Palo Alto Networks evolves the NextWave Partner Program. Discover new incentives and a framework of Access, Commitment and Profitability drive success.
Discover AI factories – the next evolution in data centers powering AI models. Understand their role, challenges and deployment best practices for 2026.
Generic jailbreak testing misses the real risks in agentic AI. Learn how contextual red teaming exposes tool misuse, data exfiltration, and operationa...
Here is a question I ask every CISO I meet: Do you know the real-time location of your sensitive data? I'm not asking theoretically or based on last quarter's audit, I mean right n...
On Thursday March 19, 2026, SecureIQLab released its 2026 Advanced Cloud Firewall (ACFW) v2.0 CyberRisk Comparative Report, providing CISOs with an objective, independent third-party validation of how 11 leadin...
The 200-day TLS certificates signals a structural change in cryptographic trust. Continuous enforcement is key. Discover Next-Generation Trust Security.
Here is a question I ask every CISO I meet: Do you know the real-time location of your sensitive data? I'm not asking theoretically or based on last quarter's audit, I mean right n...
Optimize your AppSec program with Cortex Cloud. Our AI AppSec Agent automates vulnerability remediation, prioritizes risks, and stops threats before production.
Container security demands more than shift left. Learn how to build defense in depth across IDE, CI, registry, admission control and runtime without a...
Agentic cloud security marks the shift from dashboards to autonomous action. Learn why AI agents are redefining cloud defense and closing the speed gap.
ASPM is emerging as the orchestration layer for AppSec. Explore key findings in new research from Omdia on risk reduction, automation, and tool conver...
Secure your software supply chain with the Cortex Cloud and Veracode integration. Correlate code vulnerabilities with cloud context to prioritize and ...
Boggy Serpens (MuddyWater) weaponizes trust & AI to create disposable malware, bypassing traditional defense. Unit 42 reveals how behavioral detection stops them.
"Lean security teams, enterprise-grade threats. See how Cortex XDR delivers 100% detection, 99.6% less alert noise, and automated response , no large SOC required
Learn how behavioral analytics detect Linux C2 communication and credential theft — including LOLBin abuse, beaconing malware, and post-exploitation credential access. See how Cort...
The viral surge of OpenClaw has captured the tech world’s imagination, turning it into a high-profile example of how quickly autonomous AI agents can move from curiosity to real op...
Over the past week, multiple research teams have documented a renewed wave of voice-led social engineering targeting identity providers and federated access. The entry point is not...
For years, businesses have treated public key infrastructure (PKI) as background plumbing, quietly securing access across enterprise systems and devices and rarely drawing executiv...
If privilege has changed, compliance cannot stay static. As organizations accelerate digital transformation, the compliance landscape is shifting beneath their feet — especially wh...
For the past two years, AI agents have dominated boardroom conversations, product roadmaps, and investor decks. Companies made bold promises, tested early prototypes, and poured resources into innovation. As 2026 begins, the...
We are excited to announce a new solution for securing AI agents. The solution helps organizations gain visibility into their AI agents and manage and secure their access to databases by applying identity security controls su...
Modernization rarely begins without a catalyst. For organizations managing machine identities, the CA/B Forum mandate is driving a wave of change — transforming compliance pressure...
Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments....
Unit 42 research on multi-agent AI systems on Amazon Bedrock reveals new attack surfaces and prompt injection risks. Learn how to secure your AI applications....
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.