Security Operations

How Behavioral Analytics Stop Linux C2 & Credential Theft

How Behavioral Analytics Stop Linux C2 & Credential Theft

Learn how behavioral analytics detect Linux C2 communication and credential theft — including LOLBin abuse, beaconing malware, and post-exploitation credential access. See how Cort...
Mar 17, 2026
Modernising the SOC: Navigating the Shift to Platformization and Agentic AI

Modernising the SOC: Navigating the Shift to Platformization and Agentic AI

Explore a discussion between IDC analyst Duncan Brown and Palo Alto Networks about agentic AI and platformization strategies to modernise the SOC and ...
Mar 10, 2026
The Cartography of Risk: Operational Technology and the Public Internet

The Cartography of Risk: Operational Technology and the Public Internet

Cortex Xpanse OT Security: Map your external attack surface and protect industrial infrastructure. New Siemens research reveals a 332% rise in exposed OT devices.
Feb 24, 2026
Introducing Cortex XDR 5.0: The New Standard for Endpoint Security

Introducing Cortex XDR 5.0: The New Standard for Endpoint Security

Cortex XDR 5.0 redefines endpoint security with agentic AI, unified exposure management, endpoint DLP, and enhanced Linux & macOS protection.
Feb 24, 2026

Subscribe to Security Operations Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.