Palo Alto Networks worked with NIST and industry peers to build end-to-end Zero Trust architectures in NIST’s labs, leveraging a range of our technologies.
Consolidating multiple solutions into a unified platform closes security gaps that rise when deploying individual point products to address specific issues.
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies.
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies.
Cloud data security is critical. Learn how Snowflake users can mitigate risks with effective data security posture management (DSPM) and enhanced secu...
Attack path analysis plays a vital role in risk prioritization. But without DSPM capabilities, orgs can’t see if specific attack paths put sensitive d...
Learn about AI-SPM and other Prisma Cloud product updates designed to enhance security of your cloud-native infrastructure and applications and your e...
Leverage best practices and industry-leading cloud-native security for Alibaba Cloud and gain full cloud visibility and compliance support on Alibaba ...
MSSPs users can overcome challenges like slow time-to-market, security blind spots, and limited service customization using Prisma Cloud’s new MSSP Console.
Shift from security theater to effective application security by replacing metrics that incentivizes poor development habits with those that optimize AppSec.
CNAPPs detect and mitigate threat vectors, including network attacks, malware across workloads, data threats, and vulnerabilities in web applications and APIs.
We detail a rare phishing mechanism using a refresh entry in the HTTP response header for stealth redirects to malicious pages, affecting finance and government...
Repellent Scorpius distributes Cicada3301 ransomware, using double extortion and targeting global victims since May 2024. We break down their toolset and more....
A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage....
A technical analysis of deepfake technology uncovers how cybercriminals utilize AI-generated videos of public figures to execute sophisticated scams....
We analyze a recent incident by Bling Libra, the group behind ShinyHunters ransomware as they shift from data theft to extortion, exploiting AWS credentials....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts