Security Operations

Beyond the Label: How AI-Driven Explanations Supercharge Malware Detection

Beyond the Label: How AI-Driven Explanations Supercharge Malware Detection

Go beyond 'malicious' or 'benign'. Learn how Palo Alto Networks uses AI explanations to enhance the development of our malware detection to get more accurate verdicts.
Jun 10, 2025
Inside a Modern Cloud Attack — How to Catch It with Cortex CDR

Inside a Modern Cloud Attack — How to Catch It with Cortex CDR

Learn how Cortex CDR detects modern cloud attacks like Scattered Spider's identity-driven campaigns across Okta, AWS & Office 365 with real-time behav...
Across the Logs and Into Cortex XSIAM

Across the Logs and Into Cortex XSIAM

Learn how Cortex XSIAM streamlines SIEM migration with 1000+ connectors, 10,000+ detectors & native automation. Complete traditional SIEM upgrade in 3 months
May 22, 2025
Rapid Response to CVE-2025-31324: Mitigating SAP NetWeaver Visual Composer Exploitation

Rapid Response to CVE-2025-31324: Mitigating SAP NetWeaver Visual Composer ...

Protect against SAP NetWeaver's critical CVE-2025-31324 vulnerability with Cortex XSIAM's automated detection and response playbook for identifying an...
May 15, 2025

Subscribe to Security Operations Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.