[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [AI-SPM](https://www.paloaltonetworks.com/cyberpedia/ai-security?ts=markdown) 3. [What Is AI Security Posture Management (AI-SPM)?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm?ts=markdown) Table of Contents * [What Is AI Security? \[Protecting Models, Data, and Trust\]](https://www.paloaltonetworks.com/cyberpedia/ai-security?ts=markdown) * [What does the industry really mean by "AI security"?](https://www.paloaltonetworks.com/cyberpedia/ai-security#what-does-the-industry-really-mean-by-ai-security?ts=markdown) * [What's driving today's focus on AI security?](https://www.paloaltonetworks.com/cyberpedia/ai-security#what-is-driving-todays-focus-on-ai-security?ts=markdown) * [Where do AI systems face the most security risk?](https://www.paloaltonetworks.com/cyberpedia/ai-security#where-do-ai-systems-face-the-most-security-risk?ts=markdown) * [What makes AI security uniquely challenging?](https://www.paloaltonetworks.com/cyberpedia/ai-security#what-makes-ai-security-uniquely-challenging?ts=markdown) * [What approaches are emerging to secure AI systems?](https://www.paloaltonetworks.com/cyberpedia/ai-security#what-approaches-are-emerging-to-secure-ai-systems?ts=markdown) * [AI security FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-security#ai-security-faqs?ts=markdown) * [What Is Artificial Intelligence (AI)?](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) * [Artificial Intelligence Explained](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#artificial?ts=markdown) * [Brief History of AI Development](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#history?ts=markdown) * [Types of AI](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#types?ts=markdown) * [The Interdependence of AI Techniques](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#the?ts=markdown) * [Revolutionizing Industries](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#revolutionizing?ts=markdown) * [Challenges and Opportunities in AI Research](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#challenges?ts=markdown) * [Using AI to Defend the Cloud](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#using?ts=markdown) * [The Future of AI](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#future?ts=markdown) * [Artificial Intelligence FAQs](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai#faqs?ts=markdown) * What Is AI Security Posture Management (AI-SPM)? * [AI-SPM Explained](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#ai-spm?ts=markdown) * [Why Is AI-SPM Important?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#why?ts=markdown) * [How Does AI-SPM Differ from CSPM?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#how?ts=markdown) * [AI-SPM Vs. DSPM](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#vs?ts=markdown) * [AI-SPM Within MLSecOps](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#mlsecops?ts=markdown) * [AI-SPM FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#faq?ts=markdown) * [What Is an AI Worm?](https://www.paloaltonetworks.com/cyberpedia/ai-worm?ts=markdown) * [AI Worms Explained](https://www.paloaltonetworks.com/cyberpedia/ai-worm#ai-worms?ts=markdown) * [Characteristics of AI Worms](https://www.paloaltonetworks.com/cyberpedia/ai-worm#characteristics?ts=markdown) * [Traditional Worms Vs. AI Worms](https://www.paloaltonetworks.com/cyberpedia/ai-worm#vs?ts=markdown) * [Potential Threats](https://www.paloaltonetworks.com/cyberpedia/ai-worm#threats?ts=markdown) * [Fortifying Your Infrastructure Against AI Invaders](https://www.paloaltonetworks.com/cyberpedia/ai-worm#ai-invaders?ts=markdown) * [AI Worm FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-worm#faq?ts=markdown) * [What Is Machine Learning (ML)?](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown) * [Machine Learning Explained](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml#machine?ts=markdown) * [How Machine Learning Works](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml#how?ts=markdown) * [Machine Learning Use Cases](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml#use-cases?ts=markdown) * [Types of ML Training](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml#types?ts=markdown) * [How Machine Learning Is Advancing Cloud Security Solutions](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml#solutions?ts=markdown) * [Machine Learning FAQs](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml#faqs?ts=markdown) * [What Is Explainable AI (XAI)?](https://www.paloaltonetworks.com/cyberpedia/explainable-ai?ts=markdown) * [Explainable AI (XAI) Defined](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#explainable?ts=markdown) * [Technical Complexity and Explainable AI](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#technical?ts=markdown) * [Why Is Explainable AI Important?](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#why?ts=markdown) * [Explainable AI and Security](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#security?ts=markdown) * [Detecting the Influence of Input Variable on Model Predictions](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#detecting?ts=markdown) * [Challenges in Implementing Explainable AI in Complex Models](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#challenges?ts=markdown) * [Explainable AI Use Cases](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#usecases?ts=markdown) * [Explainable AI FAQs](https://www.paloaltonetworks.com/cyberpedia/explainable-ai#faqs?ts=markdown) * [What Is AI Governance?](https://www.paloaltonetworks.com/cyberpedia/ai-governance?ts=markdown) * [Understanding AI Governance](https://www.paloaltonetworks.com/cyberpedia/ai-governance#understanding?ts=markdown) * [AI Governance Challenges](https://www.paloaltonetworks.com/cyberpedia/ai-governance#ai?ts=markdown) * [Establishing Ethical Guidelines](https://www.paloaltonetworks.com/cyberpedia/ai-governance#establishing?ts=markdown) * [Navigating Regulatory Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-governance#navigating?ts=markdown) * [Accountability Mechanisms](https://www.paloaltonetworks.com/cyberpedia/ai-governance#accountability?ts=markdown) * [Ensuring Transparency and Explainability](https://www.paloaltonetworks.com/cyberpedia/ai-governance#ensuring?ts=markdown) * [Implementing AI Governance Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-governance#implementing?ts=markdown) * [Monitoring and Continuous Improvement](https://www.paloaltonetworks.com/cyberpedia/ai-governance#monitoring?ts=markdown) * [Securing AI Systems](https://www.paloaltonetworks.com/cyberpedia/ai-governance#securing?ts=markdown) * [AI Governance FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-governance#faqs?ts=markdown) * [What Is the AI Development Lifecycle?](https://www.paloaltonetworks.com/cyberpedia/ai-development-lifecycle?ts=markdown) * [Understanding the AI Development Lifecycle](https://www.paloaltonetworks.com/cyberpedia/ai-development-lifecycle#understanding?ts=markdown) * [AI Development Lifecycle FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-development-lifecycle#faqs?ts=markdown) * [AI Concepts DevOps and SecOps Need to Know](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts?ts=markdown) * [Foundational AI and ML Concepts and Their Impact on Security](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#foundational?ts=markdown) * [Learning and Adaptation Techniques](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#learning?ts=markdown) * [Decision-Making Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#decision?ts=markdown) * [Logic and Reasoning](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#logic?ts=markdown) * [Perception and Cognition](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#perception?ts=markdown) * [Probabilistic and Statistical Methods](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#probabilistic?ts=markdown) * [Neural Networks and Deep Learning](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#neural?ts=markdown) * [Optimization and Evolutionary Computation](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#optimization?ts=markdown) * [Information Processing](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#information?ts=markdown) * [Advanced AI Technologies](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#advanced?ts=markdown) * [Evaluating and Maximizing Information Value](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#evaluating?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#ai?ts=markdown) * [AI-SPM: Security Designed for Modern AI Use Cases](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#ai-spm?ts=markdown) * [Artificial Intelligence \& Machine Learning Concepts FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-security-concepts#faqs?ts=markdown) # What Is AI Security Posture Management (AI-SPM)? 5 min. read [Interactive: LLM Security Risks](https://www.paloaltonetworks.com/resources/infographics/llm-applications-owasp-10?ts=markdown) Table of Contents * * [AI-SPM Explained](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#ai-spm?ts=markdown) * [Why Is AI-SPM Important?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#why?ts=markdown) * [How Does AI-SPM Differ from CSPM?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#how?ts=markdown) * [AI-SPM Vs. DSPM](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#vs?ts=markdown) * [AI-SPM Within MLSecOps](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#mlsecops?ts=markdown) * [AI-SPM FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#faq?ts=markdown) 1. AI-SPM Explained * * [AI-SPM Explained](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#ai-spm?ts=markdown) * [Why Is AI-SPM Important?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#why?ts=markdown) * [How Does AI-SPM Differ from CSPM?](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#how?ts=markdown) * [AI-SPM Vs. DSPM](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#vs?ts=markdown) * [AI-SPM Within MLSecOps](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#mlsecops?ts=markdown) * [AI-SPM FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm#faq?ts=markdown) AI security posture management (AI-SPM) is a comprehensive approach to maintaining the security and integrity of [artificial intelligence (AI)](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) and [machine learning (ML)](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown) systems. It involves continuous monitoring, assessment, and improvement of the security posture of AI models, data, and infrastructure. AI-SPM includes identifying and addressing vulnerabilities, misconfigurations, and potential risks associated with AI adoption, as well as ensuring compliance with relevant privacy and security regulations. By implementing AI-SPM, organizations can proactively protect their AI systems from threats, minimize data exposure, and maintain the trustworthiness of their AI applications. ## AI-SPM Explained AI security posture management (AI-SPM) is a vital component in cybersecurity landscapes where artificial intelligence (AI) plays a pivotal role. AI systems, which encompass machine learning models, [large language models (LLMs)](https://www.paloaltonetworks.com/cyberpedia/large-language-models-llm?ts=markdown), and automated decision systems, present unique vulnerabilities, and attack surfaces. AI-SPM addresses these by providing mechanisms for the visibility, assessment, and mitigation of risks associated with AI components within technology ecosystems. ### Visibility and Discovery Lacking an AI inventory can lead to shadow AI models, compliance violations, and data exfiltration through AI-powered applications. AI-SPM allows organizations to discover and maintain an inventory of all AI models being used across their cloud environments, along with the associated cloud resources, data sources, and data pipelines involved in training, fine-tuning, or grounding these models. ### Data Governance AI-focused legislation mandates strict controls around AI usage and customer data fed into AI applications, requiring stronger [AI governance](https://www.paloaltonetworks.com/cyberpedia/ai-governance?ts=markdown) than those currently practiced by most organizations. AI-SPM inspects data sources used for training and grounding AI models to identify and classify sensitive or regulated data --- such as [personally identifiable information (PII)](https://www.paloaltonetworks.com/cyberpedia/pii?ts=markdown) of customers --- that might be exposed through the outputs, logs, or interactions of contaminated models. ### Risk Management AI-SPM enables organizations to identify vulnerabilities and misconfigurations in the AI supply chain that could lead to [data exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration?ts=markdown) or unauthorized access to AI models and resources. The technology maps out the full AI supply chain --- source data, reference data, libraries, APIs, and pipelines powering each model. It then analyzes this supply chain to identify improper [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption?ts=markdown), logging, authentication, or authorization settings. ### Runtime Monitoring and Detection AI-SPM continuously monitors user interactions, prompts, and inputs to AI models (like large language models) to detect misuse, prompt overloading, unauthorized access attempts, or abnormal activity involving the models. It scans the outputs and logs of AI models to identify potential instances of [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) exposure. ### Risk Mitigation and Response When high-priority security incidents or policy violations are detected around data or the AI infrastructure, AI-SPM enables rapid response workflows. It provides visibility into the context and stakeholders for remediation of identified risks or misconfigurations. ### Governance and Compliance With increasing regulations around AI usage and customer data, such as [GDPR](https://www.paloaltonetworks.com/cyberpedia/gdpr-compliance?ts=markdown)and NIST's [Artificial Intelligence Risk Management framework](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework?ts=markdown), AI-SPM helps organizations enforce policies, maintain audit trails --- including traceability of model lineage, approvals, and risk acceptance criteria --- and achieve compliance by mapping human and machine identities with access to sensitive data or AI models. ## Why Is AI-SPM Important? The deployment of AI systems in business and critical infrastructure brings with it an expanded attack surface that traditional security measures aren't equipped to protect. In addition to AI-powered applications requiring organizations to store and retain more data (while implementing new pipelines and infrastructure), AI attack vectors target unique characteristics of AI algorithms and include a distinct class of threats. One such attack vector is data poisoning, where malicious actors inject carefully crafted samples into the training data, causing the AI model to learn biased or malicious patterns. Adversarial attacks, on the other hand, involve subtle disturbances to the input data that can mislead the AI system into making incorrect predictions or decisions, potentially with severe consequences. Model extraction --- where an attacker attempts to steal an organization's proprietary model through unauthorized access or by probing the model's outputs to reconstruct its internal parameters --- is also concerning. Such an attack could result in intellectual property theft and potential misuse of the stolen model for malicious purposes. AI-SPM is the security response to AI adoption. By providing organizations with the tools to anticipate and respond to AI-specific vulnerabilities and attacks, AI-SPM supports a proactive security posture, giving organizations the ability to manage risks in the AI pipeline. From the initial design phase through deployment and operational use, AI-SPM ensures that [AI security](https://www.paloaltonetworks.com/cyberpedia/ai-security?ts=markdown) is an integral part of the [AI development lifecycle](https://www.paloaltonetworks.com/cyberpedia/ai-development-lifecycle?ts=markdown). ## How Does AI-SPM Differ from CSPM? [Cloud security posture management (CSPM)](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management?ts=markdown) and AI-SPM are complementary but focused on managing security posture across different domains --- cloud infrastructure and AI/ML systems, respectively. CSPM centers on assessing and mitigating risks in public cloud environments, like AWS, Azure, and GCP. Its primary objectives are to ensure cloud resources are properly configured per security best practices, detect misconfigurations that create vulnerabilities, and enforce compliance with regulatory policies. Core CSPM capabilities include: * Continuous discovery and inventory of all cloud assets (compute, storage, networking, etc.) * Evaluation of security group rules, IAM policies, encryption settings against benchmarks * Monitoring of configuration changes that introduce new risks * Automated remediation of insecure configurations In contrast, AI security posture management focuses on the unique security considerations of AI and ML systems across their lifecycle --- data, model training, deployment, and operations. AI-SPM incorporates specialized security controls tailored to AI assets like training data, models, and notebooks. It maintains a knowledge base mapping AI threats to applicable countermeasures. To mitigate data risks, AI-SPM incorporates the detection and prevention of data poisoning and pollution, where detrimental alterations to training data are identified and neutralized. It also leverages differential privacy techniques, allowing organizations to share data safely without exposing sensitive information. In securing the model supply chain, AI-SPM relies on staunch version control and provenance tracking to manage model iterations and history. This is complemented by encryption and [access controls](https://www.paloaltonetworks.com/cyberpedia/access-control?ts=markdown) that protect the confidentiality of the models, alongside specialized testing designed to thwart model extraction and membership inference attacks. Protecting live AI and ML systems includes monitoring of adversarial input perturbations --- efforts to deceive AI models through distorted inputs. Runtime model hardening is employed to enhance the resilience of AI systems against these attacks. AI-SPM incorporates specialized security controls tailored to AI assets like training data, models, notebooks along with AI-specific threat models for risks like adversarial attacks, model stealing etc. It maintains a knowledge base mapping AI threats to applicable countermeasures. While CSPM focuses on cloud infrastructure security posture, AI-SPM governs security posture of AI/ML systems that may be deployed on cloud or on-premises. As AI gets embedded across cloud stacks, the two disciplines need to be synchronized for comprehensive [risk management](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment?ts=markdown). For example, CSPM ensures cloud resources hosting AI workloads have correct configurations, while AI-SPM validates if the deployed models and data pipelines have adequate security hardening. Jointly, they provide full-stack AI security posture visibility and risk mitigation. ## AI-SPM Vs. DSPM [Data security and privacy management (DSPM)](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm?ts=markdown) and AI-SPM are distinct but complementary domains within the broader field of security and privacy management. DSPM focuses on protecting data at rest, in transit, and during processing, ensuring its confidentiality, integrity, and availability. Key aspects of DSPM include encryption, access controls, [data classification](https://www.paloaltonetworks.com/cyberpedia/data-classification?ts=markdown), and [data loss prevention](https://www.paloaltonetworks.com/cyberpedia/what-is-data-loss-prevention-dlp?ts=markdown). AI security posture management deals with securing AI models, algorithms, and systems. It addresses the unique challenges posed by AI technologies, such as adversarial attacks, data poisoning, model stealing, and bias. AI-SPM encompasses secure model training, privacy-preserving AI techniques, defense against attacks, and explainability. Although DSPM and AI-SPM address different aspects of security and [data privacy](https://www.paloaltonetworks.com/cyberpedia/data-privacy?ts=markdown), they function together to create a comprehensive and holistic security strategy. DSPM provides a foundation for data protection, while AI-SPM ensures the safe and responsible use of AI technologies that process and analyze the data. Integrating both domains enables organizations to safeguard both their data assets and their AI systems, minimizing risks and ensuring [data compliance](https://www.paloaltonetworks.com/cyberpedia/data-compliance?ts=markdown) with relevant regulations. ## AI-SPM Within MLSecOps AI security posture management is a cornerstone of machine learning security operations (MLSecOps), the practices, and tools used to secure the ML lifecycle. MLSecOps encompasses everything from securing the data used to train models to monitoring deployed models for vulnerabilities, with the goal to ensure the integrity, reliability, and fairness of ML systems throughout their development and operation. Within MLSecOps, AI-SPM focuses on the specific security needs of AI systems, which often involve more complex models and functionalities compared to traditional ML. This complexity introduces unique security challenges that AI-SPM addresses --- [data security](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown), model security, model monitoring, and regulatory compliance. And the benefits of AI-SPM within MLSecOps are indisputable: * **Enhanced Security Posture**: By proactively addressing AI-specific security risks, AI-SPM strengthens the overall security posture of the organization's ML pipelines and deployed models. * **Improved Trust in AI**: AI security fosters trust in AI systems, making them more reliable and easier to integrate into business processes. * **Faster and More Secure Innovation**: AI-SPM facilitates a secure environment for AI development, allowing organizations to confidently innovate with AI technologies. ## AI-SPM FAQs ### What is grounding AI models and is it different from training them? Grounding and training are two distinct aspects of developing AI models, though they both contribute to the functionality and effectiveness of these systems. Grounding involves linking the AI's operations, such as language understanding or decision-making processes, to real-world contexts and data. It's about making sure that an AI model's outputs are applicable and meaningful within a practical setting. For example, grounding a language model involves teaching it to connect words with their corresponding real-world objects, actions, or concepts. This comes into play with tasks like image recognition, where the model must associate the pixels in an image with identifiable labels that have tangible counterparts. Training refers to the process of teaching an AI model to make predictions or decisions by feeding it data. During training, the model learns to recognize patterns, make connections, and essentially improve its accuracy over time. This occurs as various algorithms adjust the model's internal parameters, often by exposing it to large datasets where the inputs and the desired outputs (labels) are known. The process enhances the model's ability to generalize from the training data to new, unseen situations. The main difference between grounding and training lies in their focus and application: * **Grounding** is about ensuring relevance to the real world and practical utility, creating a bridge between abstract AI computations and tangible real-world applications. * **Training** involves technical methodologies to optimize the model's performance, focusing primarily on accuracy and efficiency within defined tasks. ### What is model contamination? Model contamination refers to the unintended training of AI models on sensitive data, which could expose or [leak](https://www.paloaltonetworks.com/cyberpedia/data-leak) the [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) through its outputs, logs, or interactions once it's deployed and used for inference or generation tasks. AI-SPM aims to detect and prevent contamination. ### Are CSPM and AI-SPM both required for AI security governance? CSPM and AI-SPM are aligned but distinct risk management areas --- the former focusing on cloud infrastructure posture, the latter on securing the AI system lifecycle through data, model, and runtime protections. As AI adoption grows, implementing both CSPM and AI-SPM in a coordinated manner will be critical for comprehensive AI security governance. ### What role visibility and control play in AI security posture management? Visibility and control are crucial components of AI security posture management. To effectively manage the security posture of AI and ML systems, organizations need to have a clear understanding of their AI models, the data used in these models, and the associated infrastructure. This includes having visibility into the AI supply chain, data pipelines, and cloud environments. With visibility, organizations can identify potential risks, misconfigurations, and compliance issues. Control allows organizations to take corrective actions, such as implementing security policies, remediating vulnerabilities, and managing access to AI resources. ### What is an AIBOM? An AI bill of materials (AIBOM) is the master inventory that captures all components and data sources that go into building and operating an AI system or model. Providing much needed end-to-end transparency to govern the AI lifecycle, the AIBOM opens visibility into: * The training data used to build the AI model * Any pretrained models or libraries leveraged * External data sources used for grounding or knowledge retrieval * The algorithms, frameworks, and infrastructure used * APIs and data pipelines integrated with the model * Identity info on humans/services with access to the model Think of the AIBOM like a [software bill of materials (SBOM)](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom) but focused on mapping the building blocks, both data and operational, that comprise an AI system. ### What is explainability? In the context of AI security, explainability is the ability to understand and explain the reasoning, decision-making process, and behavior of AI/ML models, especially when it comes to identifying potential security risks or vulnerabilities. Key aspects of explainability include: * Being able to interpret how an AI model arrives at its outputs or decisions based on the input data. This helps analyze if the model is behaving as intended or if there are any anomalies that could indicate security issues. * Having visibility into the inner workings, parameters, and logic of the AI model rather than treating it as a black box. This transparency aids in auditing the model for potential vulnerabilities or biases. * The ability to trace the data sources, algorithms, and processes involved in developing and operating an AI model. This endows explainability over the full AI supply chain. * Techniques to validate and explain the behavior of AI models under different conditions, edge cases, or adversarial inputs to uncover security weaknesses. * Increasingly, AI regulations require explainability as part of accountability measures to understand if models behave ethically, fairly, and without biases. Explainability is integral to monitoring AI models for anomalies, drift, and runtime compromises, for investigating the root causes of AI-related incidents, and for validating AI models against security policies before deployment. ### What are notebooks in the AI/ML development workflow? Notebooks refer to interactive coding environments like Jupyter Notebooks or Google Colab Notebooks. They allow data scientists and ML engineers to write and execute code for data exploration, model training, testing, and experimentation in a single document that combines live code, visualizations, narrative text, and rich output. Facilitating an iterative and collaborative model development process, notebooks, via the code they contain, define the data pipelines, preprocessing steps, model architectures, hyperparameters etc. From an AI security perspective, notebooks are important assets that need governance because: 1. They often contain or access sensitive training datasets. 2. The model code and parameters represent confidential intellectual property. 3. Notebooks enable testing models against adversarial samples or attacks. 4. Shared notebooks can potentially leak private data or model details. ### What is the AI supply chain? The AI supply chain refers to the end-to-end process of developing, deploying, and maintaining AI models --- including data collection, model training, and integration into applications. In addition to the various stages involved, the AI supply chain encompasses data sources, data pipelines, model libraries, APIs, and cloud infrastructure. Managing the AI supply chain is essential for ensuring the security and integrity of AI models and protecting sensitive data from exposure or misuse. ### What are common AI attack vectors? AI attack vectors are the various ways in which threat actors can exploit vulnerabilities in AI and ML systems to compromise their security or functionality. Some common AI attack vectors include: * **Data poisoning**: Manipulating the training data to introduce biases or errors in the AI model, causing it to produce incorrect or malicious outputs. * **Model inversion**: Using the AI model's output to infer sensitive information about the training data or reverse-engineer the model. * **Adversarial examples**: Crafting input data that is subtly altered to cause the AI model to produce incorrect or harmful outputs, while appearing normal to human observers. * **Model theft**: Stealing the AI model or its parameters to create a replica for unauthorized use or to identify potential vulnerabilities. * **Infrastructure attacks**: Exploiting vulnerabilities in the cloud environments or data pipelines supporting AI systems to gain unauthorized access, disrupt operations, or exfiltrate data. ### How does artificial intelligence and machine learning contribute to security blind spots? Artificial intelligence and machine learning can create security blind spots due to the complex nature of AI systems, the rapid pace of adoption, and the vast amount of data involved. As organizations deploy AI and ML models across diverse cloud environments, the traditional security tools and approaches may not adequately address the unique risks associated with these models. For example, data poisoning attacks or adversarial examples can exploit the AI model's behavior, leading to compromised outputs. Additionally, the dynamic and interconnected nature of AI systems can make it difficult to track and secure data, resulting in potential data exposure and compliance issues. ### What is model corruption and AI model misuse? Model corruption refers to the process of altering or tampering with an AI model's parameters, training data, or functionality, which can lead to compromised performance or malicious outputs. Attackers may corrupt models through data poisoning, adversarial examples, or other techniques that manipulate the model's behavior. AI model misuse, on the other hand, occurs when threat actors or unauthorized users exploit AI models for malicious purposes, such as generating deepfakes, enabling automated attacks, or circumventing security measures. Both model corruption and misuse can undermine the integrity, security, and trustworthiness of AI systems. ### How does AI adoption impact complex environments and unified visibility? AI adoption introduces new complexities to IT environments, as organizations must deploy and manage diverse AI models, data pipelines, and cloud resources. This increased complexity can make it challenging to maintain unified visibility across the entire AI landscape, leading to potential security blind spots and increased risk. Traditional security tools may not be well suited to address the specific risks and challenges associated with AI systems, leaving organizations vulnerable to AI-specific attack vectors. As a result, organizations need to adopt advanced security solutions designed specifically for AI and ML systems to ensure comprehensive visibility and control. ### What is model sprawl and how does it relate to AI inventory? Model sprawl occurs when organizations develop and deploy a large number of AI models without a clear understanding of their inventory, usage, and associated risks. As AI adoption grows, organizations may experiment with various models, leading to a proliferation of AI systems across different cloud environments. This can result in shadow AI models, which are models that lack proper documentation, governance, and security controls. Model sprawl can contribute to compliance violations, data exfiltration, and increased attack surfaces. To address model sprawl, organizations need to maintain a comprehensive AI inventory, which includes tracking and managing all AI models, their associated data, and cloud resources, to ensure proper governance and security. ### What are shadow AI models and how do they contribute to compliance violations and data exfiltration? Shadow AI models are AI systems that lack proper documentation, governance, and security controls, often resulting from model sprawl and decentralized development processes. These models may be deployed without the knowledge or approval of security teams, posing a significant risk to an organization. Shadow AI models can contribute to compliance violations by processing sensitive data without adhering to privacy regulations or established security policies. Additionally, the lack of visibility and control over shadow AI models can increase the likelihood of data exfiltration, as attackers may exploit vulnerabilities in these poorly managed systems to access and steal sensitive information. ### How do AI-powered applications affect governance and privacy regulations? AI-powered applications introduce new challenges for governance and privacy regulations, as they process vast amounts of data and involve complex, interconnected systems. Compliance with privacy regulations, such as [GDPR](https://www.paloaltonetworks.com/cyberpedia/gdpr-compliance) and [CCPA](https://www.paloaltonetworks.com/cyberpedia/ccpa), requires organizations to protect sensitive data, maintain data processing transparency, and provide users with control over their information. AI-powered applications can complicate these requirements due to the dynamic nature of AI models, the potential for unintended data exposure, and the difficulty of tracking data across multiple systems and cloud environments. Consequently, organizations must adopt robust data governance practices and AI-specific security measures to ensure compliance and protect user privacy. ### What is the significance of AI-focused legislation and strict controls in managing customer data? AI-focused legislation and strict controls are crucial for ensuring that organizations handle customer data responsibly and ethically in the context of AI and machine learning systems. These regulations aim to establish standards for AI system transparency, fairness, and accountability, while also addressing the unique risks and challenges associated with AI-powered applications. By adhering to AI-focused legislation and implementing strict controls, organizations can prevent the misuse of customer data, mitigate potential biases in AI models, and maintain the trust of their customers and stakeholders. Furthermore, compliance with these regulations helps organizations avoid costly fines, reputational damage, and potential legal consequences associated with privacy violations and improper data handling. ### What is the importance of model development, training, and policy consistency in AI security posture management? Ensuring robust model development, comprehensive training, and policy consistency is vital for AI security posture management. Secure model development minimizes vulnerabilities and risks, while thorough training processes help models learn from accurate, unbiased data, reducing the likelihood of unintended or harmful outputs. Policy consistency applies security policies and standards uniformly across AI models, data, and infrastructure, enabling organizations to maintain a strong security posture and address threats effectively. Together, these aspects form the foundation for a secure and reliable AI environment. ### How can sensitive information be protected within AI models and the AI supply chain? To protect sensitive information within AI models and the AI supply chain, organizations should implement robust data security practices and AI-specific security measures. Key strategies include identifying and categorizing sensitive data, implementing strict access controls, encrypting data at rest and in transit, continuously monitoring AI models and data pipelines, and ensuring compliance with relevant privacy regulations and security policies. These measures create a secure environment that safeguards sensitive data from unauthorized access and misuse. ### What are the common vulnerabilities and misconfigurations in AI models and data pipelines? AI models and data pipelines can be prone to vulnerabilities and misconfigurations such as insecure data storage, inadequate authentication and authorization mechanisms, misconfigured cloud resources, unsecured data transfer, and insufficient monitoring and logging. These issues can expose sensitive data, allow unauthorized access to AI models and data pipelines, and hinder the detection of security incidents or anomalies. Addressing these vulnerabilities and misconfigurations is essential for maintaining a robust AI security posture and protecting valuable information. ### How do user interactions with AI models contribute to potential security risks? User interactions with AI models can introduce security risks, as they may inadvertently expose sensitive information, inject malicious inputs, or exploit vulnerabilities in the AI system. Insufficient access controls, weak authentication, or inadequate input validation can lead to unauthorized access or misuse of AI models. Additionally, users may unintentionally provide biased or misleading data during model training, resulting in unintended or harmful outputs. To mitigate these risks, organizations must implement robust security measures, including access controls, input validation, and ongoing monitoring of user interactions. ### What constitutes abnormal activity in AI models and how can it be detected? Abnormal activity in AI models can include unexpected changes in model behavior, unusual data access patterns, unauthorized modifications, or signs of external tampering. Detecting such activities requires continuous monitoring of AI models, data pipelines, and associated infrastructure. Implementing anomaly detection techniques, such as statistical analysis, machine learning algorithms, or rule-based systems, can help identify deviations from normal behavior. Additionally, organizations should establish baselines for typical model performance and user interactions to facilitate the detection of abnormal activities and potential security threats. ### How can AI security posture management monitor and protect sensitive data in model outputs? AI security posture management can monitor and protect sensitive data in model outputs by implementing a combination of data-centric security measures and output validation processes. Data-centric security measures, such as data classification, encryption, and access controls, ensure that sensitive information in model outputs is adequately protected. Output validation processes, including input-output correlation analysis, result verification, and anomaly detection, help identify, and prevent the disclosure of sensitive data or unintended consequences. Continuous monitoring of AI model performance and user interactions also plays a crucial role in safeguarding sensitive data in model outputs. ### How do encryption, logging, retention, authentication, and authorization affect AI security? Encryption, logging, retention, authentication, and authorization play crucial roles in maintaining AI security by safeguarding the confidentiality, integrity, and availability of AI models and data. Encryption prevents unauthorized access and data breaches by protecting sensitive data at rest and in transit. Logging tracks AI model activities and data pipeline operations, facilitating detection and investigation of security incidents. Retention policies manage data storage duration, ensuring secure disposal when no longer needed. Authentication verifies the identity of users and systems accessing AI models and data, while authorization enforces access controls and permissions to prevent unauthorized access or misuse. Collectively, these measures contribute to a robust AI security strategy. ### What is the role of real-time detection and response in preventing high-priority security incidents? Real-time detection and response play a critical role in preventing high-priority security incidents by enabling organizations to swiftly identify and address potential threats, vulnerabilities, and anomalies. By continuously monitoring AI models, data pipelines, and associated infrastructure, real-time detection systems can promptly detect abnormal activities, unauthorized access attempts, or signs of external tampering. Rapid response capabilities, including automated remediation measures and incident response plans, allow organizations to effectively mitigate security risks, minimize potential damage, and maintain the trustworthiness of their AI systems. Related Content [AI-SPM Ensures Security and Compliance of AI-Powered Applications Learn AI model discovery and inventory, data exposure prevention, and posture and risk analysis in this AI-SPM datasheet.](https://www.paloaltonetworks.com/resources/datasheets/aispm-secure-ai-applications?ts=markdown) [Securing the Data Landscape with DSPM and DDR Stay ahead of the data security risks. Learn how data security posture management (DSPM) with data detection and response (DDR) fills the security gaps to strengthen your security ...](https://www.paloaltonetworks.com/resources/guides/dspm-ddr-big-guide?ts=markdown) [AI-SPM: Security and Compliance for AI-Powered App Prisma Cloud AI-SPM addresses the unique challenges of deploying AI and Gen AI at scale while helping reduce security and compliance risks.](https://www.paloaltonetworks.com/blog/prisma-cloud/ai-spm/) [Security Posture Management for AI Learn how to protect and control your AI infrastructure, usage and data with Prisma Cloud AI-SPM.](https://www.paloaltonetworks.com/prisma/cloud/ai-spm?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20AI%20Security%20Posture%20Management%20%28AI-SPM%29%3F&body=Discover%20AI%20security%20posture%20management%20%28AI-SPM%29%2C%20its%20importance%2C%20differences%20from%20CSPM%20and%20DSPM%2C%20and%20its%20role%20in%20application%20development%20and%20AI%20security.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/ai-security-posture-management-aispm) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) What Is Artificial Intelligence (AI)? [Next](https://www.paloaltonetworks.com/cyberpedia/ai-worm?ts=markdown) What Is an AI Worm? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language