Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
Join Prisma Cloud by Palo Alto Networks at AWS re:Invent 2024 in Las Vegas for AI security sessions, in-booth theaters, JAM sessions and demos at booth #1124.
Data Security: New Prisma Cloud DSPM & Cortex XSOAR integration automates remediation, enhancing security and governance in diverse cloud environments...
CNAPP: Prisma Cloud leads the pack in GigaOm's inaugural CNAPP Radar report, excelling in key features like CIEM, risk prioritization and resource behavior monitoring.
Shift left with code to cloud strategies integrating protection at every stage, mitigate risks, enhance developer workflows, and secure production environments.
Enhance your cloud security with AI-driven analysis, insights and automation. Simplify threat detection, vulnerability management, and compliance for ...
Reduce your attack surface and improve your cloud and AI service security practices with a collaborative tutorial from Palo Alto Networks and Amazon SageMaker’s team.
Discover how Cortex Xpanse now identifies 60 additional server protocols in your attack surface, protecting against emerging threats across proxy, network, and database servers.
Discover how Cortex Copilot streamlines security analyst workflows, reduces burnout, and accelerates incident investigations by leveraging AI to automate mundane tasks.
Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicators, and also examines configurations and n...
We discuss North Korea's use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to counter this....
New research reveals two vulnerabilities in Google's Vertex AI that may lead to privilege escalation or data theft through custom jobs or malicious models....
We discuss a new campaign from the cybercrime group behind Silent Skimmer, showcasing the exploit of Telerik UI vulnerabilities and malware like RingQ loader....
Explore how we detect DNS hijacking by analyzing millions of DNS records daily, using machine learning to identify redirect attempts to malicious servers....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts