* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * Cloud Security # Palo Alto Networks ## Cloud Security [![Closing the Gap Between Cloud Visibility and Network Security](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2024/11/iStock-1249211557-edit-1280x1280-1.jpeg)](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/cloud-visibility-network-security-context-exposure-management/) [Closing the Gap Between Cloud Visibility and Network Security \-------------------------------------------------------------](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/cloud-visibility-network-security-context-exposure-management/) Cloud visibility improves risk prioritization by adding network security context, revealing protected paths, reducing false positives, and focusing teams on real exposure. [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [Cloud Security Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-platform/?ts=markdown) [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) Feb 17, 2026 By [Alexandre Cezar](https://www.paloaltonetworks.com/blog/author/alexandre-cezar/?ts=markdown "Posts by Alexandre Cezar") and [Mohit Bhasin](https://www.paloaltonetworks.com/blog/author/mohit-bhasin/?ts=markdown "Posts by Mohit Bhasin") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![An Inside Look into ASPM: Five Findings from New Industry Research](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/05/GettyImages-562451669-edit-scaled.jpg) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Research](https://www.paloaltonetworks.com/blog/cloud-security/category/research/?ts=markdown) ## [An Inside Look into ASPM: Five Findings from New Industry Research](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/aspm-research-omdia/) ASPM is emerging as the orchestration layer for AppSec. Explore key findings in new research from Omdia on risk reduction, automation, and tool conver... Feb 09, 2026 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Modernizing Security on AWS: From Firewall Ops to Security Intent](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2026/02/Cityscape.jpg) [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [Modernizing Security on AWS: From Firewall Ops to Security Intent](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/modernizing-security-on-aws-from-firewall-ops-to-security-intent/) Learn why AWS modernization requires shifting from firewall operations to security intent, with managed, infrastructure-aware protection at scale. Feb 04, 2026 By [Ashley Delfonso](https://www.paloaltonetworks.com/blog/author/ashley-hood/?ts=markdown "Posts by Ashley Delfonso") ![Turn Your Multicloud Security into a Business Enabler](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2026/01/GettyImages-1347947373-edit_800x600.png) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Software Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/software-firewalls/?ts=markdown) ## [Turn Your Multicloud Security into a Business Enabler](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/turn-your-multicloud-security-into-a-business-enabler/) Automate multicloud security to remove manual bottlenecks. Shift from a business blocker to an enabler while accelerating innovation and AI adoption. Jan 28, 2026 By [Josh Pederson](https://www.paloaltonetworks.com/blog/author/josh-pederson/?ts=markdown "Posts by Josh Pederson") ![Palo Alto Networks and Veracode: Unifying Application Security from Code to Cloud](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2026/01/word-image-350912-1.png) [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [ASPM](https://www.paloaltonetworks.com/blog/cloud-security/category/aspm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ## [Palo Alto Networks and Veracode: Unifying Application Security from Code to...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/application-security-veracode-partnership/) Secure your software supply chain with the Cortex Cloud and Veracode integration. Correlate code vulnerabilities with cloud context to prioritize and ... Jan 20, 2026 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Is AI a New Challenge for Cloud Security? Yes and No.](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/12/GettyImages-667738864-edit-2-scaled.jpg) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown) ## [Is AI a New Challenge for Cloud Security? Yes and No.](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/ai-security-gap-cloud-models-agents/) AI security challenges are accelerating as models and agents reshape cloud risk. Learn where traditional controls break down and how to close the AI security gap. Jan 15, 2026 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![The Multicloud Double Tax: Why You're Overpaying for Insecurity](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2026/01/iStock-1193610488-edit_800x600.png) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [The Multicloud Double Tax: Why You're Overpaying for Insecurity](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/the-multicloud-double-tax-why-youre-overpaying-for-insecurity/) Find out how the Palo Alto Networks multicloud security fabric helps consolidate networking and security to cut costs, improve ROI, and secure AI workloads. Jan 14, 2026 By [Josh Pederson](https://www.paloaltonetworks.com/blog/author/josh-pederson/?ts=markdown "Posts by Josh Pederson") ![From Control to Command: The Future of Multicloud Security](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2026/01/iStock-1145766767-edit_800x600.png) [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [From Control to Command: The Future of Multicloud Security](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/from-control-to-command-the-future-of-multicloud-security/) Transform your multicloud security from reactive to proactive. Learn how an automated security fabric across AWS and Azure stops fragmented threats. Jan 13, 2026 By [Ashley Delfonso](https://www.paloaltonetworks.com/blog/author/ashley-hood/?ts=markdown "Posts by Ashley Delfonso") ![Understanding API Risk in the Age of AI](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/12/GettyImages-562451669-edit_800x600.png) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown) ## [Understanding API Risk in the Age of AI](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/api-security-ai-risk/) API security now sits at the center of AI risk. Learn how AI-driven traffic expands exposure and how Cortex Cloud delivers discovery, prioritization and real-time protection. Dec 18, 2025 By [Andrea Halsted](https://www.paloaltonetworks.com/blog/author/andrea-halsted/?ts=markdown "Posts by Andrea Halsted") and [Amit Biton](https://www.paloaltonetworks.com/blog/author/amit-biton/?ts=markdown "Posts by Amit Biton") ![OWASP Top 10 for Agentic Applications 2026 Is Here – Why It Matters and How to Prepare](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/10/GettyImages-1138451182-edit_800x600.png) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [OWASP Top 10 for Agentic Applications 2026 Is Here -- Why It Matters and How...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/owasp-agentic-ai-security/) Agentic AI introduces new risks across tools, identities, supply chains and memory. Learn what the OWASP Top 10 for Agentic AI means and how to secure autonomous systems. Dec 10, 2025 By [Jaimin Patel](https://www.paloaltonetworks.com/blog/author/jaimin-patel/?ts=markdown "Posts by Jaimin Patel") and [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") ![Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/11/Gemini_Generated_Image_d58zh4d58zh4d58z-scaled.png) [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [Cloud Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-detection-and-response/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Supply Chain Security](https://www.paloaltonetworks.com/blog/cloud-security/category/supply-chain-security/?ts=markdown) ## [Shai-Hulud 2.0: How Cortex Helps Protect Against the Resurgent npm Worm](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/shai-hulud-2-0-npm-worm-detection-blocking/) Shai-Hulud 2.0 exposes the fragility of software supply chains. Learn how the npm worm spreads through developer ecosyst... Nov 26, 2025 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") and [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") ![Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossible](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/03/GettyImages-589090447-edit.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown), [KSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/kspm/?ts=markdown) ## [Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossibl...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/kubernetes-identity-security-kiempossible/) Kubernetes identity security demands clarity. Learn how KIEMPossible uncovers entities, permissions and usage to help you reduce identity attack surfa... Nov 25, 2025 By [Golan Myers](https://www.paloaltonetworks.com/blog/author/golan-myers/?ts=markdown "Posts by Golan Myers") ![Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2024/05/word-image-321744-1.jpeg) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/owasp-top-10-llms-ai-security-guide/) AI security starts with the OWASP Top 10 for LLMs. Explore our interactive guide to uncover and mitigate the biggest risks across your AI pipelines. Nov 20, 2025 By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") ![All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2024/09/GettyImages-667849954-edit.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) ## [All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your A...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security/) Initial-access risks in AWS demand clarity. Uncover how service exposure and access-by-design flaws open cloud perimeters and learn how to secure them... Nov 18, 2025 By [Golan Myers](https://www.paloaltonetworks.com/blog/author/golan-myers/?ts=markdown "Posts by Golan Myers") and [Ofir Balassiano](https://www.paloaltonetworks.com/blog/author/ofir-balassiano/?ts=markdown "Posts by Ofir Balassiano") ![Agentless Vs. Agent-Based Scanning in Kubernetes: A Deep Dive](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/10/GettyImages-1126835704-edit_800x600.png) [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown), [CWPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cwpp/?ts=markdown) ## [Agentless Vs. Agent-Based Scanning in Kubernetes: A Deep Dive](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/agentless-vs-agent-based-scanning-in-kubernetes-a-deep-dive/) Kubernetes security depends on smart scanning. Compare agentless and agent-based approaches to find the right balance between coverage and runtime def... Nov 13, 2025 By [Bruno Almeida](https://www.paloaltonetworks.com/blog/author/bruno-almeida/?ts=markdown "Posts by Bruno Almeida") ![Regaining Control Over Identity and Access](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/02/NetSec-Adhoc-Updated-Blog-Image-Resize-666009646-1.png) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) ## [Regaining Control Over Identity and Access](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/cloud-vs-on-premises-permissions-ciem/) Cloud permissions outpace control. Learn how CIEM restores visibility, enforces least privilege, and secures every identity in dynamic cloud environments. Nov 12, 2025 By [Shahar Livschitz](https://www.paloaltonetworks.com/blog/author/shahar-livschitz/?ts=markdown "Posts by Shahar Livschitz") ![Lessons Ted Lasso Can Teach You About CDR](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2024/10/cloud-security.png) [CDR](https://www.paloaltonetworks.com/blog/cloud-security/category/cdr/?ts=markdown), [Cloud Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-detection-and-response/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Lessons Ted Lasso Can Teach You About CDR](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/lessons-ted-lasso-can-teach-you-about-cdr/) Ted Lasso's lessons inspire a smarter, faster, more collaborative approach to cloud detection and response. Learn to turn chaos into confidence. Nov 11, 2025 By [Mohit Bhasin](https://www.paloaltonetworks.com/blog/author/mohit-bhasin/?ts=markdown "Posts by Mohit Bhasin") and [Emily Rodenhuis](https://www.paloaltonetworks.com/blog/author/erodenhuis/?ts=markdown "Posts by Emily Rodenhuis") [](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/cloud-ngfw-earns-miercom-award/) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Network Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-network-security/?ts=markdown), [Cloud Network Security](https://www.paloaltonetworks.com/blog/category/cloud-network-security/?ts=markdown), [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [Cloud NGFW Earns Miercom Award, Simplifies Try \& Buy Experience](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/cloud-ngfw-earns-miercom-award/) Miercom recently recognized Palo Alto Networks Cloud NGFW with the prestigious Miercom Certified Secure Award. After an... Nov 10, 2025 By [Vijay Arumugam Kannan](https://www.paloaltonetworks.com/blog/author/vijay-arumugam-kannan/?ts=markdown "Posts by Vijay Arumugam Kannan") and [Josh Pederson](https://www.paloaltonetworks.com/blog/author/josh-pederson/?ts=markdown "Posts by Josh Pederson") ![Cloud Security's Breaking Point: Is Your Operating Model Failing?](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/10/GettyImages-694983373-edit_800x600.png) [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Cloud Security's Breaking Point: Is Your Operating Model Failing?](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/cloud-security-breaking-point-is-your-operating-model-failing/) Cloud security requires a new operating model where protection is infrastructure-aware, follows the workload and adapts in real-time. Oct 30, 2025 By [Ashley Delfonso](https://www.paloaltonetworks.com/blog/author/ashley-hood/?ts=markdown "Posts by Ashley Delfonso") ![Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/10/2-0.png) [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud to SOC](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud-to-soc/?ts=markdown) ## [Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/cloud-security-platform-cortex-cloud-2-0/) Cortex Cloud 2.0 delivers unified protection from code to cloud to SOC, turning complexity into clarity with AI-driven prevention and response. Oct 28, 2025 By [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") ![Why Total Multicloud Visibility? You Can’t Secure What You Can’t See](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/10/iStock-1149529036-edit_800x600.png) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) ## [Why Total Multicloud Visibility? You Can't Secure What You Can't See](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/why-total-multicloud-visibility-you-cant-secure-what-you-cant-see/) Security blind spots are a key risk. Learn how a unified multicloud security fabric provides complete, real-time asset mapping to secure your entire estate. Oct 15, 2025 By [Faraz Siddiqui](https://www.paloaltonetworks.com/blog/author/faraz-siddiqui/?ts=markdown "Posts by Faraz Siddiqui") and [Josh Pederson](https://www.paloaltonetworks.com/blog/author/josh-pederson/?ts=markdown "Posts by Josh Pederson") Load more blogs Load more blogs ### Subscribe to the Newsletter! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language