New capabilities enable customers to counter AI with AI, secure AI by design and simplify security.AI Is already transforming every enterprise. AI has...
One short-term prediction from Spisak is the emergence of AI-powered cybersecurity “assistants,” which he envisions will serve as co-pilots to defenders, boosting their efficiency...
Today, Palo Alto Networks is sharing its vision for fully autonomous cybersecurity at our virtual event Prepare for a Brand-New Fight. As part of that...
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals looking for ways to embrace AI usa...
The future of secure networking is here with PAN-OS 11.2 Quasar, Quantum-Safe VPN, ADEM for next-generation firewalls, Advanced DNS Security and the introduction of new ruggedized...
Google Cloud and Palo Alto Networks are excited to announce the general availability of Google Cloud Next-Generation Firewall (NGFW) Enterprise. Power...
Every week, we get the privilege of talking to customers and thought leaders across diverse industries, delving into their cybersecurity challenges. A...
Today, ransomware continues to be the most damaging form of cybercrime for organizations. Palo Alto Networks Unit42 threat research team found that demands ranged anywhere from $3,...
Accessing a site today should be as straightforward as sending a letter to a trusted friend across the country. Imagine corrupted postal workers swapping out your heartfelt letter...
Technology and testing research firm SecureIQLab has published its 2024 Advanced Cloud Firewall (ACFW) security validation report, which shows Palo Al...
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals looking for ways to embrace AI usa...
We are thrilled to announce that Internet Initiative Japan (IIJ), Japan’s pioneering internet service provider, has launched a powerful new solution: Palo Alto Networks Prisma SASE...
Prisma Access, a market-leading security service edge (SSE) component of Palo Alto Networks flagship Prisma SASE solution, is expanding its support for IPv6, extending beyond priva...
Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the skilled resourc...
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management...
If you’ve ever questioned the importance of vulnerability management, consider these facts:To make matters worse, attackers are wasting no time in taking advantage of this wave, exploiting vulnerabilities withi...
In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP Authorized status, providing unparalleled security for moderni...
Security breaches can cost millions. Everyone answers to someone — whether it's a manager, director, CISO, CEO or the company board. They’re going to want to know how security teams are protecting their infrast...
Prisma Cloud has added the Telecommunications Security Act to its list of out-of-the-box compliance standards. With this release, public electronic co...
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics.
The adoption of cloud infrastructure for application modernization is a significant trend, and healthcare is no different. However, the sensitive nature of health data, combined with the healthcare sector's inc...
There are a lot of moving parts in security operations. As cyberthreats continue advancing in speed and complexity, analysts must investigate and reme...
As the hype around AI continues to ramp up, cybersecurity practitioners are trying to separate reality from fiction when it comes to how artificial intelligence will impact their field. Our discussion includes some candid pre...
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cybert...
We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reaso...
Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evolving cybersecurity landscape. However, simply receivin...
Data exfiltration refers to the unauthorized transfer of sensitive or confidential information from a network or system to an external location. This covert activity often occurs s...
Muddled Libra now actively targets CSP environments and SaaS applications. Using the MITRE ATT&CK framework, we outline observed TTPs from incident response....
We describe the characteristics of malware-initiated scanning attacks. These attacks differ from direct scanning and are increasing according to our data....
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana. ...
We unravel the details of two large-scale StrelaStealer campaigns from 2023 and 2024. This email credential stealer has a new variant delivered through zipped J...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.