Corporate Blogs

A Joint Vision for Simplified SASE Management at Scale

A Joint Vision for Simplified SASE Management at Scale

Unlock simplified SASE management at scale. The Prisma SASE app on ServiceNow unifies security, automates deployment, and accelerates time to value.
New Year, New Program, New Opportunities

New Year, New Program, New Opportunities

Palo Alto Networks is evolving its NextWave Partner Program in 2026, unifying it with the value exchange framework for clearer, more scalable growth.
Feb 04, 2026
Empowering the RAF Association with Next-Generation Cyber Resilience

Empowering the RAF Association with Next-Generation Cyber Resilience

The RAF Association (RAFA) boosts digital resilience and scales operations by partnering w...
Feb 03, 2026
2026 Public Sector Cyber Outlook: Identity, AI and the Fight for Trust

2026 Public Sector Cyber Outlook: Identity, AI and the Fight for Trust

See how AI, identity and autonomous defense will reshape federal and SLED government secur...
Jan 28, 2026
Introducing Palo Alto Networks Quantum-Safe Security

Introducing Palo Alto Networks Quantum-Safe Security

Accelerate your PQC migration. Palo Alto Networks Quantum-safe Security eliminates crypto debt and protects against harvest now, decrypt later attacks.
Jan 27, 2026
What the Alien Franchise Taught Me About Cybersecurity

What the Alien Franchise Taught Me About Cybersecurity

Ripley's tactics from Alien are your blueprint for SOC transformation to defeat modern threats with AI-driven security, automation and ...
Jan 22, 2026
Unified AI-Powered Security

Unified AI-Powered Security

Simplify security complexity in Northern Europe. IBM and Palo Alto Networks deliver unified, AI-powered cyber resilience and compliance with NIS2 and DORA.
Jan 16, 2026
Bridging Cybersecurity and AI

Bridging Cybersecurity and AI

New AI threats challenge the traditional CVE. Discover how to modernize vulnerability sharing frameworks and secure AI systems.
Jan 15, 2026

Network Security Blogs

OT Leaders Share Unique Insights on the Industrial Risk Landscape

OT Leaders Share Unique Insights on the Industrial Risk Landscape

New OT research report by Palo Alto Networks, Siemens, and INL reveals a 332% surge in exposed devices & a blurring industrial perimeter.
Feb 24, 2026
The Moltbook Case and How We Need to Think about Agent Security

The Moltbook Case and How We Need to Think about Agent Security

Moltbook’s agent-only social network reveals the real security challenges of autonomous AI—and why enterprises need identity, boundaries, and context ...
Feb 05, 2026
The Power of Glean and Prisma AIRS Integration

The Power of Glean and Prisma AIRS Integration

Securely accelerate AI adoption with the Glean and Prisma AIRS integration: real-time defense against prompt injection, toxic content and malicious code.
Modernizing Security on AWS: From Firewall Ops to Security Intent

Modernizing Security on AWS: From Firewall Ops to Security Intent

Learn why AWS modernization requires shifting from firewall operations to security intent, with managed, infrastructure-aware protection at scale.
Feb 04, 2026
Eliminate Over-Provisioning Costs with Elastic Security

Eliminate Over-Provisioning Costs with Elastic Security

Reduce TCO with Palo Alto Networks Hyperscale Security Fabric. Eliminate over-provisioning and cut wasted CapEx with elastic, automated security.
Feb 02, 2026
OpenClaw (formerly Moltbot, Clawdbot) May Signal the Next AI Security Crisis

OpenClaw (formerly Moltbot, Clawdbot) May Signal the Next AI Security Crisi...

We explore how Moltbot’s rise exposes the security risks of autonomous agents with persistent memory—and why powerful AI must be governed.
Jan 29, 2026
Turn Your Multicloud Security into a Business Enabler

Turn Your Multicloud Security into a Business Enabler

Automate multicloud security to remove manual bottlenecks. Shift from a business blocker to an enabler while accelerating innovation and AI adoption.
Jan 28, 2026
Introducing Palo Alto Networks Quantum-Safe Security

Introducing Palo Alto Networks Quantum-Safe Security

Accelerate your PQC migration. Palo Alto Networks Quantum-safe Security eliminates crypto debt and protects against harvest now, decrypt later attacks.
Jan 27, 2026

SASE Blogs

A Joint Vision for Simplified SASE Management at Scale

A Joint Vision for Simplified SASE Management at Scale

Unlock simplified SASE management at scale. The Prisma SASE app on ServiceNow unifies security, automates deployment, and accelerates time to value.
Why Financial Institutions Need a Browser-First Defense

Why Financial Institutions Need a Browser-First Defense

Financial CISOs face an ongoing choice between compliance vs. agility. Discover how Prisma Browser helps bridge the gap.
AI and the New Browser Security Landscape

AI and the New Browser Security Landscape

Agentic AI & new threats demand browser-native protection. Learn the four key trends facing browser security today & how Prisma Browser can help.
Feb 18, 2026
Scale AI & Private App Access with 100G Connectivity

Scale AI & Private App Access with 100G Connectivity

Prisma Access Colo-Connect 100G. provides secure, high-performance, 100 Gbps private application access for demanding workloads.
Feb 12, 2026
Unlock Frictionless Private App Access with Prisma Browser Connector

Unlock Frictionless Private App Access with Prisma Browser Connector

Prisma Browser Connector provides secure, encrypted access to private applications directly through the browser interface.
Jan 22, 2026
Secure Your App-Verse with Prisma Access Private Application Security

Secure Your App-Verse with Prisma Access Private Application Security

Use AI-powered, SASE-native security to secure your distributed "app-verse" and protect private apps and APIs from zero-day threats.
Jan 13, 2026
Seamless and Secure RDP and SSH Access Using Prisma Browser

Seamless and Secure RDP and SSH Access Using Prisma Browser

Prisma Browser natively supports RDP and SSH. Securely access VMs and servers from any device with AI-powered threat protection and built-in DLP.
Jan 08, 2026
Your Browser Is Your SOC’s Biggest Blind Spot

Your Browser Is Your SOC’s Biggest Blind Spot

Prisma Browser is no "black box." Find out how Prisma Browser gives the SOC necessary visibility to better protect against threats.
Dec 16, 2025

Cloud Security Blogs

Closing the Gap Between Cloud Visibility and Network Security

Closing the Gap Between Cloud Visibility and Network Security

Cloud visibility improves risk prioritization by adding network security context, revealing protected paths, reducing false positives, and focusing te...
Feb 17, 2026
An Inside Look into ASPM: Five Findings from New Industry Research

An Inside Look into ASPM: Five Findings from New Industry Research

ASPM is emerging as the orchestration layer for AppSec. Explore key findings in new research from Omdia on risk reduction, automation, and tool conver...
Feb 09, 2026
Palo Alto Networks and Veracode: Unifying Application Security from Code to Cloud

Palo Alto Networks and Veracode: Unifying Application Security from Code to...

Secure your software supply chain with the Cortex Cloud and Veracode integration. Correlate code vulnerabilities with cloud context to prioritize and ...
Jan 20, 2026
Is AI a New Challenge for Cloud Security? Yes and No.

Is AI a New Challenge for Cloud Security? Yes and No.

AI security challenges are accelerating as models and agents reshape cloud risk. Learn where traditional controls break down and how to close the AI security gap.
Jan 15, 2026
AI-Powered Cloud Security That Sees Everything and Fixes It Faster

AI-Powered Cloud Security That Sees Everything and Fixes It Faster

AI-powered cloud security unifies posture, runtime and AppSec with autonomous investigation, guardrails and real-time protection to reduce risk faster...
Jan 06, 2026
Understanding API Risk in the Age of AI

Understanding API Risk in the Age of AI

API security now sits at the center of AI risk. Learn how AI-driven traffic expands exposure and how Cortex Cloud delivers discovery, prioritization and real-time protection.
Dec 18, 2025
Where Cloud Security Stands Today and Where AI Breaks It

Where Cloud Security Stands Today and Where AI Breaks It

Cloud security trends reveal where teams gain ground and fragmentation breaks defense. Explore insights from 2,800 leaders and how cloud, identity and AI risks converge.
Dec 16, 2025
OWASP Top 10 for Agentic Applications 2026 Is Here – Why It Matters and How to Prepare

OWASP Top 10 for Agentic Applications 2026 Is Here – Why It Matters and How...

Agentic AI introduces new risks across tools, identities, supply chains and memory. Learn what the OWASP Top 10 for Agentic AI means and how to secure autonomous systems.
Dec 10, 2025

Security Operations Blogs

The Cartography of Risk: Operational Technology and the Public Internet

The Cartography of Risk: Operational Technology and the Public Internet

Cortex Xpanse OT Security: Map your external attack surface and protect industrial infrastructure. New Siemens research reveals a 332% rise in exposed...
Feb 24, 2026
Introducing Cortex XDR 5.0: The New Standard for Endpoint Security

Introducing Cortex XDR 5.0: The New Standard for Endpoint Security

Cortex XDR 5.0 redefines endpoint security with agentic AI, unified exposure management, endpoint DLP, and enhanced Linux & macOS prote...
Feb 24, 2026
Introducing Unit 42 Managed XSIAM 2.0

Introducing Unit 42 Managed XSIAM 2.0

Unit 42 Managed XSIAM 2.0 delivers a 24/7 managed SOC with continuous detection, investigation, and full-cycle remediation.
Feb 17, 2026
2026 Unit 42 Global Incident Response Report — Attacks Now 4x Faster

2026 Unit 42 Global Incident Response Report — Attacks Now 4x Faster

Attackers are leveraging identity, AI, and supply chain exposure. Unit 42's Global 2026 IR...
Feb 17, 2026
By 
When Security Becomes an Afterthought

When Security Becomes an Afterthought

As AI deployment races ahead, security scrambles to keep up. Nikesh Arora on why AI's biggest risk is treating security as an afterthou...
Feb 12, 2026
Stop Chasing Ghosts: The Strategic Case for Compensating Controls

Stop Chasing Ghosts: The Strategic Case for Compensating Controls

Transform theoretical risk into operational outcomes. Cortex Exposure Management’s new Security and Compensating Controls feature revea...
Feb 11, 2026
Ransomware Attacks: Why Your Endpoint Protection Can't Keep Up

Ransomware Attacks: Why Your Endpoint Protection Can't Keep Up

Ransomware attacks are 100x faster, beating legacy EPPs. Learn how Cortex XDR stops 25-min...
Feb 11, 2026
A Day in the Life with Your AgentiX Automation Engineer Agent

A Day in the Life with Your AgentiX Automation Engineer Agent

Stop coding, start conversing. Introducing the Automation Engineer Agent, your new AI part...
Feb 05, 2026

Unit 42 Threat Research

company article

Bring the Fight to the Edge: Turning Time Into an Advantage in OT...

Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage....
February 24, 2026
company article

VShell and SparkRAT Observed in Exploitation of BeyondTrust Criti...

CVE-2026-1731 is an RCE vulnerability in identity platform BeyondTrust. This flaw allows attackers control of systems without login credentials....
February 19, 2026
company article

Critical Vulnerabilities in Ivanti EPMM Exploited

We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors....
February 17, 2026
company article

Phishing on the Edge of the Web and Mobile Using QR Codes

We discuss the extensive use of malicious QR codes using URL shorteners, in-app deep links and direct APK downloads to bypass mobile security....
February 13, 2026
company article

Nation-State Actors Exploit Notepad++ Supply Chain

Unit 42 reveals new infrastructure associated with the Notepad++ attack. This expands understanding of threat actor operations and malware delivery....
February 11, 2026
company article

A Peek Into Muddled Libra’s Operational Playbook

Explore the tools Unit 42 found on a Muddled Libra rogue host. Learn how they target domain controllers and use search engines to aid their attacks....
February 10, 2026
company article

Novel Technique to Detect Cloud Threat Actor Operations

We introduce a novel method that maps cloud alert trends to MITRE ATT&CK techniques. The patterns created could identify threat actors by behavior....
February 6, 2026
company article

The Shadow Campaigns: Uncovering Global Espionage

In 2025 a threat group compromised government and critical infrastructure in 37 countries, with reconnaissance in 155....
February 5, 2026
By  Unit 42

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.