Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
AI systems scale from prototypes to production environments, as do the risks. Is your organization planning for the AI baby tiger or full-grown AI predator?
With complimentary Cloud and AI Risk Assessment (CLARA) services, you can see how well your network security works in AI and public cloud environments.
Prisma AIRS MCP Server is now available for public preview via PyPI/Github sample code. The new component of the platform helps customers secure AI ag...
Prisma SASE provides a secure, isolated and scalable way to navigate the complexities of digital transformation and the evolving nature of cyberthreats.
AI security posture management gives CISOs full visibility, safeguards AI data, and blocks prompt injection or model poisoning to speed secure innovation.
Cloud attack surface management identifies unmanaged, internet-exposed assets and brings them under control to reduce risk across multicloud environme...
Cortex Cloud Detection and Response now adds real-time malware protection, expanded threat detection, and built-in automation to help security teams act faster.
Prioritize and secure Kubernetes with real-time insights, risk-driven workflows, and full asset visibility—powered by Cortex Cloud’s KSPM capabilities.
Model Context Protocol (MCP) introduces new AI integration risks. Learn how to manage threats like prompt injection, credential leaks, and toolchain abuse.
AI systems scale from prototypes to production environments, as do the risks. Is your organization planning for the AI baby tiger or full-grown AI predator?
Go beyond 'malicious' or 'benign'. Learn how Palo Alto Networks uses AI explanations to enhance the development of our malware detection to get more accurate verdicts.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
Unit 42 details recent Iranian cyberattack activity, sharing direct observations. Tactical and strategic recommendations are provided for defenders....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts