savings come in? Human agents from outside companies handled many of those ticket requests, and with generative AI, Palo Alto can now spend less on those services. Meanwhile, Palo Alto has reskilled some of its internal support agents to focus more on ensuring that LLMs are trained on the correct data and to validate the accuracy of what the AI spits out. Another big AI use case for Palo Alto is writing software code. The company's 6,000 engineers are using AI for code generation today, but Rajavel says that her concerns about protecting Palo Alto's intellectual property mean she hasn't authorized popular coding tools like GitHub and Cursor. 'We are not going to allow anybody to use a third party,' says Rajavel. Instead, Palo Alto trains its own Claude models, hosted on Google Cloud's Vertex AI platform, to write code. In addition to focusing on generative AI, Rajavel says she dedicates 20% of her time talking with customer CIOs, chief information security officers, and other C-suite executives. One Palo Alto offering that frequently comes up in those conversations is its AI Access Security tools, which organizations can use to identify which generative AI apps are being used on their network. Rajavel should know what CIOs want to discuss with vendors. Rajavel has held the CIO title four times during her career, most recently at Palo Alto and previously, at three other technology companies: Citrix, Forcepoint, and Qlik. Yet another area of focus of hers is integrating Palo Alto's many acquisitions. Since joining in April 2022, the company has spent $500 million to buy IBM's QRadar software-as-a-service assets; a reported $625 million on Talon Cyber Security, a builder of a secure enterprise browser for remote workers; and a reported $400 million for data security platform Dig Security, which discovers, classifies, and then protects sensitive data. With the QRadar deal, Palo Alto was able to move customers to its operations platform, Cortex XSIAM. Meanwhile, Talon and Dig's services were quickly integrated into the company's existing ecosystem. Rajavel says acquired technologies are merged within 90 days of a deal closing. When Palo Alto scoops up smaller companies, Rajavel says one danger is that their tools aren't ready to be used by hundreds of thousands of customers. As a precaution, Palo Alto tries out their tools internally, as a test, before making them more available to customers. 'The very first person who is going to implement the technology is us,' says Rajavel. John Kell Send thoughts or suggestions to CIO Intelligence here. This story was originally featured on