Corporate Blogs

A Secure Vision for Our AI-Driven Future

A Secure Vision for Our AI-Driven Future

The AI Action Plan validates the enormous potential of AI – it must be developed and deployed securely, laying out tactical steps for a secure AI future.
Jul 29, 2025
The Only Vendor Named a SASE Leader for the Third Time

The Only Vendor Named a SASE Leader for the Third Time

Palo Alto Networks is the only vendor to be named a Leader for the third time in the 2025 Gartner® Magic Quadrant™ for SASE platforms.
Jul 15, 2025
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Wave™: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering cat...
Jul 11, 2025
Palo Alto Networks Commitment to Europe

Palo Alto Networks Commitment to Europe

Regulatory frameworks in Europe call for solutions delivering strong cybersecurity, operational resilience and support organization's control over their data.
Jul 09, 2025
Modernizing Cybersecurity for State and Local Government

Modernizing Cybersecurity for State and Local Government

State IT must shift to integrated, efficient and smarter cybersecurity investments, leveraging public/private partnerships for innovation.
Jul 08, 2025
Why Diverse Cloud Environments Require Flexible Security

Why Diverse Cloud Environments Require Flexible Security

Can multicloud environments rely on one CSP to secure all their cloud environments?
Jul 03, 2025
Navigating Heightened Cyber Risks from Iranian Threats

Navigating Heightened Cyber Risks from Iranian Threats

Recent geopolitical tensions have elevated the global cybersecurity risk landscape and the potential for increased cyber operations demands attention.
Jul 02, 2025
By 
Global Reach — The New Scale of Chinese Cyberthreats

Global Reach — The New Scale of Chinese Cyberthreats

David Moulton and Wendi Whitmore of Palo Alto Networks, put today's threat landscape in stark historical perspective as they discuss Ch...
Jun 26, 2025

Network Security Blogs

Redefining DNS Protection

Redefining DNS Protection

ADNS leverages Precision AI®, our proprietary AI system combining deep learning, machine learning and generative AI to deliver DNS-layer protection.
Jul 23, 2025
By 
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Wave™: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering category.
Jul 11, 2025
A Bold New Vision in Cloud Network Security for the Future of Work

A Bold New Vision in Cloud Network Security for the Future of Work

Palo Alto Networks introduces four groundbreaking innovations to its Software Firewalls portfolio. Find out more.
Jun 25, 2025
Cloud NGFW is Essential for AWS & Azure Cloud Traffic Protection

Cloud NGFW is Essential for AWS & Azure Cloud Traffic Protection

Get unparalleled threat prevention, operational simplicity and significant TCO savings with Cloud NGFW.
Jun 24, 2025
How Secure Are Your AI and Cloud Environments? Just Ask CLARA

How Secure Are Your AI and Cloud Environments? Just Ask CLARA

With complimentary Cloud and AI Risk Assessment (CLARA) services, you can see how well your network security works in AI and public cloud environments.
Jun 23, 2025
See How We’re Fortifying Cloud and AI at AWS re:Inforce 2025

See How We’re Fortifying Cloud and AI at AWS re:Inforce 2025

Join Palo Alto Networks at AWS re:Inforce '25. Connect with security experts and discover actionable solutions to AWS security challenges.
Jun 12, 2025
Securing AI Agent Innovation with Prisma AIRS MCP Server

Securing AI Agent Innovation with Prisma AIRS MCP Server

Prisma AIRS MCP Server is now available for public preview via PyPI/Github sample code. The new component of the platform helps customers secure AI ag...
Jun 09, 2025
GenAI's Impact — Surging Adoption and Rising Risks in 2025

GenAI's Impact — Surging Adoption and Rising Risks in 2025

Explore how GenAI is reshaping enterprise operations and how to mitigate rising risks.
Jun 05, 2025

SASE Blogs

Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser provides organizations in the U.S. federal government superior browser-based security and controls for any endpoint.
Jul 29, 2025
Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

New Prisma SD-WAN ruggedized appliances deliver consistent, secure & high-performance connectivity in even the harshest conditions.
Jul 21, 2025
The Only Vendor Named a SASE Leader for the Third Time

The Only Vendor Named a SASE Leader for the Third Time

Palo Alto Networks is the only vendor to be named a Leader for the third time in the 2025 Gartner® Magic Quadrant™ for SASE platforms.
Jul 15, 2025
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Wave™: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering cat...
Jul 11, 2025
Dedicated Data Plane Improves SASE Resilience

Dedicated Data Plane Improves SASE Resilience

Prisma SASE provides a secure, isolated and scalable way to navigate the complexities of digital transformation and the evolving nature of cyberthreats.
Jun 26, 2025
Chart Your SASE Transformation with Prisma SD-WAN

Chart Your SASE Transformation with Prisma SD-WAN

Successful SASE transformations often require balancing both network-led and security-led transformation priorities for a fully integra...
Jun 25, 2025
Examining the Coffee Shop Model and SASE

Examining the Coffee Shop Model and SASE

Although alluring, the coffee shop model doesn't meet enterprise networking & security standards. Consider the Zero Trust Branch model instead.
Jun 11, 2025
A Secure Browser Requires a World-Class Cyber Research Team

A Secure Browser Requires a World-Class Cyber Research Team

If security is your priority, you need a browser built by the best minds in the industry—one that evolves as fast as the threats do.
Jun 04, 2025

Cloud Security Blogs

What’s New in Cortex Cloud

What’s New in Cortex Cloud

Cloud attack surface management, file integrity monitoring, and Microsoft 365 DSPM lead Cortex Cloud’s innovations to eliminate blind spots and secure data.
Jul 24, 2025
See What Attackers Can Reach in Your Cloud

See What Attackers Can Reach in Your Cloud

Cloud-based data breaches expose high-risk assets to the internet. Learn how to validate, prioritize and remediate external exposure with External Probe Validation.
Jul 21, 2025
AI's Hidden Security Debt

AI's Hidden Security Debt

AI-powered coding assistants introduce security risks by generating flawed code, amplifying vulnerabilities, and undermining developer judgment at scale.
Jul 16, 2025
Overcoming Cloud Security Consolidation Challenges

Overcoming Cloud Security Consolidation Challenges

Cybersecurity: Consolidate 16+ cloud security tools to cut costs, reduce alert fatigue, eliminate visibility gaps, and strengthen your security posture.
Jul 11, 2025
Implementing AI Security with Cortex Cloud AI-SPM

Implementing AI Security with Cortex Cloud AI-SPM

AI security posture management gives CISOs full visibility, safeguards AI data, and blocks prompt injection or model poisoning to speed secure innovation.
Jul 02, 2025
Cloud Attack Surface Management: See What Other CNAPPs Miss

Cloud Attack Surface Management: See What Other CNAPPs Miss

Cloud attack surface management identifies unmanaged, internet-exposed assets and brings them under control to reduce risk across multicloud environme...
Jun 24, 2025
The New AI Attack Surface — How Cortex Cloud Secures MCP

The New AI Attack Surface — How Cortex Cloud Secures MCP

MCP Security in Cortex Cloud protects AI applications by securing Model Context Protocol communications and detecting API-layer threats in real time.
Jun 13, 2025
The Best Cloud Threat Detection Just Got Better

The Best Cloud Threat Detection Just Got Better

Cortex Cloud Detection and Response now adds real-time malware protection, expanded threat detection, and built-in automation to help security teams act faster.
Jun 12, 2025

Security Operations Blogs

Think You Have Visibility? Think Again.

Think You Have Visibility? Think Again.

Discover how Cortex XDR & XSIAM's Data Stitching and Smart Grouping unify security data, streamline SecOps, and accelerate threat investigations.
Jul 29, 2025
Security by Design — UX and AI in Modern Cybersecurity

Security by Design — UX and AI in Modern Cybersecurity

Nelson Lee reveals how thoughtful design and emerging AI technologies are reshaping cybersecurity operations from the ground up.
Jul 24, 2025
What’s New for Cortex (July ‘25)

What’s New for Cortex (July ‘25)

The latest release of Cortex harnesses AI to deliver more proactive security, expand visibility, and streamline workflows.
Jul 24, 2025
How Apps and Your Phone Can Expose Your Life Without Permission

How Apps and Your Phone Can Expose Your Life Without Permission

Security challenges encompass the entire ecosystem of apps, services and IoT devices that modern consumers use without understanding th...
Jul 22, 2025
Disrupting Legacy Vulnerability Management

Disrupting Legacy Vulnerability Management

Introducing the general availability of Cortex Exposure Management, a groundbreaking solution that will redefine traditional vulnerabil...
Jul 21, 2025
Cortex Advanced Email Security – Built for Today’s AI Threats

Cortex Advanced Email Security – Built for Today’s AI Threats

Cortex Advanced Email Security uses AI to stop sophisticated phishing, BEC, and GenAI-powe...
Jul 20, 2025
A Leader in the 2025 Gartner Magic Quadrant for EPP — 3 Years Running
Why Diverse Cloud Environments Require Flexible Security

Why Diverse Cloud Environments Require Flexible Security

Can multicloud environments rely on one CSP to secure all their cloud environments?
Jul 03, 2025

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

Active Exploitation of Microsoft SharePoint Vulnerabilities: Thre...

Unit 42 has observed active exploitation of recent Microsoft SharePoint vulnerabilities. Here’s how you can protect your organization. ...
July 29, 2025
By  Unit 42
company article

The Covert Operator's Playbook: Infiltration of Global Telecom Ne...

Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunnelin...
July 29, 2025
company article

The Ηоmоgraph Illusion: Not Everything Is As It Seems

A subtle yet dangerous email attack vector: homograph attacks. Threat actors are using visually similar, non-Latin characters to bypass security filters....
July 25, 2025
company article

Muddled Libra Threat Assessment: Further-Reaching, Faster, More I...

Muddled Libra (Scattered Spider, UNC3944) is evolving. Get the latest insights and defensive recommendations based on Unit 42 incident response cases....
July 25, 2025
By  Unit 42
company article

Cloud Logging for Security and Beyond

Cloud logging is essential for security and compliance. Learn best practices when navigating AWS, Azure or GCP for comprehensive visibility into your environmen...
July 22, 2025
company article

Behind the Clouds: Attackers Targeting Governments in Southeast A...

CL-STA-1020 targets Southeast Asian governments using a novel Microsoft backdoor we call HazyBeacon. It misuses AWS Lambda URLs for C2....
July 14, 2025
company article

Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malwa...

SLOW#TEMPEST malware uses dynamic jumps and obfuscated calls to evade detection. Unit 42 details these techniques and how to defeat them with emulation....
July 11, 2025
By  Mark Lim

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.