Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
Wendi Whitmore spoke on a panel of witnesses at a field hearing at Stanford’s Hoover Institution on May 28, outlining the AI innovations our team developed.
Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data and the systems that they process underpin some of the most fundamental...
With complimentary Cloud and AI Risk Assessment (CLARA) services, you can see how well your network security works in AI and public cloud environments.
Prisma AIRS MCP Server is now available for public preview via PyPI/Github sample code. The new component of the platform helps customers secure AI ag...
Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data and the systems that they process underpin some of the most fundamental...
Cloud attack surface management identifies unmanaged, internet-exposed assets and brings them under control to reduce risk across multicloud environme...
Cortex Cloud Detection and Response now adds real-time malware protection, expanded threat detection, and built-in automation to help security teams act faster.
Prioritize and secure Kubernetes with real-time insights, risk-driven workflows, and full asset visibility—powered by Cortex Cloud’s KSPM capabilities.
Model Context Protocol (MCP) introduces new AI integration risks. Learn how to manage threats like prompt injection, credential leaks, and toolchain abuse.
Cortex Cloud earns FedRAMP High and Moderate, becoming the only CNAPP with both. Delivering real-time cloud security for mission-critical government w...
Cortex Cloud helps security teams prepare for AI-powered IDEs in the wake of OpenAI’s Windsurf acquisition, securing code and risks across the lifecyc...
AI systems scale from prototypes to production environments, as do the risks. Is your organization planning for the AI baby tiger or full-grown AI predator?
Go beyond 'malicious' or 'benign'. Learn how Palo Alto Networks uses AI explanations to enhance the development of our malware detection to get more accurate verdicts.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
Effective OAuth token management is crucial for supply chain security, preventing breaches caused by dormant integrations, insecure storage or lack of rotation....
Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts