There is a ransomware speed crisis. Attacks have accelerated 100x faster since 2021. Discover why traditional security fails and build AI-powered defenses.
Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
There is a ransomware speed crisis. Attacks have accelerated 100x faster since 2021. Discover why traditional security fails and build AI-powered defenses.
Michael Sikorski discusses how cybersecurity relies on "frenemies" building cultural bridges to collaborate against shared threats, as attackers already do.
At Palo Alto Networks, we deliver advanced, integrated solutions for true quantum readiness with essential visibility, agility and remediation capabilities.
Is your AI chatbot secure? With every prompt, new attack vectors emerge. Learn how runtime security protects your AI from evolving threats in real time.
It’s a fact: AI can unintentionally expose sensitive data. From customer engagement to back-office automation, intelligent systems are being deployed at such a rate that it’s not...
Unified device protection across managed, unmanaged and IoT/OT assets in one AI-first platform enables customer control of the entire device ecosystem...
Identity has become the new battleground. In a world where work happens everywhere and applications live in the cloud, passwords, passwordless authent...
Understand the real AI security risks of running self-managed models, from hidden deployments to supply chain threats, and how to effectively monitor ...
Microsoft Entra Permissions Management retirement leaves multicloud identities exposed. Discover why a vendor-neutral CIEM is essential and how Cortex...
Integrations: Go beyond the count. Our platform unifies data from all your sources with AI-driven analysis and automation to deliver measurable securi...
See Microsoft Purview Information Protection (MPIP) sensitivity labels for files across your cloud environment. Identify gaps and manage risk with Cor...
There is a ransomware speed crisis. Attacks have accelerated 100x faster since 2021. Discover why traditional security fails and build AI-powered defenses.
To further accelerate innovation for our customers, Palo Alto Networks will not participate in the 2025 MITRE ATT&CK® Evaluations after two years of leading results.
Michael Sikorski discusses how cybersecurity relies on "frenemies" building cultural bridges to collaborate against shared threats, as attackers already do.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and ...
Unit 42 explores how innocent clicks can have serious repercussions. Learn how simply visiting a malicious site can expose users to significant digital dangers....
Effective OAuth token management is crucial for supply chain security, preventing breaches caused by dormant integrations, insecure storage or lack of rotation....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts