Each year, we have the privilege of recognizing and celebrating our esteemed partners at Palo Alto Networks. These professionals have made an indelible mark on the cybersecurity landscape. Our Palo Alto Networks 2023 Partner Award Winners shine a spotlight on those who have gone above and beyond, achieving excellence in various ...
Each year, we have the privilege of recognizing and celebrating our esteemed partners at Palo Alto Networks. These professionals have made an indelible mark on the cybersecurity landscape. Our Palo Alto Network...
Introducing, “Cyber Talks” – our collection of videos that distill complex cybersecurity topics into simple to understand videos. Inspired by everyday life and the talk, because ba...
The digital landscape is undergoing a profound shift. Cloud native transformation and the fast pace of application development, driven by advances in generative AI, have led to a significant rise in data sprawl. As many large...
NextWave free Managed Security Service Providers (MSSPs) make substantial investments in building out their practices. MSSPs don’t just deliver products and features, they deliver...
Earlier this year, Palo Alto Networks launched Zero Trust OT Security, a solution to help industrial asset owners and operators keep their operational...
Palo Alto Networks is the leading vendor in preventing Cobalt Strike C2 communication. According to the recently published report by SecureIQlab, Palo Alto Networks is the only lea...
As enterprises have moved their data assets to the cloud, they depend on SaaS applications to conduct their business. Today, SaaS apps have evolved to become highly customizable, increasing the risk of misconfi...
Today’s organizations need complete protection against new and existing threats. A proliferation of data and devices has been matched by increasingly...
Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat actors are evol...
We are thrilled to announce that Palo Alto Networks' Medical IoT Security has been recognized as a LEADER in the inaugural Frost RADAR on Healthcare IoT Security. This recognition...
Welcome to the October 2023 edition of “Always Innovating in Network Security." This month, we dive deep into the innovations in Data Security through our Enterprise DLP solution. Safeguarding data stands at th...
We face an unprecedented amount of change for industrial control systems/operational technology (ICS/OT) as IT, OT and AI all converge. This is an inflection point that supercharge...
Organizations must be able to absorb economic stress, recover quickly, and adjust to changing business circumstances to be successful. Business resilience alone, however, is insuff...
As enterprises have moved their data assets to the cloud, they depend on SaaS applications to conduct their business. Today, SaaS apps have evolved to become highly customizable, i...
Rapid migration to cloud services presents organizations with new security challenges. A common issue security teams encounter is the excessive granting of privileges to both user...
Real-time APIs will execute more than 50% of all B2B transactions by the end of 2023,1 according to projections from the research firm, Gartner®. In addition to marking a pivotal shift in how organizations inte...
Prisma Cloud’s integration with AWS Identity and Access Management (IAM) Access Analyzer provides users with accurate least-privileged access recommendations.
Throughout the hundreds of hours I spent meeting with customers, sales teams, and internal users of Prisma Cloud, I was struck by the complexity of feedback I received. Soon into the process, a few key themes emerged. Each theme centered on the user experience of the pr...
An AI research team recently made a massive mistake when they published a bucket of open-source training data on GitHub that included terabytes of additional private data. This data contained a disk backup of e...
In the dynamic realm of cybersecurity, certain vulnerabilities capture more attention than others. One such flaw is CVE-2023-22515, which affects the...
Organizations face an array of challenges, from securing data and applications to meeting compliance regulations and defending against evolving threats. To assist organizations with these challenges, leading ma...
In today’s dynamic software development landscape, the agility of engineers and their tools evolve at an unprecedented rate, calling for a paradigm sh...
Reviews have become an integral part of our decision-making processes. From choosing gadgets and cars to selecting a trendy restaurant, we heavily rely on reviews in both our personal and professional lives. Ho...
Our blog and video series, “This is How We Do It,” offers a behind-the-scenes, candid exposé of how Palo Alto Networks protects its security operations center (SOC) using its own solutions. This series provides insights into...
Earlier this year we announced our software as a service (SaaS) offering with the Cortex XSOAR 8 release. XSOAR 8 offers the benefits of tight integration with the industry-leading Cortex platform and its other cybersecurity...
When it comes to detecting identity-related threats, security teams need to distinguish between suspicious but benign activity and truly malicious activity. This can be challenging...
In the final episode of Season One of “This is How We Do It,” Peter Havens from Cortex product marketing sits down with Leeroy Perera, staff security engineer. They discuss the practice of threat hunting and how we apply it i...
A new toolset comprised of malware (Agent Raccoon and Ntospy) and a custom version of Mimikatz (Mimilite) was used to target organizations in the U.S., Middle E...
A security risk discovered in the Google Cloud Platform domain-wide delegation feature allows a user to generate an access token to Google Workspace, granting u...
Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage....
In July 2023, pro-Russian APT Storm-0978 targeted support for Ukrainian NATO admission with an exploit chain. Analysis of it reveals the new CVE-2023-36584....
Cambodian government entities were targeted by a Chinese APT masquerading as cloud backup services. Our findings include C2 infrastructure and more. ...
A cyberattack series by APT Agonizing Serpens (Agrius) targeting organizations in Israel started in January 2023. We analyze the novel wipers and other advanced...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.