Category: Palo Alto Networks Blog

Safeguard OT Environments with the Power of Precision AI

New capabilities safeguard OT remote operations, mitigate risks for hard-to-patch assets, and extend protection into industrial environments. The post Safeguard OT Environments with the Power of Precision AI appeared first on Palo Alto Networks Blog. This article has been indexed…

GenAI in Cybersecurity — Threats and Defenses

The Unit 42 Threat Frontier: Prepare for Emerging AI Risks report explains how generative AI (GenAI) is reshaping the cybersecurity landscape. The post GenAI in Cybersecurity — Threats and Defenses appeared first on Palo Alto Networks Blog. This article has…

Radically Simplifying Cybersecurity

Automate tasks, get guidance and enhance decision-making for faster threat response and improved security posture with Palo Alto Networks copilots. The post Radically Simplifying Cybersecurity appeared first on Palo Alto Networks Blog. This article has been indexed from Palo Alto…

The Top 5 Largest Scale Intrusions in 2023

Unit 42 Incident Response Report analyzed thousands of incidents, revealing the top 5 large-scale intrusions, what tools and vulnerabilities they focus on. The post The Top 5 Largest Scale Intrusions in 2023 appeared first on Palo Alto Networks Blog. This…

The Hidden AI Risk Lurking In Your Business

The adoption of unsanctioned GenAI applications can lead to a broad range of cybersecurity issues, from data leakage to malware. The post The Hidden AI Risk Lurking In Your Business appeared first on Palo Alto Networks Blog. This article has…

Using Time in Your Favor During a Ransomware Attack

For organizations to overcome ransomware attacks, buying time can change the balance of power and set you up for a more successful resolution. The post Using Time in Your Favor During a Ransomware Attack appeared first on Palo Alto Networks…

Incident Response by the Numbers

Unit 42 helped hundreds of clients assess, respond and recover from attacks, collecting data and compiling our 2024 Incident Response Report. The post Incident Response by the Numbers appeared first on Palo Alto Networks Blog. This article has been indexed…

Identity Protection That Spans the Entire Attack Lifecycle

Palo Alto Networks Identity Threat Detection and Response (ITDR) offering emerges as a critical pillar of modern cybersecurity strategy. The post Identity Protection That Spans the Entire Attack Lifecycle appeared first on Palo Alto Networks Blog. This article has been…