Palo Alto Networks worked with NIST and industry peers to build end-to-end Zero Trust architectures in NIST’s labs, leveraging a range of our technologies.
Consolidating multiple solutions into a unified platform closes security gaps that rise when deploying individual point products to address specific issues.
To improve patient outcomes and experiences, today’s healthcare organizations are increasingly adopting innovative technologies, such as AI, Cloud, and IoT. While beneficial, these technologies increase risk by expanding the...
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies.
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies.
Attack path analysis plays a vital role in risk prioritization. But without DSPM capabilities, orgs can’t see if specific attack paths put sensitive d...
Learn about AI-SPM and other Prisma Cloud product updates designed to enhance security of your cloud-native infrastructure and applications and your e...
Leverage best practices and industry-leading cloud-native security for Alibaba Cloud and gain full cloud visibility and compliance support on Alibaba ...
MSSPs users can overcome challenges like slow time-to-market, security blind spots, and limited service customization using Prisma Cloud’s new MSSP Console.
Shift from security theater to effective application security by replacing metrics that incentivizes poor development habits with those that optimize AppSec.
CNAPPs detect and mitigate threat vectors, including network attacks, malware across workloads, data threats, and vulnerabilities in web applications and APIs.
Leverage best practices and industry-leading cloud-native security for OCI and gain full cloud visibility and compliance support on all OCI resource i...
A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage....
A technical analysis of deepfake technology uncovers how cybercriminals utilize AI-generated videos of public figures to execute sophisticated scams....
We analyze a recent incident by Bling Libra, the group behind ShinyHunters ransomware as they shift from data theft to extortion, exploiting AWS credentials....
We recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations' AWS environments....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts