* [Blog](https://www.paloaltonetworks.com/blog) * [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/) * [Black Hat](https://www.paloaltonetworks.com/blog/cloud-security/category/black-hat/) * Heading to Vegas the Week... # Heading to Vegas the Week of August 5th? Here's Where to Find Us! [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fblackhat-2024%2F) [](https://twitter.com/share?text=Heading+to+Vegas+the+Week+of+August+5th%3F+Here%E2%80%99s+Where+to+Find+Us%21&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fblackhat-2024%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fblackhat-2024%2F&title=Heading+to+Vegas+the+Week+of+August+5th%3F+Here%E2%80%99s+Where+to+Find+Us%21&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/cloud-security/blackhat-2024/&ts=markdown) \[\](mailto:?subject=Heading to Vegas the Week of August 5th? Here’s Where to Find Us!) Link copied By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") Jul 23, 2024 8 minutes [Black Hat](https://www.paloaltonetworks.com/blog/cloud-security/category/black-hat/?ts=markdown) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [BSidesLV](https://www.paloaltonetworks.com/blog/tag/bsideslv/?ts=markdown) [DEFCON](https://www.paloaltonetworks.com/blog/tag/defcon/?ts=markdown) ***Join us in Las Vegas as we showcase our Code to Cloud^TM^ platform at Black Hat, BSides and Def Con. You won't want to miss the breakout and theater sessions, demos, parties, prizes and more.*** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/07/Screenshot-2024-07-22-122344.png) Prisma Cloud will be at three events during the week of August 7 in Las Vegas, Nevada, so mark your calendars! * BSidesLV: August 6-7 * Black Hat: August 7-8 * Def Con: August 8-11 ## Secure from Code to Cloud [Prisma Cloud](https://www.prismacloud.io/) secures every stage of the application lifecycle. The platform helps organizations prioritize and eliminate risks across code/build, infrastructure and runtime. * Ship secure code by design with developer-friendly code security integrations to fix risks before they reach runtime. * Protect the entire application infrastructure and harden your cloud estate. * Stop active attacks with inline protection and defense-in-depth. ## BSides Las Vegas, August 8-9 Kick the week off at BSidesLV. Prisma Cloud by Palo Alto Networks is a Gold Sponsor. Stop by the Tuscany Suites and Casino Hotel to chat with our experts and enter our raffle for a chance to win a Flipper Zero. ### Speaking Sessions #### [Raiders of the Lost Artifacts: Racing for Hidden Treasures in Public GitHub Repositories](https://bsideslv.org/talks#KKBFHJ) Tuesday, August 6th | 3:00 PM Presented by [Yaron Avital, Sr. Staff Researcher](https://www.linkedin.com/in/yaron-avital/) Open-source projects often leverage GitHub Actions for automated builds. Join Yaron as he delves into a novel attack vector where he discovered a treasure trove of secrets --- leaked access tokens --- hidden within seemingly innocuous build artifacts, available for everyone to consume. These tokens encompassed various cloud services, interesting in their own right, but Yaron aimed to achieve more --- taking control over these open-source projects. Finding hidden GitHub Actions tokens in these artifacts was the easy part, and Yaron even managed to poison the projects' artifacts and cache. But pushing malicious code into the repositories failed, as the ephemeral tokens created in each workflow run expired as soon as the job was finished. This presented a thrilling challenge, a race against time to steal and use these tokens before they vanish. This session equips attackers with a novel attack path, revealing how to unearth sensitive data in build artifacts, craft a high-speed exploit to catch ephemeral tokens and utilize them for swift attacks. Yaron will showcase real-world examples of popular open-source projects he was able to breach, including projects maintained by high-profile organizations. ## Black Hat USA, August 7-8 Experience Precision AI technology in action at Black Hat USA 2024. Palo Alto Networks is a top sponsor and supporter of the Network and Security Operations Center (NOC/SOC) at Black Hat USA 2024 in Las Vegas, NV. Black Hat is a premier cybersecurity conference that brings together security professionals, researchers and leaders to discuss the latest threats, trends and technologies in information security. The event features hands-on training, briefings on the latest in information security research and networking opportunities for professionals at all career levels. **Related** : [Black Hat Executive Q\&A with Wendi Whitmore](https://www.blackhat.com/sponsor-interview/06202024.html#palo-alto-networks), Senior Vice President, Unit 42, Palo Alto Networks ### Speaking Sessions #### [From Exploit to Shield: Attacking Generative AI Apps to Create Cyber Resilience, Sponsored Session](https://www.blackhat.com/us-24/sponsored-sessions/schedule/index.html#from-exploit-to-shield-attacking-generative-ai-apps-to-create-cyber-resilience-41792) Wednesday, August 7 | 2:35 -- 3:25 PM Presented by [Michael Sikorski, CTO, Unit 42](https://www.linkedin.com/in/mikesiko/) and [Mike Spisak, Technical Managing Director, Proactive Services, Unit 42](https://www.linkedin.com/in/mike-spisak/) Generative AI is becoming a driving force for innovation across industries, transforming how businesses operate. With rapid growth, though, comes new security risks. This presentation dives into the emerging threats facing generative AI. Michael and Mike will discuss Unit 42's latest research, revealing how cybercriminals are actively using techniques to manipulate AI systems for malicious purposes. Through examples and live demonstrations, they'll expose how these attacks can bypass security measures, manipulate AI-generated content and compromise sensitive data. They'll then delve into practical defense strategies, empowering organizations to fortify their AI applications against evolving threats. By understanding the tactics used to both attack and defend AI systems, organizations can better navigate the evolving security challenges and ensure that this powerful technology is used safely and responsibly. #### [Arsenal Session: Cloud Offensive Breach and Risk Assessment (COBRA)](https://www.blackhat.com/us-24/arsenal/schedule/#cloud-offensive-breach-and-risk-assessment-cobra-39337) Thursday, August 8 | 10:10 -- 11:20 AM Presented by [Anand Tiwari, Manager, Product Management](https://www.linkedin.com/in/anandsundartiwari/) and [Harsha Koushik, Technical Product Manager](https://www.linkedin.com/in/hkoushik/) Cloud Offensive Breach and Risk Assessment (COBRA) is an open-source tool designed to empower users to simulate attacks within multicloud environments, offering a comprehensive evaluation of security controls. By automating the testing of various threat vectors, including external and insider threats, lateral movement and data exfiltration, COBRA enables organizations to gain insights into their security posture vulnerabilities. COBRA is designed to conduct simulated attacks to assess an organization's ability to detect and respond to security threats effectively. COBRA Features 1. **Seamless Integration for POC and Tool Evaluation**: COBRA provides seamless integration for Proof of Concept (PoC) and tool evaluation purposes. Whether you're exploring new cloud-native applications or evaluating existing solutions, COBRA offers a user-friendly interface and flexible deployment options to facilitate effortless testing and assessment. 2. **Comprehensive Assessment of Cloud-Native Security Posture**: Gain unparalleled insights into your organization's existing cloud-native security posture with COBRA. Our advanced assessment capabilities enable you to identify vulnerabilities, assess security controls and pinpoint areas for improvement. By understanding your current security posture, you can proactively address gaps and strengthen your defenses against emerging threats. 3. **Benchmarking Against Industry Standards and Best Practices**: COBRA enables you to benchmark your cloud security controls against industry standards and best practices. With our comprehensive benchmarking framework, you can compare your security posture against established benchmarks, identify areas of strength and weakness, and prioritize remediation efforts accordingly. 4. **Actionable Insights and Recommendations**: COBRA goes beyond providing insights by delivering actionable recommendations tailored to your organization's specific needs. 5. **Continuous Threat Simulation**: COBRA offers a modular and templatized approach for users to easily integrate additional modules, allowing for continuous threat simulation and adaptability. By providing a flexible framework for adding modules, COBRA ensures that users can tailor their threat simulation capabilities according to evolving security needs. #### Prisma Cloud Theater Sessions at Booth \#1632 **Shift from Findings to Root Causes with Prisma Cloud** Wednesday, August 7 | 10:30 -- 10:45 AM Presented by [Cameron Hyde, Product Marketing Manager, Prisma Cloud](https://www.linkedin.com/in/cameron-hyde2/) **Why Visibility Isn't Enough for Runtime Protection** Wednesday, August 7 | 2:30 -- 2:45 PM Presented by [Sohini Mukherjee, Prisma Cloud Solutions Architect](https://www.linkedin.com/in/smukherjee2/) **Shifting Left: Perceptions Vs. Realities** Wednesday, August 7 | 3:45 -- 4:00 PM Presented by [Nick Ohri, Prisma Cloud Solutions Architect](https://www.linkedin.com/in/nick-ohri-523249119/) **Cloud Data Risk -- Bringing Data into the Security Context** Thursday, August 8 | 1:30 -- 1:45 PM Presented by [Brian Pierce, Prisma Cloud Solutions Architect](https://www.linkedin.com/in/jbrian-pierce/) ### Attend Our Networking SOCial @ KUMI Wednesday, August 7 | 6 -- 8 PM Experience a modern approach to Japanese Cuisine and specialty libations as you mingle with a who's who of cybersecurity leaders and experts from around the world. [Register for our Networking SOCial now](https://register.paloaltonetworks.com/blackhatnetworkingreceptionhostedbypaloaltonetwork6679a9259f549). ### Executive Meeting Requests: Visit with Prisma Cloud at Black Hat Customer and partner engagement is important to us because it's the building block of your experience and our relationship. If you'd like to [schedule a meeting with Prisma Cloud](https://paloaltonetworks.jifflenow.com/external-request/blackhatusa2024/meeting-request?token=634abdc4f3263b6cacdb) subject matter experts, executives or sales reps, we'll be available. Take a minute to explore the many [Palo Alto Networks Black Hat activities](https://register.paloaltonetworks.com/paloaltonetworksblackhat2024). ## **Def Con, August 8-11** Wrap up the week at Def Con 202,4 where Prisma Cloud researcher Avid Hahami will share his latest insights. ### **Speaking Sessions** #### [OH-MY-DC: Abusing OIDC All the Way to Your Cloud](https://defcon.org/html/defcon-32/dc-32-speakers.html#:~:text=Dark%20Tangent%22%20Moss-,OH%2DMY%2DDC%3A%20Abusing%20OIDC%20all%20the%20way%20to%20your%20cloud,-Aviad%20Hahami) Saturday, August 10th | 1:00 PM Presented by [Aviad Hahami, Sr. Staff Researcher](https://www.linkedin.com/in/aviad-hahami-09058133/) As DevOps and developers are slowly shifting away from storing long-lived static credentials to the more secure, still kinda-new OIDC alternative --- the underlying logic, mechanisms and implementations tend to feel like complicated magic and are mostly overlooked. In this talk, Aviad will begin by recapping what OIDC is, who the interacting entities are when OIDC is used, and how OIDC is taking place to securely access one's cloud using CI/CD flows. Once covered, Aviad will be able to alternate points of view between the entities in play and potential vulnerabilities in various setups. Starting with the user POV, he'll show you what "under-configurations" looks like and demonstrate how new OIDC configuration options can actually be misconfigurations that could result in a compromise. He'll then explore another attack vector where leaking an OIDC token from a single repository in an organization can allow an attacker to abuse under-configurations and access private clouds. After that, he'll shift the POV to the identity provider (IdP) to show you what happens if an IdP is misconfigured, and disclose a real-world security vulnerability found in one of the most popular CI vendors that allowed his team to access their customers' cloud environments. As promised, you don't want to miss out. See you in Las Vegas! *** ** * ** *** ## Related Blogs ### [Black Hat](https://www.paloaltonetworks.com/blog/cloud-security/category/black-hat/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [#### Not Even Vegas Heat Will Keep Me from Hacker Summer Camp](https://www.paloaltonetworks.com/blog/cloud-security/hacker-summer-camp-2024/) ### [Black Hat](https://www.paloaltonetworks.com/blog/cloud-security/category/black-hat/?ts=markdown), [Event](https://www.paloaltonetworks.com/blog/category/event/?ts=markdown) [#### Next Week in Las Vegas With Prisma Cloud](https://www.paloaltonetworks.com/blog/cloud-security/prismacloud-blackhat-2023/) ### [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Security Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-platform/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Closing the Gap Between Cloud Visibility and Network Security](https://www.paloaltonetworks.com/blog/cloud-security/cloud-visibility-network-security-context-exposure-management/) ### [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Research](https://www.paloaltonetworks.com/blog/cloud-security/category/research/?ts=markdown) [#### An Inside Look into ASPM: Five Findings from New Industry Research](https://www.paloaltonetworks.com/blog/cloud-security/aspm-research-omdia/) ### [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) [#### Modernizing Security on AWS: From Firewall Ops to Security Intent](https://www.paloaltonetworks.com/blog/network-security/modernizing-security-on-aws-from-firewall-ops-to-security-intent/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Software Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/software-firewalls/?ts=markdown) [#### Turn Your Multicloud Security into a Business Enabler](https://www.paloaltonetworks.com/blog/network-security/turn-your-multicloud-security-into-a-business-enabler/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language