AI-generated code promises to reshape cloud-native application development practices, offering unparalleled efficiency gains and fostering innovation at unprecedented levels. However, amidst the allure of newfound technology lies a profound duality – the stark contrast between the benefits of AI-driven software development and the formidable security risks it introduces.
As senior director and assistant general counsel for Public Policy & Government Affairs at Palo Alto Networks, I have dedicated much of my career to navigating the intricate ne...
As enterprises increasingly transition to the public cloud, they face a crucial decision: should they manage software firewalls in-house or outsource this critical function to experts? This question arises amon...
Palo Alto Networks has been named a leader in OT security in The Forrester Wave™: Operational Technology Security Solutions, Q2 2024 report. We receiv...
New capabilities that dramatically improve the end-to-end process of seeing and securing connected medical devices for network security and clinical engineering teams
CISA is requesting input on a new proposed rule that introduces a requirement for critical infrastructure organizations to report substantial cyber incidents and ransomware payment...
The intensity of today’s threat landscape has put organizations at greater risk of a breach. However, vulnerability can be looked at as the birthplace...
Today, Palo Alto Networks is sharing its vision for fully autonomous cybersecurity at our virtual event Prepare for a Brand-New Fight. As part of that...
Effective communication and collaboration drive employee productivity and success in today's dynamic and hybrid work environment. However, ensuring a seamless virtual meeting experience poses significant challe...
In our last myth-busting blog post, we covered the myth surrounding points of presence (PoPs) and their impact on app performance. This post illuminates yet another fallacy: using caching servers to boost SaaS app performance...
Almost every company is becoming a technology company, adopting SaaS applications at a record pace and moving vast amounts of data and applications to the cloud. This drastically d...
Handling and securing sensitive data is a practice fraught with potential pitfalls such as inadvertent leaks, compliance violations, and the ever-present threat of cyberattacks.
Shadow IT and unmanaged cloud assets pose significant security risks for organizations. Prisma Cloud, in recent months, has addressed this visibility...
For cloud and development teams struggling with securing continuous rapid deployment (CI/CD) and needing faster security workflows, Prisma Cloud can help with cloud-native integrat...
For more than seven years now, cloud security posture management (CSPM) tools have provided cloud asset visibility, detected risky misconfigurations and monitored compliance postur...
Unaddressed security flaws can have significant repercussions — data breaches, financial loss, reputational damage — making vulnerability management critically important.
We’re quickly approaching the halfway point of 2024 and, with it, the advent of the summer security conference season. This got us thinking about our favorite go-to open-source security tools!
The journey toward formidable — invincible — cloud security involves not just technological changes but a fundamental shift in culture, mindset, and operational processes. But attempting to harness the power of the cloud while ensuring the security and resilience of cri...
Research By: Yinnon Meshi, Lior Rochberger, Eran Tamari, and Daniel FrankWhen dealing with sophisticated and evasive cyberattacks, one of the more cha...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with experts at Palo Alto Networks and Unit 42 who have roles in AI research, product management, consulting, engineering, and more.
As Chief Technology Officer for Unit 42 and a cybersecurity educator, I have a unique vantage point into the cyberthreat landscape. I recently had the honor of testifying before th...
We demonstrate effective methods to circumvent anti-analysis evasion techniques from GootLoader, a backdoor and loader malware distributed through fake forum po...
This threat brief details CVE-2024-6387, called RegreSSHion, an RCE vulnerability affecting connectivity tool OpenSSH servers on glibc-based Linux systems....
Virtual machines (VMs) are a significant attack target. Focusing on three major CSPs, this research summarizes the conditions for possible VM attack paths....
A Chinese APT group is targeting political entities across multiple continents. Named Operation Diplomatic Specter, this campaign uses rare techniques and a uni...
This article examines the distribution of malicious payloads embedded in Microsoft OneNote files by type, a first in our research to do so at such a scale....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.