I’ve worked in the cybersecurity field for over 15 years now and have had the opportunity to witness the security evolution of many companies and organizations over that tenure. One of the most challenging, but rewarding, journeys continues to be hardening Department of Defense (DoD) networks. The scale, reach and critical nature of the mission requires capabilities that push the limits every day....
I’ve worked in the cybersecurity field for over 15 years now and have had the opportunity to witness the security evolution of many companies and organizations over that tenure. On...
As the hype around AI continues to ramp up, cybersecurity practitioners are trying to separate reality from fiction when it comes to how artificial intelligence will impact their field. Our discussion includes some candid pre...
The debate over cybersecurity platforms versus “best-of-breed” point solutions has been a hot topic within the cybersecurity industry for years. Platform solutions have often been criticized for capabilities that are only “go...
On April 10, 2024 Palo Alto Networks Product Security Incident Response Team (PSIRT) learned of a suspicious exfiltration attempt at a customer site from Volexity's Steven Adair. O...
CISA is requesting input on a new proposed rule that introduces a requirement for critical infrastructure organizations to report substantial cyber incidents and ransomware payment...
The intensity of today’s threat landscape has put organizations at greater risk of a breach. However, vulnerability can be looked at as the birthplace...
Today, Palo Alto Networks is sharing its vision for fully autonomous cybersecurity at our virtual event Prepare for a Brand-New Fight. As part of that...
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals looking for ways to embrace AI usa...
The future of secure networking is here with PAN-OS 11.2 Quasar, Quantum-Safe VPN, ADEM for next-generation firewalls, Advanced DNS Security and the introduction of new ruggedized...
Google Cloud and Palo Alto Networks are excited to announce the general availability of Google Cloud Next-Generation Firewall (NGFW) Enterprise. Power...
Every week, we get the privilege of talking to customers and thought leaders across diverse industries, delving into their cybersecurity challenges. A...
Businesses are adopting cloud-driven services at an unprecedented rate and utilizing SaaS apps to deliver their services. With the hybrid workforce here to stay, enterprises are ch...
At Palo Alto Networks, we innovate based on first principles across security, performance, and availability. As part of our continued commitment to our customers, we constantly benchmark apps and infrastructure to identify th...
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals look...
If anyone knows about the importance of rapid response when it comes to effectively solving cloud security issues, it's Bill Ho, a Prisma Cloud Solution Architect and expert on clo...
Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the skilled resourc...
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management...
If you’ve ever questioned the importance of vulnerability management, consider these facts:To make matters worse, attackers are wasting no time in taking advantage of this wave, exploiting vulnerabilities withi...
In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP Authorized status, providing unparalleled security for moderni...
Security breaches can cost millions. Everyone answers to someone — whether it's a manager, director, CISO, CEO or the company board. They’re going to want to know how security teams are protecting their infrast...
Prisma Cloud has added the Telecommunications Security Act to its list of out-of-the-box compliance standards. With this release, public electronic co...
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics.
Kubernetes has revolutionized the way we deploy and manage applications, but its complexity and dynamic nature also introduce a new set of security ch...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
As the hype around AI continues to ramp up, cybersecurity practitioners are trying to separate reality from fiction when it comes to how artificial intelligence will impact their field. Our discussion includes some candid pre...
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cybert...
We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reaso...
This article examines the distribution of malicious payloads embedded in Microsoft OneNote files by type, a first in our research to do so at such a scale....
We provide a walkthrough of how attackers leverage DNS tunneling for tracking and scanning, an expansion of the way this technique is usually exploited. ...
Muddled Libra now actively targets CSP environments and SaaS applications. Using the MITRE ATT&CK framework, we outline observed TTPs from incident response....
We describe the characteristics of malware-initiated scanning attacks. These attacks differ from direct scanning and are increasing according to our data....
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana. ...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.