Continuing the Mission: Securing Black Hat Asia 2026

Black Hat Asia stands as the premier cybersecurity event in the APAC region, where elite researchers unveil zero-day exploits, trainers demonstrate cutting-edge attack techniques, and thousands of security professionals gather at Marina Bay Sands in Singapore to push the boundaries of what's possible. The conference demands a un...

Apr 15, 2026
Data Knows No Boundaries, Neither Should Your Security

Data Knows No Boundaries, Neither Should Your Security

Here is a question I ask every CISO I meet: Do you know the real-time location of your sensitive data? I'm not asking theoretically or based on last quarter's audit, I mean right n...
Apr 09, 2026
When Security Scanners Become the Weapon: Breaking Down the Trivy Supply Chain Attack

When Security Scanners Become the Weapon: Breaking Down the Trivy Supply Ch...

The Trivy Supply Chain Attack shows how security tools can be weaponized. Learn how this 2026 breach unfolded and how Cortex Cloud blocks the threat.
Mar 24, 2026
Beyond Jailbreaks: Why Agentic AI Needs Contextual Red Teaming

Beyond Jailbreaks: Why Agentic AI Needs Contextual Red Teaming

Generic jailbreak testing misses the real risks in agentic AI. Learn how contextual red teaming exposes tool misuse, data exfiltration, and operationa...
Mar 09, 2026

Precision AI Pro - Now with Integrated Device Security

Organizations globally rely on Palo Alto Networks Cloud-Delivered Security Services (CDSS) to maintain a robust defense against sophisticated threats. Now, they need to extend that...
Apr 16, 2026

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.