Tag: Palo Alto Networks Blog

GenAI in Cybersecurity — Threats and Defenses

The Unit 42 Threat Frontier: Prepare for Emerging AI Risks report explains how generative AI (GenAI) is reshaping the cybersecurity landscape. The post GenAI in Cybersecurity — Threats and Defenses appeared first on Palo Alto Networks Blog. This article has…

Radically Simplifying Cybersecurity

Automate tasks, get guidance and enhance decision-making for faster threat response and improved security posture with Palo Alto Networks copilots. The post Radically Simplifying Cybersecurity appeared first on Palo Alto Networks Blog. This article has been indexed from Palo Alto…

The Top 5 Largest Scale Intrusions in 2023

Unit 42 Incident Response Report analyzed thousands of incidents, revealing the top 5 large-scale intrusions, what tools and vulnerabilities they focus on. The post The Top 5 Largest Scale Intrusions in 2023 appeared first on Palo Alto Networks Blog. This…

The Hidden AI Risk Lurking In Your Business

The adoption of unsanctioned GenAI applications can lead to a broad range of cybersecurity issues, from data leakage to malware. The post The Hidden AI Risk Lurking In Your Business appeared first on Palo Alto Networks Blog. This article has…

Using Time in Your Favor During a Ransomware Attack

For organizations to overcome ransomware attacks, buying time can change the balance of power and set you up for a more successful resolution. The post Using Time in Your Favor During a Ransomware Attack appeared first on Palo Alto Networks…

Incident Response by the Numbers

Unit 42 helped hundreds of clients assess, respond and recover from attacks, collecting data and compiling our 2024 Incident Response Report. The post Incident Response by the Numbers appeared first on Palo Alto Networks Blog. This article has been indexed…

Identity Protection That Spans the Entire Attack Lifecycle

Palo Alto Networks Identity Threat Detection and Response (ITDR) offering emerges as a critical pillar of modern cybersecurity strategy. The post Identity Protection That Spans the Entire Attack Lifecycle appeared first on Palo Alto Networks Blog. This article has been…

Secure GenAI Applications by Design

AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies. The post Secure GenAI Applications by Design appeared first on Palo Alto Networks Blog. This article has been indexed from…