Palo Alto Networks helps U.S. Federal agencies and vendors protect against cyberthreats with FedRAMP High Authorization for network, cloud, and SecOps.
Federal systems shift to the cloud, we aid in developing security solutions as robust as on-prem tools. We developed our FedRAMP High authorized CNAPP.
Financial orgs face cybersecurity challenges. Palo Alto Networks & IBM experts share top considerations in a new vodcast series for better cybersecurity.
ADEM expands trusted visibility and remediation capabilities from Prisma SASE to NGFW, empowering IT teams for unified network control and performance...
Advanced WildFire enhancements in Strata Cloud Manager simplify incident response and surfaces the data that matters, faster, clearer & all in one place.
Palo Alto Networks and Google Cloud offer a unified platform for secure user and application connectivity, enhancing security posture and reducing costs.
Cloud identity security depends on more than IAM hygiene. Learn how attackers exploit data access paths—and how to stop them with unified security int...
Cloud workload protection (CWP) gains new power with Cortex Cloud—unifying data, correlating context, and enabling CloudSec teams to respond with precision.
Can CSPs offer effective cloud security when using a competitor’s cloud infrastructure or is it wise to adopt cloud-agnostic security across your multicloud estate?
Modern cloud threats require real-time protection to stop attacks in progress, correlate threats across the application stack and enable rapid, automa...
Prisma Cloud becomes Cortex Cloud: Our CNAPP story of innovation, defining and transforming cloud security for the duration of CNAPP’s five-year marke...
XSIAM is expanding from reactive response to proactive defense, transforming exposure management and email security with unified data, AI and automation.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
Programs leveraging AI agents are increasingly popular. Nine attack scenarios using open-source agent frameworks show how bad actors target these applications....
Ransomware leak site data and Unit 42 case studies reveal new trends from Q1 2025, including the most active groups, targeted industries and novel extortion tac...
North Korean IT workers are reportedly using real-time deepfakes to secure remote work, raising serious security concerns. We explore the implications....
Agent Tesla, Remcos RAT and XLoader delivered via a complex phishing campaign. Learn how attackers are using multi-stage delivery to hinder analysis....
North Korean state-sponsored group Slow Pisces (Jade Sleet) targeted crypto developers with a social engineering campaign that included malicious coding challen...
GenAI boosts productivity but also poses security risks. Palo Alto Networks has a new whitepaper about prompt-based threats and how to defend against them....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts