Palo Alto Networks Prisma Cloud demonstrates how effective multicloud security hinges on achieving complete visibility across all deployed cloud resources.
Expanded attack surfaces have made OT systems a target for cyber threats, underscoring the need for a security framework tailored to remote OT environments.
We use the web browser to do everything these days. It’s where 85% of work happens, whether accessing your SaaS apps like checking a sales lead in Salesforce or requesting time off...
Prisma SASE is now available for U.S. federal agencies required to use cybersecurity solutions that meet stringent FedRAMP High Authorization criteria.
Secure your software supply chain with Prisma® Cloud, the top-ranked leader in GigaOm's Radar, offering end-to-end protection for cloud-native applications.
Discover 2025 cloud security trends, predictions on AI-driven threats, market consolidation, data security in CNAPPs, and more from Prisma Cloud leaders.
AI applications require rigorous AI security that complies with standards like OWASP Top 10 LLM application risks and NIST AI 600-1 to ensure safe dep...
Generative AI advancements enable powerful applications but introduce risks, requiring comprehensive security measures throughout the application life...
The complex landscape of cloud services, particularly in multi-cloud environments, poses significant security challenges for organizations. Unmanaged cloud resources, human error, misconfigurations and the incr...
Join Prisma Cloud by Palo Alto Networks at AWS re:Invent 2024 in Las Vegas for AI security sessions, in-booth theaters, JAM sessions and demos at booth #1124.
Data Security: New Prisma Cloud DSPM & Cortex XSOAR integration automates remediation, enhancing security and governance in diverse cloud environments...
For years, Deloitte's Cybersecurity Center had leveraged Cortex XSOAR on-premises to drive automation across its portfolio. Building on this success,...
Discover how Microsoft Graph API is used as an attack vector by threat actors through a real-world attack scenario. Find out why monitoring Microsoft Graph activity logs is importa...
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
Atomic Stealer, Poseidon Stealer and Cthulhu Stealer target macOS. We discuss their various properties and examine leverage of the AppleScript framework....
A Chinese-linked espionage campaign targeted entities in South Asia using rare techniques like DNS exfiltration, with the aim to steal sensitive data....
CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident response case....
Graph neural networks aid in analyzing domains linked to known attack indicators, effectively uncovering new malicious domains and cybercrime campaigns....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts