• Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Industries
  • Partners
  • Why Palo Alto Networks?
  • Company
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Explore Zero Trust

Palo Alto Networks Introduces the Autonomous Security Platform, Cortex XSIAM, to reimagine SIEM and SOC Analytics

A major challenge in cybersecurity today is our inability to leverage massive scales of data for our defense. To meet this challenge, Palo Alto Networks (NASDAQ: PANW) today announced Cortex®...
See more

Palo Alto Networks Introduces PAN-OS 10.2 Nebula: The Industry's First Inline Deep Learning Protection for Network Security to Help Stop Sophisticated Attacks as They Happen

Palo Alto Networks (NASDAQ: PANW), a 10-time leader in network firewalls, today announced Nebula, the latest upgrade of its industry-leading PAN-OS software, to help find the evasive, zero-day...
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Topic

By Topic

  • Network Security (325)
  • Cloud Security (245)
  • Threat Detection and Prevention (173)
  • Security Operations (166)
  • Security Operating Platform (147)
  • Public Cloud Security (121)
  • Secure Access Service Edge (SASE)  (85)
  • Network Security Management (81)
  • Private Cloud Security (70)
  • Zero Trust (66)
  • Amazon Web Services (50)
  • Security Ecosystem (49)
  • Mobile Security (47)
  • Saas Security (43)
  • Google Cloud (42)
  • Microsoft Azure (40)
  • Secure Remote Workforce (30)
  • Data Center (24)
  • Remote Workforce (14)
  • Attack Surface Management (12)
  • VMWare NSX (6)
  • Microsoft Hyper-V (5)
  • Professional Services (5)
  • Cybersecurity Fundamentals (5)
  • Endpoint Security (4)
  • Next Generation Firewall (3)
  • Cloud Security (1)
  • KVM (1)
  • + Show More
By Industry

By Industry

  • Federal Government (62)
  • Higher Education (52)
  • Healthcare (46)
  • Financial Services (40)
  • High Technology (38)
  • IoT (36)
  • State & Local Government (35)
  • Other Industries (32)
  • K-12 Education (27)
  • Manufacturing (26)
  • ICS SCADA (21)
  • Retail (17)
  • Utilities & Energy (17)
  • Energy (12)
  • Education (9)
  • Automotive (8)
  • Media & Entertainment (8)
  • Transportation (8)
  • Service Provider & Telecommunications (7)
  • Airlines (6)
  • Pharma & Life Sciences (5)
  • Technology (5)
  • Professional & Legal Services (5)
  • Software Geographic Information Systems (2)
  • Nonclassifiable Establishments (1)
  • Aerospace & Defense (1)
  • + Show More
By Type

By Type

  • In The News (933)
  • Press Release (617)
  • White Paper (215)
  • Video (197)
  • Webinar (189)
  • Datasheet (179)
  • Customer Story (176)
  • Article (102)
  • Research Reports (90)
  • Guide (56)
  • Book (53)
  • Infographic (49)
  • Use Case (42)
  • Other (27)
  • Tech & Solution Brief (8)
  • Case Studies (3)
  • Presentations (3)
  • Tool (3)
  • Solution Brief (2)
  • Unit 42 (2)
  • Brochure (2)
  • Podcast (2)
  • Interactive Content (1)
  • + Show More
By Product Category

By Product Category

  • NGFW (279)
  • Prisma Cloud (190)
  • Cortex XDR (185)
  • VM-Series (122)
  • WildFire (102)
  • Prisma Access (100)
  • Cortex (87)
  • URL Filtering (82)
  • Cortex XSOAR (81)
  • Threat Prevention (78)
  • Panorama (76)
  • Unit 42 (60)
  • GlobalProtect (56)
  • Cortex Xpanse (48)
  • Prisma SD-WAN (47)
  • SaaS Security (47)
  • Threat Intel Management (34)
  • DNS Security service (22)
  • Prisma SASE (22)
  • PA-Series (19)
  • IoT Security (19)
  • PAN-OS 10.0 (17)
  • Okyo Garde (9)
  • Enterprise DLP (8)
  • Zero Trust (7)
  • CN Series (6)
  • Cloud NGFW (6)
  • Cortex XSIAM (5)
  • Advanced Threat Prevention (3)
  • Cortex Data Lake (1)
  • + Show More
Education and Professional Services

Education and Professional Services

  • Professional Services (23)
  • Transformation Services (9)
  • Customer Success (5)
  • Support (4)
  • Training (2)
  • Firewall Migration (1)
  • security life cycle review
Displaying 1 - 30 of 3507
Pagination
  • 1
  • 2
  • …
  • 116
  • 117

Unit 42

Hidden Devil in the Development Life Cycle: Google Play Apps Infected with Windows Executable Files

Unit 42 uncovers 145 malicious Google Play apps. Get the full report.
Yue Chen, Wenjun Hu, Xiao Zhang, Zhi Xu, July 30, 2018

Video

Security Lifecycle Review (SLR)

Security Lifecycle Review
June 6, 2016

Other

Security Lifecycle Review solution brief

A focused, free security risk assessment, the SLR produces a report that summarizes the volume and types of threat exposures and vulnerabilities identified on your network over a specified time period.
September 29, 2020

Datasheet

Breach Readiness Review

Unit 42 brings together world-class cyber researchers and elite incident responders to protect our digital way of life. With a deep-rooted reputation in delivering industry-leading threat intelligence, Unit 42 is now expanding its scope to provide state-of-the-art incident response and cyber risk management services. Our incident response consultants will serve as trusted partners to respond fast and contain threats completely, so you can get back to business in no time.
April 19, 2021

Webinar

4 Life Hacks to Love Your Security Job

This webinar will help. Designed with you in mind, it features our own Kasey Cross as well as Kerry Matre, author of Elements of Security Operations. Together, they’ll show you how you can cut down on repetitive tasks to spend more time investigating incidents and hunting for hidden threats.
March 2, 2020

Program

Unit 42 Threat Landscape Review

Report reviews the current threat landscape and puts a spotlight on malware attack vectors in key industries.
August 4, 2014

White Paper

HCL and Palo Alto Networks solution for life sciences & healthcare

Take advantage of our joint integrated approach to provide security services.
May 23, 2022

Video

Security Lifecycle Review (SLR) on the App Framework

Security Lifecycle Review (SLR) is a cloud-based application that analyzes the network traffic and reports on the business and security risks facing an organization to provide visibility into the network. SLR leverages the Palo Alto Networks Next Generation Firewall logs Cortex Data Lake data to identify the applications and threats exposing vulnerabilities in an organization’s security’s posture.
September 25, 2018

In The News

DHS Launches First-Ever Cyber Safety Review Board

Today, the U.S. Department of Homeland Security (DHS) announced the establishment of the Cyber Safety Review Board (CSRB), as directed in President Biden’s Executive Order 14028 on Improving the Nation’s Cybersecurity.
February 2, 2022

Unit 42

Review of Regional Malware Trends in EMEA: Part 1

Introduction As we head towards the end of the year it’s common to reflect on the year almost behind us and to predict what the new year approaching will bring in terms of security challenges. This blog is part of a series that describe malware trends seen in the EMEA (Europe Middle East and Africa)...
Alex Hinchliffe, December 23, 2016

In The News

Roll out of Cortex XSOAR by Palo Alto Networks designed to make life of security analyst easier

The cybersecurity firm introduced an extended security orchestration, automation and response platform this week to provide capabilities for security analysts to deal with threats across the enterprise.
March 2, 2020

Research Reports

A SANS Product Review: Streamline Your Enterprise Security with Cortex XDR

SANS.org conducts a hands-on product review of the Cortex XDR (Extended Detection and Response) platform, from the Enterprise perspective. Security Analysts, Architects, and SOC personnel can explore the features and capabilities that set apart Palo Alto Networks’ solutions from other security vendors.
February 16, 2022

Research Reports

A SANS Product Review: Streamline Your Enterprise Security with Cortex XDR

SANS.org conducts a hands-on product review of the Cortex XDR (Extended Detection and Response) platform, from the Enterprise perspective.
January 24, 2022

Unit 42

Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review

Apple’s official iOS App Store is well known for its strict code review of any app submitted by a developer. This mandatory policy has become one of the most important mechanisms in the iOS security ecosystem to ensure the privacy and security of iOS users. But we recently identified an app that demonstrated new ways...
Claud Xiao, February 21, 2016

Services

Breach Readiness Review

This service description document (“Service Description”) outlines the Unit 42 Breach Readiness Review service (“BRR Services”) for purchase by customers.
February 8, 2022

Unit 42

Using IDAPython to Make Your Life Easier: Part 6

In Part 5 of our IDAPython blog series, we used IDAPython to extract embedded executables from malicious samples. For this sixth installment, I’d like to discuss using IDA in a very automated way. Specifically, let's address how we’re going to load files into IDA without spawning a GUI, automatically run an IDAPython script, and extract...
Josh Grunzweig, June 9, 2016

Unit 42

Using IDAPython to Make Your Life Easier: Part 5

We continue our series on using IDAPython to make things easier for reverse-engineers by tackling a problem malware analysts deal with on an almost daily basis: extracting embedded executables. Malware will often store embedded executables in a number of ways. Some examples include attaching these files in the file’s overlay, including them as a PE...
Josh Grunzweig, January 14, 2016

Unit 42

Using IDAPython to Make Your Life Easier: Part 4

Earlier installments of this series (Part 1, Part 2 and Part 3) have examined how to use IDAPython to make life easier. Now let’s look at how reverse engineers can use the colors and the powerful scripting features of IDAPython.
Josh Grunzweig, January 6, 2016

Unit 42

Using IDAPython to Make Your Life Easier: Part 3

In the first two posts of this series (Part 1 and Part 2), we discussed using IDAPython to make your life as a reverse engineer easier. Now let’s look at conditional breakpoints. While debugging in IDA Pro, there are often situations where an analyst wishes to break on a specific address, but only when a...
Josh Grunzweig, January 4, 2016

Unit 42

Using IDAPython to Make Your Life Easier: Part 2

Continuing our theme of using IDAPython to make your life as a reverse engineer easier, I’m going to tackle a very common issue: shellcode and malware that uses a hashing algorithm to obfuscate loaded functions and libraries. This technique is widely used and analysts come across it often. Using IDAPython, we will take this challenging...
Josh Grunzweig, December 30, 2015

Unit 42

Using IDAPython to Make Your Life Easier: Part 1

As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to...
Josh Grunzweig, December 29, 2015

In The News

Protection of SCADA and ICS systems for life

March 23, 2015

Unit 42

SamSa Ransomware Attacks: A Year in Review

In March of this year, Unit 42 investigated the SamSa actors that were attacking the healthcare industry with targeted ransomware. With this group being active for roughly one year, we decided to revisit this threat to determine what, if any, changes had been made to their toolset. In doing so, we discovered that it’s been...
Josh Grunzweig, December 9, 2016

In The News

IDA to review login system for SingPass

June 6, 2014

Unit 42

Review of Regional Malware Trends in EMEA: Part 2

Unit 42 continues their look into the EMEA malware trends of the last six months.
Alex Hinchliffe, April 21, 2017

Guide

Guide: Container Security for Dummies

In this eBook you will learn how to begin addressing container security holistically, how to start embedding security across the entire container life cycle (i.e. DevSecOps), and how to gain full stack security awareness that will allow you to reduce, prioritize and automatically filter out alerts based on holistic, cloud context.
October 9, 2019

Video

Prisma Cloud Security Suite Expands with Twistlock and PureSec Acquisitions

The acquisitions of Twistlock and PureSec further advance Prisma leadership in public cloud security by providing customers with a comprehensive set of capabilities to secure all cloud workloads.
July 9, 2019

Video

Flexible Security Consumption

Video: Credit-based licensing meets changing security needs in minutes - Palo Alto Networks
June 25, 2021

Datasheet

SaaS Security Privacy

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
November 16, 2021

Press Release

KPIT Technologies Adopts Palo Alto Networks Security Operating Platform to Enable “Smart Enterprise”

SANTA CLARA, Calif. – September 6, 2018 – Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that KPIT has transformed its approach to cybersecurity by deploying Palo Alto Networks Security Operating Platform, including its firewalls and network security management.
Santa Clara, CASeptember 5, 2018
Displaying 1 - 30 of 3507
Pagination Bottom
  • 1
  • 2
  • …
  • 116
  • 117

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved