At Palo Alto Networks, we protect organizations and vital social structures from cybersecurity threats, building a world where each day is more safe and secure than the one before....
Artificial intelligence (AI) plays a crucial role in both defending against and perpetrating cyberattacks, influencing the effectiveness of security measures and the evolving natur...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Palo Alto Networks is taking charge in cybersecurity; this time it's by being acknowledged as a leader in The Forrester Wave™: Security Service Edge Solutions, Q1 2024 report.
The Department of Defense (DoD) is on a relentless mission to fortify its networks with a comprehensive, no-fail Zero Trust architecture. This approach demands robust security solutions that simultaneously navigate the comple...
Palo Alto Networks reaches a significant milestone as our commitment to comprehensive security achieves the largest number of StateRAMP marketplace approved cybersecurity offerings.
Google Cloud and Palo Alto Networks are excited to announce the general availability of Google Cloud Next-Generation Firewall (NGFW) Enterprise. Power...
Every week, we get the privilege of talking to customers and thought leaders across diverse industries, delving into their cybersecurity challenges. A...
Today, ransomware continues to be the most damaging form of cybercrime for organizations. Palo Alto Networks Unit42 threat research team found that demands ranged anywhere from $3,...
Accessing a site today should be as straightforward as sending a letter to a trusted friend across the country. Imagine corrupted postal workers swapping out your heartfelt letter...
Technology and testing research firm SecureIQLab has published its 2024 Advanced Cloud Firewall (ACFW) security validation report, which shows Palo Al...
A new report by ABI Research and Palo Alto Networks on the state of operational technology (OT) security found that, within the past year, one in four industrial enterprises said they had to shut down their ope...
Investing in Palo Alto Networks Cloud-Delivered Security Services (CDSS) provided a 357% return on investment (ROI) and net present value (NPV) of $10.04 million over 3 years, alon...
Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat actors are evolving their tools and technique...
We are thrilled to announce that Internet Initiative Japan (IIJ), Japan’s pioneering internet service provider, has launched a powerful new solution: Palo Alto Networks Prisma SASE...
Prisma Access, a market-leading security service edge (SSE) component of Palo Alto Networks flagship Prisma SASE solution, is expanding its support for IPv6, extending beyond priva...
In the current world with employees working from anywhere and most business applications delivered via internet-hosted web applications, web browsers have become an employee’s digi...
Palo Alto Networks is taking charge in cybersecurity; this time it's by being acknowledged as a leader in The Forrester Wave™: Security Service Edge Solutions, Q1 2024 report.
A few weeks ago, over 101,000 top decision-makers, inventors, and innovators came together at the world’s largest connectivity event, Mobile World Congress. Leading telcos, global...
Security breaches can cost millions. Everyone answers to someone — whether it's a manager, director, CISO, CEO or the company board. They’re going to want to know how security teams are protecting their infrast...
Prisma Cloud has added the Telecommunications Security Act to its list of out-of-the-box compliance standards. With this release, public electronic co...
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics.
The adoption of cloud infrastructure for application modernization is a significant trend, and healthcare is no different. However, the sensitive nature of health data, combined with the healthcare sector's inc...
In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce t...
By now you’ve likely heard about the vulnerability in XZ Utils Data Compression Library that impacted multiple Linux distributions (CVE-2024-3094) and read the threat brief Palo Alto Networks Unit 42 posted.
In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore sec...
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cybert...
We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reaso...
Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evolving cybersecurity landscape. However, simply receivin...
Data exfiltration refers to the unauthorized transfer of sensitive or confidential information from a network or system to an external location. This covert activity often occurs s...
One short-term prediction from Spisak is the emergence of AI-powered cybersecurity “assistants,” which he envisions will serve as co-pilots to defenders, boosting their efficiency...
Machine learning (ML) powered methods are rapidly taking over the cybersecurity medium, performing a variety of complex tasks, including detection, prevention, and prioritization. Albeit not required by all methods, accurate...
Muddled Libra now actively targets CSP environments and SaaS applications. Using the MITRE ATT&CK framework, we outline observed TTPs from incident response....
We describe the characteristics of malware-initiated scanning attacks. These attacks differ from direct scanning and are increasing according to our data....
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana. ...
We unravel the details of two large-scale StrelaStealer campaigns from 2023 and 2024. This email credential stealer has a new variant delivered through zipped J...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.