Organizations today are grappling with the complexities of digital transformation, a shifting threat landscape with the emergence of new technologies. Security teams are feeling this strain, struggling to ensure effective and resilient cybersecurity for an increasingly integrated IT-OT infrastructure. This dilemma is underscored...
On April 10, 2024 Palo Alto Networks Product Security Incident Response Team (PSIRT) learned of a suspicious exfiltration attempt at a customer site from Volexity's Steven Adair. O...
The intensity of today’s threat landscape has put organizations at greater risk of a breach. However, vulnerability can be looked at as the birthplace...
Today, Palo Alto Networks is sharing its vision for fully autonomous cybersecurity at our virtual event Prepare for a Brand-New Fight. As part of that...
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals looking for ways to embrace AI usa...
The future of secure networking is here with PAN-OS 11.2 Quasar, Quantum-Safe VPN, ADEM for next-generation firewalls, Advanced DNS Security and the introduction of new ruggedized...
Google Cloud and Palo Alto Networks are excited to announce the general availability of Google Cloud Next-Generation Firewall (NGFW) Enterprise. Power...
Every week, we get the privilege of talking to customers and thought leaders across diverse industries, delving into their cybersecurity challenges. A...
Today, ransomware continues to be the most damaging form of cybercrime for organizations. Palo Alto Networks Unit42 threat research team found that demands ranged anywhere from $3,...
At Palo Alto Networks, we innovate based on first principles across security, performance, and availability. As part of our continued commitment to our customers, we constantly benchmark apps and infrastructure to identify the key factors c...
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals look...
We are thrilled to announce that Internet Initiative Japan (IIJ), Japan’s pioneering internet service provider, has launched a powerful new solution: Palo Alto Networks Prisma SASE...
Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the skilled resourc...
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management...
If you’ve ever questioned the importance of vulnerability management, consider these facts:To make matters worse, attackers are wasting no time in taking advantage of this wave, exploiting vulnerabilities withi...
In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP Authorized status, providing unparalleled security for moderni...
Security breaches can cost millions. Everyone answers to someone — whether it's a manager, director, CISO, CEO or the company board. They’re going to want to know how security teams are protecting their infrast...
Prisma Cloud has added the Telecommunications Security Act to its list of out-of-the-box compliance standards. With this release, public electronic co...
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics.
The adoption of cloud infrastructure for application modernization is a significant trend, and healthcare is no different. However, the sensitive nature of health data, combined with the healthcare sector's inc...
Organizations face increasingly sophisticated cyberattacks in today's rapidly evolving threat landscape. Attackers leverage common tools and living-Of...
As the hype around AI continues to ramp up, cybersecurity practitioners are trying to separate reality from fiction when it comes to how artificial intelligence will impact their field. Our discussion includes some candid pre...
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cybert...
We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reaso...
Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evolving cybersecurity landscape. However, simply receivin...
We provide a walkthrough of how attackers leverage DNS tunneling for tracking and scanning, an expansion of the way this technique is usually exploited. ...
Muddled Libra now actively targets CSP environments and SaaS applications. Using the MITRE ATT&CK framework, we outline observed TTPs from incident response....
We describe the characteristics of malware-initiated scanning attacks. These attacks differ from direct scanning and are increasing according to our data....
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana. ...
We unravel the details of two large-scale StrelaStealer campaigns from 2023 and 2024. This email credential stealer has a new variant delivered through zipped J...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.