Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
Threat Group Assessment: Turla (aka Pensive Ursa)
Threat Group Assessment: Muddled Libra (Updated)
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research

How Eight Organizations Transformed Their Security Operations with Cortex

SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
See more

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
See more
Displaying 1 - 30 of 159
Pagination Bottom
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Event

Fight Tech with Tech

Embracing the AI Revolution in SecOps Modern applications, workloads and microservices are generating vast amounts of data faster than most security operations centers (SOCs) can adapt. And security teams operating on a legacy SOC model can spend hours — even days — triaging a single threat event. How can SOC teams outpace modern threats? By fighting technology with technology and leaning into AI to augment analysts, SOC teams can amp up their defenses and focus on more critical issues. Join us to hear how real teams improved their security outcomes with a machine-led, human-empowered SecOps platform. At the event, you will hear detailed Cortex® XSIAM™ case studies. Gain insights on: ● Unleashing machine learning and automation in your SOC. ● Streamlining your existing security stack, including SIEM and endpoint. ● Outperforming benchmarks for detection and response times. Save your seat today!
Zoom Webinar
October 17, 2023
11:30 AM SST

Event

SASE Masterclass

In today's world, as work becomes more location-independent, the attack surface has expanded exponentially. Adopting a SASE architecture helps you create and enforce a consistent security posture without compromising workforce agility, enabling your employees to access data and applications from anywhere. If you would like to gain unprecedented visibility across your network while ensuring flexible, resilient user access irrespective of the location, then this Masterclass is for you. Join the SASE Masterclass to confidently assess if your organization is ready to embrace SASE. What can you expect to learn? Driving the future with AI-powered SASE Customer insights: Branch transformation with Single vendor SASE vs. Mix-and-Match Deploying a successful SASE architecture Also, learn from real-world use cases to understand if your organization is ready to adopt SASE. Witness SASE in motion and benefit from best practices and SASE design principles. Sign up for the session today!
ON24 Webinar
October 5, 2023
11:30 AM SST

Video

Securing the Future: Leadership Lessons in Building Secure Operations

FedTalks 2023, Presented by FedScoop. Live from the Waldorf Astoria in Washington, D.C..
September 19, 2023

Event

Trick or Treat… or Threat?

Modern security threats are evolving at a faster pace than security technologies. Well-funded threat actors are investing in tools like machine learning (ML), automation and artificial intelligence (AI). SOCs with legacy technologies aren’t equipped to accurately detect and defend modern attacks. How can security technologies fight back? Join our upcoming live webinar to learn how you can transform SecOps to combat advanced attacks and improve efficiencies to get your SOC ready for the future. In this webinar, we will share our SOC transformation playbook that highlights: Today’s cyberthreats The challenges facing traditional SOCs 5 steps to building a super SOC 4 superpowers for building a resilient and effective SOC Register now and get ready to activate your SOC superpowers.
ON24 Webinar
October 31, 2023
11:30 AM SST

References and Case Studies

Protecting patients during the pandemic by securing the Internet of Medical Things

A healthcare provider relies on Palo Alto Networks to provide comprehensive medical IoT security
September 10, 2023

Whitepaper

AI & The Modern SOC: Winning Tomorrow’s Cyber Mission Through Advanced Capabilities

Advanced AI will radically change the nature of government operations, policy and security, including changing the capabilities of human teams.
September 10, 2023

Presentation

Protecting patients during the pandemic by securing the Internet of Medical Things

A large public sector healthcare organization had millions of unsecured IoMT and IoT devices jeopardizing patient care, data privacy, and network security.
September 3, 2023

Research Reports

Frost Radar™: Cloud Workload Protection Platforms, 2023

Cloud workload protection platform (CWPP) solutions evaluated by Frost and Sullivan in the 2023 Frost Radar report help organizations match the CWPP to their needs.
August 15, 2023

Other

Secure Your Entire Organization with Cybersecurity Solutions That Work Better Together

Today’s organizations are complex, cloud-enabled, and continually transforming—with increasingly larger IT environments and more distributed endpoints.
August 2, 2023

References and Case Studies

8곳의 기업에서 Cortex®를 통해 보안 운영을 혁신한 방법

SOC 팀은 적절한 모델, 리소스, 데이터를 갖춘 AI로 사이버 보안을 자동화하고 오늘날 네트워크에서 발견되는 위협의 양과 정교함을 처리할 수 있어야 합니다.
June 23, 2023

References and Case Studies

Cómo han logrado ocho organizaciones transformar sus operaciones de seguridad con Cortex®

Los equipos del SOC necesitan inteligencia artificial (los modelos, recursos y datos) para automatizar la ciberseguridad y estar a la altura del volumen y el nivel de sofisticación de las amenazas presentes en las redes actuales.
June 23, 2023

References and Case Studies

Como oito organizações transformaram suas operações de segurança com o Cortex®

As equipes de SOC precisam de IA — os modelos, os recursos e os dados certos — para automatizar a segurança cibernética para que possam lidar com o volume e a sofisticação das ameaças vistas nas redes hoje.
June 23, 2023

References and Case Studies

8 つの組織での CORTEX® による セキュリティ運用の 変革事例

今日のネットワークで見られる脅威の量と巧妙さにSOCチームが対処するにはサイバーセキュリティを自動化するAIが必要であり、それには適切なモデル、リソース、データが要求されます。
June 23, 2023

References and Case Studies

八家企業如何使用 Cortex® 進行安全作業的轉型

SOC 團隊需要 AI (正確的模型、資源和數據) 自動實現網路安全性,藉以因應現在網路上出現的威脅數量和複雜度。
June 23, 2023

References and Case Studies

Come otto organizzazioni hanno trasformato le proprie operazioni di sicurezza con Cortex®

I SOC hanno bisogno dell'intelligenza artificiale, con i modelli, le risorse e i dati giusti, per automatizzare la sicurezza informatica, in modo da poter gestire il volume e il livello di sofisticazione delle minacce che colpiscono oggi le nostre reti.
June 23, 2023

References and Case Studies

Comment huit entreprises ont transformé leurs opérations de sécurité avec Cortex®

Ce qu’il leur faut, c’est une intelligence artificielle combinant les bons modèles, les bonnes ressources et les bonnes données. Seule cette technologie leur permettra d’automatiser leur sécurité pour mieux faire face au volume et au niveau de sophistication des menaces qui planent sur les réseaux.
June 23, 2023

References and Case Studies

So haben acht Unternehmen ihre Security Operations mithilfe von Cortex® transformiert

SOC-Teams benötigen KI – mit den richtigen Modellen, Ressourcen und Daten –, um die Cybersicherheit zu automatisieren. Nur so können sie die schiere Menge und die Komplexität der Bedrohungen bewältigen, die heute in Netzwerken auftreten.
June 23, 2023

References and Case Studies

了解八家企业如何利用 Cortex® 转变安全运营方式

SOC 团队需要使用人工智能(即合适的模型、资源和数据)来自动保障网络安全,以便应对当今网络的威胁数量和复杂性。
June 23, 2023

References and Case Studies

Cómo ocho organizaciones transformaron sus operaciones de seguridad con Cortex®

Los equipos de SOC necesitan IA, modelos, recursos y datos adecuados, para automatizar la ciberseguridad a fin de controlar el volumen y la complejidad de las amenazas detectadas en sus redes en la actualidad.
June 23, 2023

Whitepaper

Modernize federal operations and tackle cybersecurity complexity with Zero Trust

Keeping up with cyber threats in the highly regulated and cloud-enabled US Public Sector can be challenging.
June 5, 2023

Article

What is Cloud Security?

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
May 30, 2023

Event

Public Sector Ignite '23

Public Sector Ignite '23 will bring together leading cybersecurity experts and government luminaries to explore what’s next in cybersecurity.
Live Event
May 16, 2023
08:00 AM EST

Book

Ahead for SLED: Conversations with Security Leaders in State and Local Government

State, local, and education (SLED) organization’s IT and security teams face challenges with implementing security solutions while often dealing with limited budgets and staffing. Additionally, they must navigate rules and regulations at state and local levels, as well as federal regulations and requirements. This e-book showcases real-world conversations with SLED security leaders who discuss how Cortex XDR, Cortex XSOAR, and Cortex Xpanse help minimize those challenges via automation, analytics, and machine learning to transform their security operations.
April 18, 2023

References and Case Studies

How Eight Organizations Transformed Their Security Operations with Cortex

SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
April 17, 2023

Datasheet

Continuous Authority to Operate Using Prisma Cloud

Prisma Cloud helps enable DevSecOps and containerized development, making it easier to achieve a continuous Authority to Operate (ATO).
March 29, 2023

Datasheet

Prisma Cloud for Federal

Delivering code-to-cloud security for U.S. government multicloud environments.
March 29, 2023

Use Case

Cloud Native Security Across The Software Lifecycle

Federal departments and agencies will use the cloud as a new foundation upon which to build more effective security across domains, including cyberspace.
March 29, 2023

Article

Expanding Targets for New SunOrcal Malware Variant

Reaver malware family has shared command-and-control (C2) infrastructure overlap SunOrcal malware that has been used concurrently since late 2016.
March 28, 2023

Article

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
March 28, 2023

Use Case

Federal Government: Multi-Cloud Security, Governance and Compliance

The federal governments will use cloud as a new foundation to build more effective security capabilities across domains - including cyberspace. An explosion of government adoption of public, private, hybrid, and cloud services have introduced new ways to scale and deliver efficient operations across multiple cloud platforms. As federal agencies continue to transition and expand their footprint into the cloud, it is critical to ensure these systems are secure and vulnerabilities are addressed immediately.
March 20, 2023
Displaying 1 - 30 of 159
Pagination
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved