Corporate Blogs

Security Operations Under Fire Inside Black Hat's NOC

Security Operations Under Fire Inside Black Hat's NOC

Palo Alto Networks secures Black Hat's NOC, managing billions of threat events with AI-driven automation, multivendor integration and rapid crisis response.
Sep 09, 2025
The Challenge of Cybersecurity Frenemies and Collaboration

The Challenge of Cybersecurity Frenemies and Collaboration

Michael Sikorski discusses how cybersecurity relies on "frenemies" building cultural bridges to collaborate against shared threats, as attackers already do.
Aug 20, 2025
Value Exchange in Cybersecurity

Value Exchange in Cybersecurity

Working with our partners, we're on a shared mission to deliver better security outcomes. Consider the strength of a vendor's partnerships.
Aug 19, 2025
Palo Alto Networks Leads the Way with Quantum and Multicloud Security
Securing the Quantum Age

Securing the Quantum Age

At Palo Alto Networks, we deliver advanced, integrated solutions for true quantum readiness with essential visibility, agility and remediation capabilities.
Aug 14, 2025
Forging a Secure Digital Future

Forging a Secure Digital Future

The South Africa cloud location signifies the Palo Alto Networks commitment to the region's digital transformation journey and its cybersecurity resilience.
Aug 12, 2025
Portkey Fortifies Its AI Gateway with the Prisma AIRS Platform

Portkey Fortifies Its AI Gateway with the Prisma AIRS Platform

AI security from Prisma AIRS and Portkey protects your AI apps from threats like prompt injection and data leakage with a simple, one-t...
How Georgia Department of Transportation Is Building Cyber Resilience

How Georgia Department of Transportation Is Building Cyber Resilience

GDOT boosts network security and resilience with Palo Alto Networks Next-Gen Firewalls. This investment is for public safety and GA tra...
Aug 05, 2025

Network Security Blogs

Beyond the Guardrail Trap: Securing Your AI Transformation

Beyond the Guardrail Trap: Securing Your AI Transformation

Watch the first episode of our webinar series and find out how to avoid the guardrail trap when securing AI workloads.
Sep 11, 2025
Announcing Device Security: Supercharging Proactive Device Protection

Announcing Device Security: Supercharging Proactive Device Protection

Unified device protection across managed, unmanaged and IoT/OT assets in one AI-first platform enables customer control of the entire device ecosystem...
Sep 09, 2025
Automated Multicloud Security Now Available for Software Firewalls

Automated Multicloud Security Now Available for Software Firewalls

Get advanced software firewall capabilities with the industry’s first multicloud security fabric that unifies protection for all types of workloads.
Sep 08, 2025
Beginner's Guide to AI Security with eBPF

Beginner's Guide to AI Security with eBPF

Discover the fundamentals of eBPF and how it augments runtime security solutions to move security and observability to the kernel level.
Sep 03, 2025
A Leader in the First Gartner Magic Quadrant for Hybrid Mesh Firewall

A Leader in the First Gartner Magic Quadrant for Hybrid Mesh Firewall

Palo Alto Networks named a Leader in the 2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall in its inaugural report
Aug 27, 2025
What Is a Hybrid Mesh Firewall and Why It Matters

What Is a Hybrid Mesh Firewall and Why It Matters

Palo Alto Networks Strata Network Security Platform delivers AI-powered, unified hybrid mesh firewall protection with consistent enforcement everywher...
Aug 25, 2025
Palo Alto Networks Leads the Way with Quantum and Multicloud Security
Eliminate Blind Spots in Encrypted Traffic to Outsmart Hidden Threats

Eliminate Blind Spots in Encrypted Traffic to Outsmart Hidden Threats

Palo Alto Networks announces new Encrypted Sliver Command and Control (C2) Detection available in Advanced Threat Protection.
Aug 12, 2025

SASE Blogs

Prisma SASE a Leader in Forrester Wave: Secure Access Service Edge

Prisma SASE a Leader in Forrester Wave: Secure Access Service Edge

Forrester has named Palo Alto Networks a Leader in its newly released report, The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025.
Sep 11, 2025
Prisma SASE 4.0: Powering the AI-Ready Enterprise

Prisma SASE 4.0: Powering the AI-Ready Enterprise

Prisma SASE 4.0 powers the AI-ready enterprise with AI-powered threat protection, frictionless data security and unified, intelligent o...
Sep 04, 2025
The End of Data Leaks: Modern Data Security Begins in the Browser

The End of Data Leaks: Modern Data Security Begins in the Browser

See how Prisma Access Browser provides a proactive, intelligent and user-centric approach that ensures sensitive data is protected in t...
Deliver a Best-of-Breed Application Experience with Prisma SD-WAN

Deliver a Best-of-Breed Application Experience with Prisma SD-WAN

Prisma SD-WAN provides the automation, intelligence, and deep insight needed to deliver secure and reliable application experiences.
Aug 28, 2025
Raising the Bar for Endpoint Security: Prisma Access Browser & IGEL

Raising the Bar for Endpoint Security: Prisma Access Browser & IGEL

Prisma Access & IGEL address the modern challenges of a browser-first workspace with a unified solution that secures work from endpoint to cloud.
Aug 27, 2025
Why Your AI Agent Needs a Performance Review

Why Your AI Agent Needs a Performance Review

CxOs need to unlock the true potential of AI without the fear of a friendly AI agent accidentally bringing down the house.
Aug 13, 2025
Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser provides organizations in the U.S. federal government superior brows...
Jul 29, 2025
Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

New Prisma SD-WAN ruggedized appliances deliver consistent, secure & high-performance connectivity in even the harshest conditions.
Jul 21, 2025

Cloud Security Blogs

Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downloads at Risk

Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downl...

npm supply chain attack exposed billions of downloads to risk. Learn how malicious packages spread and how to prevent threats with Cortex Cloud.
Sep 10, 2025
Accelerate Secure Development by Automating Delivery of a Compliant Cloud Infrastructure

Accelerate Secure Development by Automating Delivery of a Compliant Cloud I...

Cortex Cloud and HashiCorp Terraform integration secures cloud infrastructure by default, enabling fast, compliant provisioning and reduced risk.
Sep 09, 2025
Taking Cloud Security from Visibility to Prevention with eBPF

Taking Cloud Security from Visibility to Prevention with eBPF

eBPF delivers real-time cloud security with deep visibility, stability, and speed—enabling Cortex to protect workloads w...
Aug 27, 2025
Why Self-Managed AI Models Are Blind Spots and What to Do About It

Why Self-Managed AI Models Are Blind Spots and What to Do About It

Understand the real AI security risks of running self-managed models, from hidden deployments to supply chain threats, and how to effectively monitor ...
Aug 18, 2025
Microsoft Entra Permissions Management to Retire: Why the Time for a Vendor-Neutral CIEM Is Now

Microsoft Entra Permissions Management to Retire: Why the Time for a Vendor...

Microsoft Entra Permissions Management retirement leaves multicloud identities exposed. Discover why a vendor-neutral CIEM is essential and how Cortex...
Aug 15, 2025
Beyond Integration Theater: Why Counting Connections Misses the Point in Cloud Security

Beyond Integration Theater: Why Counting Connections Misses the Point in Cl...

Integrations: Go beyond the count. Our platform unifies data from all your sources with AI-driven analysis and automation to deliver measurable securi...
Aug 14, 2025
Use Microsoft Sensitivity Labels in Your Multicloud Security Strategy with Cortex Cloud DSPM

Use Microsoft Sensitivity Labels in Your Multicloud Security Strategy with ...

See Microsoft Purview Information Protection (MPIP) sensitivity labels for files across your cloud environment. Identify gaps and manage risk with Cor...
Aug 12, 2025
Don’t Let Inactive AI Models Linger: Reduce Risk and Cost with Cortex Cloud

Don’t Let Inactive AI Models Linger: Reduce Risk and Cost with Cortex Cloud

Reduce risks and costs from inactive AI models. Cortex Cloud's non-intrusive solution provides visibility and helps you clean up unused artifacts.
Aug 11, 2025

Security Operations Blogs

Security Operations Under Fire Inside Black Hat's NOC

Security Operations Under Fire Inside Black Hat's NOC

Palo Alto Networks secures Black Hat's NOC, managing billions of threat events with AI-driven automation, multivendor integration and rapid crisis response.
Sep 09, 2025
The Challenge of Cybersecurity Frenemies and Collaboration

The Challenge of Cybersecurity Frenemies and Collaboration

Michael Sikorski discusses how cybersecurity relies on "frenemies" building cultural bridges to collaborate against shared threats, as attackers already do.
Aug 20, 2025
Why Integrated File Integrity Monitoring Matters for Elevating Your Security

Why Integrated File Integrity Monitoring Matters for Elevating Your Securit...

Strengthen security & compliance with integrated File Integrity Monitoring (FIM). Learn how Cortex FIM provides real-time detection of ...
Aug 12, 2025
Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AVC EDR Detection and Anti-Tampering Tests

Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AV...

Cortex XDR is the only endpoint security market leader certified in both AV-Comparative EDR Detection and Anti-Tampering tests, proving superior threat detection.
Aug 06, 2025
SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ransomware

SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ra...

SE Labs awards Palo Alto Networks Cortex XDR a perfect 100% accuracy rating and AAA grade ...
Aug 05, 2025
Think You Have Visibility? Think Again.

Think You Have Visibility? Think Again.

Discover how Cortex XDR & XSIAM's Data Stitching and Smart Grouping unify security data, streamline SecOps, and accelerate threat investigations.
Jul 29, 2025
Security by Design — UX and AI in Modern Cybersecurity

Security by Design — UX and AI in Modern Cybersecurity

Nelson Lee reveals how thoughtful design and emerging AI technologies are reshaping cybersecurity operations from the ground up.
Jul 24, 2025
What’s New for Cortex (July ‘25)

What’s New for Cortex (July ‘25)

The latest release of Cortex harnesses AI to deliver more proactive security, expand visibility, and streamline workflows.
Jul 24, 2025

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

AdaptixC2: A New Open-Source Framework Leveraged in Real-World At...

AdaptixC2, an open-source C2 framework, is increasingly used in attacks. We discuss its features and potential use case scenarios....
September 10, 2025
company article

Data Is the New Diamond: Latest Moves by Hackers and Defenders

Unit 42 delves into how cybercriminals are treating stolen data like digital diamonds amid rising attacks and evolving extortion tactics....
September 9, 2025
company article

Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model...

Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution....
September 3, 2025
company article

Why Threat Intelligence: A Conversation With Unit 42 Interns

Discover what it’s like to be a Threat Intelligence intern at Unit 42, from diving into research to tackling real-world cyber threats....
September 2, 2025
company article

Threat Brief: Salesloft Drift Integration Used To Compromise Sale...

This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials....
September 2, 2025
By  Unit 42
company article

Data Is the New Diamond: Heists in the Digital Age

Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals. ...
August 26, 2025
company article

Insights: Telling You What We Really Think

Unit 42 introduces Insights, a new space for fresh thinking and varied content built on trusted expertise....
August 25, 2025

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.