Palo Alto Networks was named a leader in attack surface management by Forrester for Cortex Xpanse. The post Forrester Names Palo Alto Networks a Leader in Attack Surface Management appeared first on Palo Alto Networks Blog. This article has been…
Category: Palo Alto Networks Blog
The Hidden AI Risk Lurking In Your Business
The adoption of unsanctioned GenAI applications can lead to a broad range of cybersecurity issues, from data leakage to malware. The post The Hidden AI Risk Lurking In Your Business appeared first on Palo Alto Networks Blog. This article has…
Using Time in Your Favor During a Ransomware Attack
For organizations to overcome ransomware attacks, buying time can change the balance of power and set you up for a more successful resolution. The post Using Time in Your Favor During a Ransomware Attack appeared first on Palo Alto Networks…
Crush It, Don’t Get Crushed — Combat SOC Analyst Burnout with AI
AI is reshaping SOC analyst roles. We address the critical issue of burnout and discuss practical advice for thriving in a SOC analyst career. The post Crush It, Don’t Get Crushed — Combat SOC Analyst Burnout with AI appeared first…
Join SASE Converge — Where the Future of SASE Comes Together
Join us for SASE Converge 2024, a 2-hour immersive virtual experience, featuring thought leaders and technologists from across the globe. The post Join SASE Converge — Where the Future of SASE Comes Together appeared first on Palo Alto Networks Blog.…
Incident Response by the Numbers
Unit 42 helped hundreds of clients assess, respond and recover from attacks, collecting data and compiling our 2024 Incident Response Report. The post Incident Response by the Numbers appeared first on Palo Alto Networks Blog. This article has been indexed…
AI in OT Security — Balancing Industrial Innovation and Cyber Risk
Interview with Del Rodillas, who navigates the landscape of the OT-IT convergence and cybersecurity challenges in the manufacturing and industrial sectors. The post AI in OT Security — Balancing Industrial Innovation and Cyber Risk appeared first on Palo Alto Networks…
Identity Protection That Spans the Entire Attack Lifecycle
Palo Alto Networks Identity Threat Detection and Response (ITDR) offering emerges as a critical pillar of modern cybersecurity strategy. The post Identity Protection That Spans the Entire Attack Lifecycle appeared first on Palo Alto Networks Blog. This article has been…
Secure AI Access by Design — Enabling Safe Usage of GenAI Apps
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies. The post Secure AI Access by Design — Enabling Safe Usage of GenAI Apps appeared first on Palo Alto Networks…
Secure GenAI Applications by Design
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies. The post Secure GenAI Applications by Design appeared first on Palo Alto Networks Blog. This article has been indexed from…
Enabling the Safe Use of GenAI Applications
AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies. The post Enabling the Safe Use of GenAI Applications appeared first on Palo Alto Networks Blog. This article has been…
White House Post-Quantum Announcement: What It Means for Cybersecurity
Every Palo Alto Networks Next-Generation Firewall running the latest PAN-OS supports the three new NIST PQC standards. The post White House Post-Quantum Announcement: What It Means for Cybersecurity appeared first on Palo Alto Networks Blog. This article has been indexed…
A Letter From Our CEO
Let me begin with a strong and sincere apology for a recent marketing decision at an event hosted by Palo Alto Networks during Black Hat in Las Vegas. The post A Letter From Our CEO appeared first on Palo Alto…
The Missing Piece of SASE — Prisma Access Browser — Now Available
Prisma Access Browser, the latest innovation in SASE – redefining secure work in the browser, blending top-tier security with unparalleled performance. The post The Missing Piece of SASE — Prisma Access Browser — Now Available appeared first on Palo Alto…
Attack Vectors at a Glance
The 2024 Incident Response Report details the most exploited attack vectors of the past year – avoid these compromising your organization. The post Attack Vectors at a Glance appeared first on Palo Alto Networks Blog. This article has been indexed…
Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance
Palo Alto Networks worked with NIST and industry peers to build end-to-end Zero Trust architectures in NIST’s labs, leveraging a range of our technologies. The post Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance appeared first on…
The Promise and Perils of Building AI Into Your Business Applications
A comprehensive security solution will help you confidently build AI-powered apps by securing your journey to AI, from design to build to run. The post The Promise and Perils of Building AI Into Your Business Applications appeared first on Palo…
The Procurement and Operational Benefits of a Cybersecurity Platform
Consolidating multiple solutions into a unified platform closes security gaps that rise when deploying individual point products to address specific issues. The post The Procurement and Operational Benefits of a Cybersecurity Platform appeared first on Palo Alto Networks Blog. This…
Strengthening Cybersecurity in Healthcare
A Collaborative Approach Between Accenture and Palo Alto Networks To improve patient outcomes and experiences, today’s healthcare organizations are increasingly adopting innovative technologies, such as AI, Cloud, and IoT. While beneficial, these … The post Strengthening Cybersecurity in Healthcare appeared…
Strengthening Cybersecurity in Healthcare
A Collaborative Approach Between Accenture and Palo Alto Networks To improve patient outcomes and experiences, today’s healthcare organizations are increasingly adopting innovative technologies, such as AI, Cloud, and IoT. While beneficial, these … The post Strengthening Cybersecurity in Healthcare appeared…