Resource Center

Our library of online content is here to help you learn more—no matter what format you prefer or which topic interests you most.

Explore resources

Clear

Filters

    Results
    Displaying 19 to 36 of 156156 Results
    Article

    What are Ransomware Attacks?

    Read the story
    CBTS resolves incidents in seconds with platformization, Cortex XSIAM
    References and Case Studies

    CBTS resolves incidents in seconds with platformization, Cortex XSIAM

    Read the customer story
    asset pdf thumbnail
    Article

    Cortex XSOAR Threat Intelligence Management

    Read the story
    Sabre’s cybersecurity defenses take off, fueled by Unit 42
    References and Case Studies

    Sabre’s cybersecurity defenses take off, fueled by Unit 42

    Read the customer story
    Louisiana scales security using AI-driven Cortex XSIAM
    References and Case Studies

    Louisiana scales security using AI-driven Cortex XSIAM

    Read the customer story
    Wits University  protects 41,000  students with  modern, AI-based  security operations
    References and Case Studies

    Wits University protects 41,000 students with modern, AI-based security operations

    Read the customer story
    Supreme Committee for Delivery & Legacy safeguards the World Cup Qatar 2022 tournament
    References and Case Studies

    Supreme Committee for Delivery & Legacy safeguards the World Cup Qatar 2022 tournament

    Read the customer story
    Article

    How Does a CISO Effectively Manage the Attack Surface?

    Read the story
    Supreme Committee for Delivery & Legacy protects the World Cup Qatar 2022 with Palo Alto Networks Cortex
    References and Case Studies

    Supreme Committee for Delivery & Legacy protects the World Cup Qatar 2022 with Palo Alto Networks Cortex

    Read the customer story
    AI-powered automation helps Aguas Andinas reduce security administration time by 98%
    References and Case Studies

    AI-powered automation helps Aguas Andinas reduce security administration time by 98%

    Read the customer story
    Article

    What is Multifactor Authentication?

    Read the story
    Article

    What is the Role of EDR in Digital Forensics and Incident Response (DFIR)?

    Read the story
    Flex Case Study
    References and Case Studies

    Flex Case Study

    Read the customer story
    Article

    What Is Smishing?

    Read the story
    Playtika shifts left – and shrinks development time, cost, and risk
    References and Case Studies

    Playtika shifts left – and shrinks development time, cost, and risk

    Read the customer story
    Registers of Scotland accelerates transformation with innovative Palo Alto Networks CDSS support
    References and Case Studies

    Registers of Scotland accelerates transformation with innovative Palo Alto Networks CDSS support

    Read the customer story