Artificial intelligence (AI) is at the forefront of business innovation. But although AI feels like a relatively new concept, 83% of technology service providers already use generative AI in their businesses.
Artificial intelligence (AI) is at the forefront of business innovation. But although AI feels like a relatively new concept, 83% of technology servic...
Before the launch of ChatGPT on Nov 30th 2022, people asked about the security implications of language models producing human fluent responses. The range of concerns were difficult to comprehend until the Public had access....
Palo Alto Networks recently returned from its eighth consecutive year as a sponsor of the 2024 National Collegiate Cyber Defense Competition (NCCDC) in San Antonio, Texas, where th...
Palo Alto Networks is pleased to announce the official rollout of our latest Secure AI by Design product portfolio, so you can embrace AI with confide...
In today’s threat landscape, the exponential growth of vulnerabilities makes it extremely challenging for network and security teams to prioritize remediation efforts and deliver...
As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles acros...
Read the Forrester Consulting Spotlight study commissioned by Palo Alto Networks to learn about a major component in our family of Next-Generation Firewalls (NGFWs): The VM-Series virtual firewall. You’ll disco...
As enterprises increasingly transition to the public cloud, they face a crucial decision: should they manage software firewalls in-house or outsource this critical function to experts? This question arises amon...
Palo Alto Networks has been named a leader in OT security in The Forrester Wave™: Operational Technology Security Solutions, Q2 2024 report. We receiv...
New capabilities that dramatically improve the end-to-end process of seeing and securing connected medical devices for network security and clinical engineering teams
It’s no secret that GenAI tools like OpenAI’s ChatGPT and Google’s Gemini are shaking things up in the business world. They are totally transforming how we work, communicate, and innovate.
As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles across industries. As we stand on the cusp of a ne...
In today’s enterprise environment, the intricate web of interconnected SaaS applications, identity providers (IdP), and service accounts with disparate policies has made securing u...
As cyberattacks keep evolving, security and IT leaders find themselves implementing multiple solutions to ensure a secure, agile, and productive work environment. Yet many traditio...
In our last myth-busting blog post, we covered the myth surrounding points of presence (PoPs) and their impact on app performance. This post illuminates yet another fallacy: using caching servers to boost SaaS app performance...
As I’m sitting here about to embark on my second annual trip to Black Hat, I’m wondering why anyone would want to bear the summer heat in Las Vegas. This time last year, temps topped out at 108o, and it's looki...
The Australian Cyber Security Centre (ACSC), led by the Australian Signals Directorate (ASD), has developed a comprehensive list of strategies for mit...
Artificial intelligence (AI) is advancing rapidly, with organizations across myriad industries deploying AI-powered applications at an unprecedented pace. In The State of Cloud-Native Security Report 2024, for...
Prisma Cloud by Palo Alto Networks is a certified solution that supports the Red Hat OpenShift platform with more accurate, consistent and reliable ri...
Join us in Las Vegas as we showcase our Code to CloudTM platform at Black Hat, BSides and Def Con. You won’t want to miss the breakout and theater sessions, demos, parties, prizes...
Earlier this year, the National Institute of Standards and Technology (NIST) published a major revision to their Cybersecurity Framework (CSF), known...
A new vulnerability in Open Secure Shell (OpenSSH), identified as Common Vulnerabilities and Exposures (CVE) CVE-2023-25136, poses a significant threa...
An unauthenticated remote code execution (RCE) vulnerability in OpenSSH’s server could potentially grant an attacker full root access, which poses a significant exploit risk. RegreSSHion, also known as CVE-2024-6387, was discovered by Qualys to be a regression bug of a...
Unit 42 researchers discovered BOLA vulnerability CVE-2024-22278 in the cloud-native container registry Harbor. They break down its discovery and the outcomes....
A direct correlation between GenAI’s explosive popularity and scam attacks is addressed in this article, using plentiful data and a case study of network abus...
We explain how an automated BOLA detection tool harnessing GenAI discovered multiple BOLA vulnerabilities in open-source scheduling tool Easy!Appointments....
Malware analysts demonstrate how to triage and analyze large amounts of samples with greater efficiency. Samples include Remcos RAT, Lumma Stealer and more....
This article is a detailed study of CVE-2023-46229 and CVE-2023-44467, two vulnerabilities discovered by our researchers affecting generative AI framework LangC...
Ransomware gang RA World rebranded from RA Group. We discuss their updated tactics from leak site changes to an analysis of their operational tools. ...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts