Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
Don't just discover. Quantify. The CLARA assessment combines three analyses—network, firewall, and AI—to provide a single, data-driven view of your true cloud and AI risk.
Accelerate your AI transformation safely. See why Palo Alto Networks' integrated AI Security Platform is essential to secure GenAI usage and developme...
Agentic browsers introduce a new, uncontrolled attack surface to the enterprise. Learn how Prisma Browser Extension restores critical security controls like visibility and threat mitigation.
Kubernetes identity security demands clarity. Learn how KIEMPossible uncovers entities, permissions and usage to help you reduce identity attack surfa...
Cloud data security is critical. Learn how Snowflake users can mitigate risks with effective data security posture management (DSPM) and enhanced secu...
Initial-access risks in AWS demand clarity. Uncover how service exposure and access-by-design flaws open cloud perimeters and learn how to secure them...
Kubernetes security depends on smart scanning. Compare agentless and agent-based approaches to find the right balance between coverage and runtime def...
Cloud permissions outpace control. Learn how CIEM restores visibility, enforces least privilege, and secures every identity in dynamic cloud environments.
Introducing Malicious LDAP Query Protection for Cortex ITDR. Get real-time, autonomous prevention to stop Active Directory reconnaissance attacks and blind attackers
Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and ...
Two campaigns delivering Gh0st RAT to Chinese speakers show a deep understanding of the target population's virtual environment and online behavior....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts