Prepare for tomorrow's cybersecurity threats. Explore emerging risks from AI and quantum computing and learn how to build a proactive defense strategy.
Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
Prepare for tomorrow's cybersecurity threats. Explore emerging risks from AI and quantum computing and learn how to build a proactive defense strategy.
The cybersecurity landscape is being reshaped by AI, requiring a fundamental rethinking of our approach to cyber resilience and a new security framework.
Security blind spots are a key risk. Learn how a unified multicloud security fabric provides complete, real-time asset mapping to secure your entire estate.
Learn why traditional security fails against unique AI threats like prompt injection, and how continuous AI red teaming is vital for secure deployment.
How organizations can master multicloud security by moving from chaos to command with a unified framework to discover, deploy, protect, and operationalize.
Is your AI chatbot secure? With every prompt, new attack vectors emerge. Learn how runtime security protects your AI from evolving threats in real time.
Secure organizations' web edge with Prisma Browser for Essential Eight and ISM compliance. Palo Alto Networks fortifies applications against cyber threats.
Identity has become the new battleground. In a world where work happens everywhere and applications live in the cloud, passwords, passwordless authentication, and even MFA can no l...
Modern AppSec demands context. Cortex Cloud and Semgrep integrate to unify code, runtime, and infrastructure visibility, helping teams prioritize expl...
Application security posture management (ASPM) turns scans into context, prioritizes risk, and embeds guidance in developer workflows to prevent produ...
Understand the real AI security risks of running self-managed models, from hidden deployments to supply chain threats, and how to effectively monitor ...
Deploy Cortex XSIAM in 3 months or less with AI-powered migration tools. Replace your SIEM faster with automated onboarding and ready-to-use analytics.
Threat actors behind the gift card fraud campaign Jingle Thief target retail via phishing and smishing, maintaining long-term access in cloud environments....
A nation-state actor stole BIG-IP source code and information on undisclosed vulnerabilities from F5. We explain what sets this theft apart from others....
Scattered Lapsus$ Hunters: Organizations, be aware of the effort of this cybercriminal alliance as they target retail and hospitality for extortion....
Indirect prompt injection can poison long-term AI agent memory, allowing injected instructions to persist and potentially exfiltrate conversation history....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts