* [Blog](https://www.paloaltonetworks.com/blog) * Cloud Security # Cloud Security [![Where Cloud Security Stands Today and Where AI Breaks It](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/12/AdobeStock_742402688-scaled.jpeg)](https://www.paloaltonetworks.com/blog/2025/12/cloud-security-2025-report-insights/) [Where Cloud Security Stands Today and Where AI Breaks It \--------------------------------------------------------](https://www.paloaltonetworks.com/blog/2025/12/cloud-security-2025-report-insights/) Cloud security trends reveal where teams gain ground and fragmentation breaks defense. Explore insights from 2,800 leaders and how cloud, identity and AI risks converge. [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Cloud Native Application Protection Platform](https://www.paloaltonetworks.com/blog/category/cloud-native-application-protection-platforms/?ts=markdown) [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown) [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) Dec 16, 2025 By [Cody Queen](https://www.paloaltonetworks.com/blog/author/cody-queen/?ts=markdown "Posts by Cody Queen") ## Cloud Security *** ** * ** *** [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown) *** ** * ** *** [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) *** ** * ** *** [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown) *** ** * ** *** [AI Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security-posture-management/?ts=markdown) *** ** * ** *** [Cloud Native Application Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-application-platform/?ts=markdown) *** ** * ** *** ![Palo Alto Networks and Veracode: Unifying Application Security from Code to Cloud](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/01/word-image-350912-1.png) [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ## [Palo Alto Networks and Veracode: Unifying Application Security from Code to...](https://www.paloaltonetworks.com/blog/cloud-security/application-security-veracode-partnership/) Secure your software supply chain with the Cortex Cloud and Veracode integration. Correlate code vulnerabilities with cloud context to prioritize and ... Jan 20, 2026 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Is AI a New Challenge for Cloud Security? Yes and No.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/12/GettyImages-667738864-edit-2-scaled.jpg) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown) ## [Is AI a New Challenge for Cloud Security? Yes and No.](https://www.paloaltonetworks.com/blog/cloud-security/ai-security-gap-cloud-models-agents/) AI security challenges are accelerating as models and agents reshape cloud risk. Learn where traditional controls break down and how to close the AI security gap. Jan 15, 2026 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![Understanding API Risk in the Age of AI](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/12/GettyImages-562451669-edit_800x600.png) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown) ## [Understanding API Risk in the Age of AI](https://www.paloaltonetworks.com/blog/cloud-security/api-security-ai-risk/) API security now sits at the center of AI risk. Learn how AI-driven traffic expands exposure and how Cortex Cloud delivers discovery, prioritization and real-time protection. Dec 18, 2025 By [Andrea Halsted](https://www.paloaltonetworks.com/blog/author/andrea-halsted/?ts=markdown "Posts by Andrea Halsted") and [Amit Biton](https://www.paloaltonetworks.com/blog/author/amit-biton/?ts=markdown "Posts by Amit Biton") ![OWASP Top 10 for Agentic Applications 2026 Is Here – Why It Matters and How to Prepare](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/GettyImages-1138451182-edit_800x600.png) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [OWASP Top 10 for Agentic Applications 2026 Is Here -- Why It Matters and How...](https://www.paloaltonetworks.com/blog/cloud-security/owasp-agentic-ai-security/) Agentic AI introduces new risks across tools, identities, supply chains and memory. Learn what the OWASP Top 10 for Agentic AI means and how to secure autonomous systems. Dec 10, 2025 By [Jaimin Patel](https://www.paloaltonetworks.com/blog/author/jaimin-patel/?ts=markdown "Posts by Jaimin Patel") and [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") ## More Blogs Displaying 1---16 of 473 results Sort By: Recent Recent Popular ![Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/11/Gemini_Generated_Image_d58zh4d58zh4d58z-scaled.png) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [Cloud Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-detection-and-response/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Supply Chain Security](https://www.paloaltonetworks.com/blog/cloud-security/category/supply-chain-security/?ts=markdown) ## [Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm](https://www.paloaltonetworks.com/blog/cloud-security/shai-hulud-2-0-npm-worm-detection-blocking/) Shai-Hulud 2.0 exposes the fragility of software supply chains. Learn how the npm worm spreads through developer ecosyst... Nov 26, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") and [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") ![Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossible](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/GettyImages-589090447-edit.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown), [KSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/kspm/?ts=markdown) ## [Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossibl...](https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-identity-security-kiempossible/) Kubernetes identity security demands clarity. Learn how KIEMPossible uncovers entities, permissions and usage to help you reduce identity attack surfa... Nov 25, 2025 By [Golan Myers](https://www.paloaltonetworks.com/blog/author/golan-myers/?ts=markdown "Posts by Golan Myers") ![Is Your Snowflake Data at Risk? Find and Protect Sensitive Data with DSPM](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/01/AdobeStock_621254974-edit-1.jpeg) [Data Security](https://www.paloaltonetworks.com/blog/category/data-security/?ts=markdown), [Data Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security-posture-management/?ts=markdown) ## [Is Your Snowflake Data at Risk? Find and Protect Sensitive Data with DSPM](https://www.paloaltonetworks.com/blog/cloud-security/protect-sensitive-data-dspm-snowflake/) Cloud data security is critical. Learn how Snowflake users can mitigate risks with effective data security posture management (DSPM) and enhanced secu... Nov 21, 2025 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/05/word-image-321744-1.jpeg) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://www.paloaltonetworks.com/blog/cloud-security/owasp-top-10-llms-ai-security-guide/) AI security starts with the OWASP Top 10 for LLMs. Explore our interactive guide to uncover and mitigate the biggest risks across your AI pipelines. Nov 20, 2025 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/09/GettyImages-667849954-edit.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) ## [All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your A...](https://www.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security/) Initial-access risks in AWS demand clarity. Uncover how service exposure and access-by-design flaws open cloud perimeters and learn how to secure them... Nov 18, 2025 By [Golan Myers](https://www.paloaltonetworks.com/blog/author/golan-myers/?ts=markdown "Posts by Golan Myers") and [Ofir Balassiano](https://www.paloaltonetworks.com/blog/author/ofir-balassiano/?ts=markdown "Posts by Ofir Balassiano") ![Agentless Vs. Agent-Based Scanning in Kubernetes: A Deep Dive](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/GettyImages-1126835704-edit_800x600.png) [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown), [CWPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cwpp/?ts=markdown) ## [Agentless Vs. Agent-Based Scanning in Kubernetes: A Deep Dive](https://www.paloaltonetworks.com/blog/cloud-security/agentless-vs-agent-based-scanning-in-kubernetes-a-deep-dive/) Kubernetes security depends on smart scanning. Compare agentless and agent-based approaches to find the right balance between coverage and runtime def... Nov 13, 2025 By [Bruno Almeida](https://www.paloaltonetworks.com/blog/author/bruno-almeida/?ts=markdown "Posts by Bruno Almeida") ![Regaining Control Over Identity and Access](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/02/NetSec-Adhoc-Updated-Blog-Image-Resize-666009646-1.png) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) ## [Regaining Control Over Identity and Access](https://www.paloaltonetworks.com/blog/cloud-security/cloud-vs-on-premises-permissions-ciem/) Cloud permissions outpace control. Learn how CIEM restores visibility, enforces least privilege, and secures every identity in dynamic cloud environments. Nov 12, 2025 By [Shahar Livschitz](https://www.paloaltonetworks.com/blog/author/shahar-livschitz/?ts=markdown "Posts by Shahar Livschitz") ![Lessons Ted Lasso Can Teach You About CDR](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/cloud-security.png) [CDR](https://www.paloaltonetworks.com/blog/cloud-security/category/cdr/?ts=markdown), [Cloud Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-detection-and-response/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Lessons Ted Lasso Can Teach You About CDR](https://www.paloaltonetworks.com/blog/cloud-security/lessons-ted-lasso-can-teach-you-about-cdr/) Ted Lasso's lessons inspire a smarter, faster, more collaborative approach to cloud detection and response. Learn to turn chaos into confidence. Nov 11, 2025 By [Mohit Bhasin](https://www.paloaltonetworks.com/blog/author/mohit-bhasin/?ts=markdown "Posts by Mohit Bhasin") and [Emily Rodenhuis](https://www.paloaltonetworks.com/blog/author/erodenhuis/?ts=markdown "Posts by Emily Rodenhuis") ![AI-SPM Update: 3 New Capabilities for Model Activity, Agentic AI and Software Supply Chain Risks](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/09/AdobeStock_230441943-edit-Op1-6-scaled.jpg) [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [AI Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security-posture-management/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) ## [AI-SPM Update: 3 New Capabilities for Model Activity, Agentic AI and Softwa...](https://www.paloaltonetworks.com/blog/cloud-security/aispm-capabilities-enhanced-security/) AI-SPM's new features analyze model activity to spot unused assets, enhance security for agentic AI deployments, and shift-left with software package ... Nov 05, 2025 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") and [Roni Yaari](https://www.paloaltonetworks.com/blog/author/roni-yaari/?ts=markdown "Posts by Roni Yaari") ![Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/2-0.png) [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud to SOC](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud-to-soc/?ts=markdown) ## [Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://www.paloaltonetworks.com/blog/cloud-security/cloud-security-platform-cortex-cloud-2-0/) Cortex Cloud 2.0 delivers unified protection from code to cloud to SOC, turning complexity into clarity with AI-driven prevention and response. Oct 28, 2025 By [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") ![How Cortex Cloud and Semgrep Are Redefining AI-Driven Application Security](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/word-image-346274-1.png) [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ## [How Cortex Cloud and Semgrep Are Redefining AI-Driven Application Security](https://www.paloaltonetworks.com/blog/cloud-security/application-security-semgrep-partnership/) Modern AppSec demands context. Cortex Cloud and Semgrep integrate to unify code, runtime, and infrastructure visibility, helping teams prioritize expl... Oct 09, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Beyond Shift Left: Why Application Security Needs Smart Context](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/09/Thinking-2.jpg) [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Beyond Shift Left: Why Application Security Needs Smart Context](https://www.paloaltonetworks.com/blog/cloud-security/aspm-contextual-risk-prevention/) Application security posture management (ASPM) turns scans into context, prioritizes risk, and embeds guidance in developer workflows to prevent produ... Sep 26, 2025 By [Ory Segal](https://www.paloaltonetworks.com/blog/author/ory-segal/?ts=markdown "Posts by Ory Segal") ![The Expanding API Attack Surface](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/09/GettyImages-1194430840-800x600-1.png) [API Security](https://www.paloaltonetworks.com/blog/cloud-security/category/api-security/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [CWPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cwpp/?ts=markdown), [Web Application \& API Security](https://www.paloaltonetworks.com/blog/cloud-security/category/web-application-api-security/?ts=markdown) ## [The Expanding API Attack Surface](https://www.paloaltonetworks.com/blog/cloud-security/api-security-visibility-prioritization-protection/) API security for cloud-native teams: discover every API, prioritize risk with context, and enable real-time protection without slowing developers. Sep 24, 2025 By [Andrea Halsted](https://www.paloaltonetworks.com/blog/author/andrea-halsted/?ts=markdown "Posts by Andrea Halsted") and [Amit Biton](https://www.paloaltonetworks.com/blog/author/amit-biton/?ts=markdown "Posts by Amit Biton") ![How Auto-Remediation Shifts the Odds in Cloud Security](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/06/NetSec-Adhoc-Updated-Blog-Image-Resize-543362794.png) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud-Native Application Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-application-protection-platform/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) ## [How Auto-Remediation Shifts the Odds in Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/auto-remediation-cnapp/) CNAPP autoremediation streamlines cloud security by cutting alert noise, enforcing guardrails, and driving faster, safer outcomes for teams. Sep 17, 2025 By [Cody Queen](https://www.paloaltonetworks.com/blog/author/cody-queen/?ts=markdown "Posts by Cody Queen") ![Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downloads at Risk](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/08/GettyImages-1079012962_800x600.png) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downl...](https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/) npm supply chain attack exposed billions of downloads to risk. Learn how malicious packages spread and how to prevent threats with Cortex Cloud. Sep 10, 2025 By [Asaf Henig](https://www.paloaltonetworks.com/blog/author/asaf-henig/?ts=markdown "Posts by Asaf Henig") and [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Accelerate Secure Development by Automating Delivery of a Compliant Cloud Infrastructure](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/02/iStock-1249211557-edit-1280x1280-1-472x300-1.jpeg) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ## [Accelerate Secure Development by Automating Delivery of a Compliant Cloud I...](https://www.paloaltonetworks.com/blog/cloud-security/secure-cloud-infrastructure-terraform-integration/) Cortex Cloud and HashiCorp Terraform integration secures cloud infrastructure by default, enabling fast, compliant provisioning and reduced risk. Sep 09, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") Load more blogs Load more blogs ## More Blogs Displaying 1---16 of 473 results Sort By: Popular Recent Popular ![Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/11/Gemini_Generated_Image_d58zh4d58zh4d58z-scaled.png) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [Cloud Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-detection-and-response/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Supply Chain Security](https://www.paloaltonetworks.com/blog/cloud-security/category/supply-chain-security/?ts=markdown) ## [Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm](https://www.paloaltonetworks.com/blog/cloud-security/shai-hulud-2-0-npm-worm-detection-blocking/) Shai-Hulud 2.0 exposes the fragility of software supply chains. Learn how the npm worm spreads through developer ecosyst... Nov 26, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") and [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") ![Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downloads at Risk](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/08/GettyImages-1079012962_800x600.png) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downl...](https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/) npm supply chain attack exposed billions of downloads to risk. Learn how malicious packages spread and how to prevent threats with Cortex Cloud. Sep 10, 2025 By [Asaf Henig](https://www.paloaltonetworks.com/blog/author/asaf-henig/?ts=markdown "Posts by Asaf Henig") and [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/2-0.png) [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud to SOC](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud-to-soc/?ts=markdown) ## [Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://www.paloaltonetworks.com/blog/cloud-security/cloud-security-platform-cortex-cloud-2-0/) Cortex Cloud 2.0 delivers unified protection from code to cloud to SOC, turning complexity into clarity with AI-driven prevention and response. Oct 28, 2025 By [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") ![All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/09/GettyImages-667849954-edit.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) ## [All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your A...](https://www.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security/) Initial-access risks in AWS demand clarity. Uncover how service exposure and access-by-design flaws open cloud perimeters and learn how to secure them... Nov 18, 2025 By [Golan Myers](https://www.paloaltonetworks.com/blog/author/golan-myers/?ts=markdown "Posts by Golan Myers") and [Ofir Balassiano](https://www.paloaltonetworks.com/blog/author/ofir-balassiano/?ts=markdown "Posts by Ofir Balassiano") ![Introducing Cortex Cloud — The Future of Real-Time Cloud Security](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/02/GettyImages-1014585732-edit.jpg) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ## [Introducing Cortex Cloud --- The Future of Real-Time Cloud Security](https://www.paloaltonetworks.com/blog/2025/02/announcing-innovations-cortex-cloud/) Cortex Cloud brings the world's leading CNAPP onto the #1 SecOps platform, delivering real-time protection --- for the fir... Feb 13, 2025 By [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") ![Introducing Cortex Cloud ASPM](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/07/GettyImages-635978184-edit-scaled.jpg) ## [Introducing Cortex Cloud ASPM](https://www.paloaltonetworks.com/blog/cloud-security/introducing-aspm-cortex-cloud/) Cortex Cloud ASPM redefines application security with context-aware prevention, unified policy and runtime insight across the full software lifecycle. Aug 05, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") and [Sarit Tager](https://www.paloaltonetworks.com/blog/author/sarit-tager/?ts=markdown "Posts by Sarit Tager") ![Model Context Protocol (MCP): A Security Overview](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/06/MCP-security-risks-and-solutions.png) [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [AI Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security-posture-management/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) ## [Model Context Protocol (MCP): A Security Overview](https://www.paloaltonetworks.com/blog/cloud-security/model-context-protocol-mcp-a-security-overview/) Model Context Protocol (MCP) introduces new AI integration risks. Learn how to manage threats like prompt injection, credential leaks, and toolchain abuse. Jun 06, 2025 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![How Cortex Cloud and Semgrep Are Redefining AI-Driven Application Security](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/word-image-346274-1.png) [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ## [How Cortex Cloud and Semgrep Are Redefining AI-Driven Application Security](https://www.paloaltonetworks.com/blog/cloud-security/application-security-semgrep-partnership/) Modern AppSec demands context. Cortex Cloud and Semgrep integrate to unify code, runtime, and infrastructure visibility, helping teams prioritize expl... Oct 09, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![AI-SPM Now Generally Available: Enhancing AI Security and Compliance with Prisma Cloud](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/05/word-image-321744-1_800x600.png) [AI Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security-posture-management/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Data Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security-posture-management/?ts=markdown) ## [AI-SPM Now Generally Available: Enhancing AI Security and Compliance with P...](https://www.paloaltonetworks.com/blog/cloud-security/ai-spm/) Learn how AI Security Posture Management (AI-SPM) addresses new cloud security challenges, including model risk, data exposure, and misuse in AI envir... Aug 06, 2024 By [Amol Mathur](https://www.paloaltonetworks.com/blog/author/amol-mathur/?ts=markdown "Posts by Amol Mathur") ![Announcing Checkov 2.0: Deepening Open Source IaC Security](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/03/Woman-Inspecting.jpg) [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Announcing Checkov 2.0: Deepening Open Source IaC Security](https://www.paloaltonetworks.com/blog/cloud-security/checkov-2-deepening-open-source-iac-security/) Checkov 2.0 is a graph-based, open source IaC security tool for environments with complex dependencies across resources and modules. Apr 08, 2021 By [Matt Johnson](https://www.paloaltonetworks.com/blog/author/matt-johnson/?ts=markdown "Posts by Matt Johnson") ![Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/05/word-image-321744-1.jpeg) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://www.paloaltonetworks.com/blog/cloud-security/owasp-top-10-llms-ai-security-guide/) AI security starts with the OWASP Top 10 for LLMs. Explore our interactive guide to uncover and mitigate the biggest risks across your AI pipelines. Nov 20, 2025 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![Understanding Template Injection Vulnerabilities](https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/03/Hmmmm.jpg) [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown), [Web Application \& API Security](https://www.paloaltonetworks.com/blog/cloud-security/category/web-application-api-security/?ts=markdown) ## [Understanding Template Injection Vulnerabilities](https://www.paloaltonetworks.com/blog/cloud-security/template-injection-vulnerabilities/) Template injection is a class of vulnerabilities that are commonly found in web applications and Prisma Cloud's Web Application and API Security module can help. Feb 22, 2022 By [Artur Avetisyan](https://www.paloaltonetworks.com/blog/author/artur-avetisyan/?ts=markdown "Posts by Artur Avetisyan") ![Agentless vs. Agent-Based Security: How to Use Them to Stay Secure](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/02/Copy-of-image-17.png) [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown) ## [Agentless vs. Agent-Based Security: How to Use Them to Stay Secure](https://www.paloaltonetworks.com/blog/cloud-security/agentless-vs-agent-based-security-how-to-use-them-both-to-stay-secure/) The cloud computing industry will see a staggering compound annual growth rate of over 15% through 2028 when its market cap is expected to exceed $1 T... Feb 09, 2023 By [Aqsa Taylor](https://www.paloaltonetworks.com/blog/author/aqsa-taylor/?ts=markdown "Posts by Aqsa Taylor") ![The New AI Attack Surface — How Cortex Cloud Secures MCP](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/06/GettyImages-618195354-edit-scaled.jpg) [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [AI Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security-posture-management/?ts=markdown) ## [The New AI Attack Surface --- How Cortex Cloud Secures MCP](https://www.paloaltonetworks.com/blog/2025/06/cloud-security-model-context-protocol-mcp-security/) MCP Security in Cortex Cloud protects AI applications by securing Model Context Protocol communications and detecting API-layer threats in real time. Jun 13, 2025 By [Ory Segal](https://www.paloaltonetworks.com/blog/author/ory-segal/?ts=markdown "Posts by Ory Segal"), [Aviv Sasson](https://www.paloaltonetworks.com/blog/author/aviv-sasson/?ts=markdown "Posts by Aviv Sasson") and [Elad Shuster](https://www.paloaltonetworks.com/blog/author/elad-shuster/?ts=markdown "Posts by Elad Shuster") ![Agentless Vs. Agent-Based Scanning in Kubernetes: A Deep Dive](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/GettyImages-1126835704-edit_800x600.png) [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown), [CWPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cwpp/?ts=markdown) ## [Agentless Vs. Agent-Based Scanning in Kubernetes: A Deep Dive](https://www.paloaltonetworks.com/blog/cloud-security/agentless-vs-agent-based-scanning-in-kubernetes-a-deep-dive/) Kubernetes security depends on smart scanning. Compare agentless and agent-based approaches to find the right balance between coverage and runtime def... Nov 13, 2025 By [Bruno Almeida](https://www.paloaltonetworks.com/blog/author/bruno-almeida/?ts=markdown "Posts by Bruno Almeida") ![Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossible](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/GettyImages-589090447-edit.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown), [KSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/kspm/?ts=markdown) ## [Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossibl...](https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-identity-security-kiempossible/) Kubernetes identity security demands clarity. Learn how KIEMPossible uncovers entities, permissions and usage to help you reduce identity attack surfa... Nov 25, 2025 By [Golan Myers](https://www.paloaltonetworks.com/blog/author/golan-myers/?ts=markdown "Posts by Golan Myers") Load more blogs Load more blogs ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language