* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Cloud Security](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/) * [AI Security](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/category/ai-security/) * OWASP Top 10 for Agentic ... # OWASP Top 10 for Agentic Applications 2026 Is Here -- Why It Matters and How to Prepare [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fowasp-agentic-ai-security%2F) [](https://twitter.com/share?text=OWASP+Top+10+for+Agentic+Applications+2026+Is+Here+%E2%80%93+Why+It+Matters+and+How+to+Prepare&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fowasp-agentic-ai-security%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fowasp-agentic-ai-security%2F&title=OWASP+Top+10+for+Agentic+Applications+2026+Is+Here+%E2%80%93+Why+It+Matters+and+How+to+Prepare&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/owasp-agentic-ai-security/&ts=markdown) \[\](mailto:?subject=OWASP Top 10 for Agentic Applications 2026 Is Here – Why It Matters and How to Prepare) Link copied By [Jaimin Patel](https://www.paloaltonetworks.com/blog/author/jaimin-patel/?ts=markdown "Posts by Jaimin Patel") and [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") Dec 10, 2025 7 minutes [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [Agentic AI](https://www.paloaltonetworks.com/blog/tag/agentic-ai/?ts=markdown) [OWASP Top 10](https://www.paloaltonetworks.com/blog/tag/owasp-top-10/?ts=markdown) [Secure AI](https://www.paloaltonetworks.com/blog/tag/secure-ai/?ts=markdown) Autonomous AI has moved out of the lab and into everyday business operations. Agents now summarize thousands of documents, operate critical workflows, execute code on demand, make API calls and trigger downstream automations --- often without human oversight. With this shift, the security community has been anticipating one major milestone, the release of the [OWASP Top 10 for Agentic AI Applications](https://urldefense.proofpoint.com/v2/url?u=https-3A__genai.owasp.org_resource_owasp-2Dtop-2D10-2Dfor-2Dagentic-2Dapplications-2Dfor-2D2026_-3Futm-5Fsource-3Dpartners-26utm-5Fmedium-3Dpost-26utm-5Fcampaign-3DOWASP-2B-26utm-5Fid-3Dagentict10eu-26utm-5Fterm-3DAgentic-2BTop-2B10&d=DwMFaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=rAH_qYhLn3eoVX6uIS6XrTmL-z61nFVVgWvV-Mf5JOw&m=k2eNVKwvDNP8JabsTI7n5EBt9csRpyeK4-AoJ-v1Aipt_YGXtmAB_vDTF9XKJtNL&s=J3oWuNNm0v2ei9QdTY-ZcSFqIU0R9KgI2JyY_5DxHS4&e=). The milestone has finally arrived. The new OWASP list signals a clear turning point. We're no longer dealing with static LLMs that answer questions. We're dealing with agents capable of perception, reasoning and autonomous action. And while organizations have been racing to adopt these new capabilities, the security landscape is shifting even faster. Today, the average enterprise faces a staggering [82:1 machine-to-human identity ratio](https://www.cyberark.com/press/machine-identities-outnumber-humans-by-more-than-80-to-1-new-report-exposes-the-exponential-threats-of-fragmented-identity-security/). Every one of those machine identities --- agents, tools, datasets, APIs and the orchestration pipelines gluing them together --- represents a potential point of compromise. Add autonomous decision-making into the mix, and the surface area expands dramatically. For CIOs and CISOs, the shift introduces more than technical risk. It creates a governance challenge unlike anything seen before. When agents make decisions, call tools and handle sensitive data without human oversight, traditional security models simply can't guarantee control. The fear is no longer "What if an LLM says something wrong?" but "What if an agent does something wrong?" The governance problem isn't theoretical. Boards are already asking how organizations will prove control over autonomous systems that can access sensitive data, invoke tools and trigger automated workflows. The OWASP Top 10 for Agentic AI has arrived at exactly the right moment: when organizations are trying to innovate but need a framework to secure the next generation of AI systems. In today's post, we'll break down what some of these new risks mean in practice and how [Prisma^®^ AIRS^TM^](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security) helps organizations apply the OWASP guidance to secure real-world agentic AI deployments. ## Why Agentic AI Demands a New Approach Traditional cloud and application security tools were never designed for autonomous agents. The agentic ecosystem introduces four simultaneous challenges: 1. **Agents act**rather than just generate text, executing real-world actions that must be continuously monitored and authorized. 2. **Agents chain tools** dynamically, often selecting APIs, plugins and services on the fly --- making static policy enforcement insufficient. 3. **Agents retain memory and context,** which can be manipulated through poisoned prompts or compromised RAG data. 4. **Agents improvise** in ways that bypass rigid, rule-based security controls, without centralized behavioral oversight. OWASP's new list acknowledges this reality. Security teams must shift from protecting static applications to securing living and adaptive self-directed systems ​​with continuous visibility and control across agents, tools, data and identities. While Palo Alto Networks provides mitigation coverage across all 10 OWASP Agentic AI risks, the table below highlights four representative examples to illustrate how organizations can interpret them and apply practical mitigation strategies. ## 4 OWASP Agentic AI Risk Examples and Practical Mitigation Approaches |---------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | **Risk** | **What It Means** | **Palo Alto Networks Mitigation Capabilities** | | **ASI02 -- Tool Misuse \& Exploitation** | Agents use legitimate tools in unsafe or unintended ways due to ambiguous prompts or injection. Example: An invoice-processing agent is tricked into using its email tool to send sensitive documents externally. | \* Enforce least-privilege controls on tool permissions \* Validate and authorize every high-impact tool action \* Monitor for abnormal tool usage \* Maintain full auditability of tool invocation chains | | **ASI03 -- Identity \& Privilege Abuse** | Agents inherit human or cached credentials and escalate privileges. Example: A customer-support agent reuses an admin token from a prior workflow to access restricted HR data. | \* Identify excessive permissions \* Recommend least-privileged access for user, agents and tools \* Provide full runtime traceability for every action and decision | | **ASI04 -- Agentic Supply Chain Vulnerabilities** | Agents dynamically load tools, plugins, prompts or models at runtime: A single tampered dependency compromises the workflow. Example: An agent pulls a malicious package from a public repo, giving attackers internal execution. | \* Maintain a continuous inventory of all AI components and dependencies \* Validate component integrity and block untrusted sources \* Scan for malicious or anomalous behavior during execution \* Monitor lineage, privilege use and behavioral deviations at runtime \* - Scan tool configuration schema for injected threats | | **ASI06 -- Memory \& Context Injection** | Attackers poison memory, RAG data or session context, and steer agent behavior. Example: A malicious update inserted into a RAG dataset manipulates financial summaries or causes data leakage. | \* Classify and validate data before it enters agent memory \* Detect public or external access to RAG data \* Detect and block attempts to manipulate retrieval or memory stores \* Block malicious instructions and other types of threats inside RAG context | These examples underscore a broader truth. Mitigating agentic AI risk requires coordinated controls across areas such as visibility, identity, data, supply chain and runtime behavior, all of which are addressed in the four steps below. ## 4 Steps to Address the New Agentic AI Normal Agentic AI doesn't require replacing your security program, but it does require modernizing it. The following foundational capabilities align directly with the OWASP Top 10 for Agentic AI. These foundational capabilities give organizations faster investigation, governance that scales with experimentation, fewer production incidents and safer enterprise-wide adoption. ### 1. Comprehensive Visibility Unify visibility across agents, tools, datasets, models and identities so security teams can uncover blind spots and establish a defensible baseline. ### 2. Agent-Centric Inventory \& Context Maintain an inventory enriched with behavior, permissions, memory use and data access, which enables rapid identification of misconfigurations, overprivileged agents and risky workflows. ### 3. Supply Chain Integrity Across AI Components Continuously verify the integrity of prompts, plugins, RAG datasets, orchestration scripts and model dependencies to prevent tampering and dependency abuse. ### 4. Governance, Guardrails and Active Runtime Control Apply least privilege, policy enforcement and real-time monitoring to ensure that agents behave safely from development through production. ## How Prisma AIRS Helps Prisma AIRS™ [AI Agent Security](https://live.paloaltonetworks.com/t5/community-blogs/how-prisma-airs-2-0-secures-the-autonomous-workforce/ba-p/1241611) helps organizations put the OWASP Top 10 for Agentic AI into practice with real visibility and real control. It begins by automatically discovering AI agents across [SaaS](https://www.paloaltonetworks.com/blog/network-security/prisma-airs-integrates-with-microsoft-copilot-studio-for-ai-security/), custom-built, [cloud application development pipelines](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management) and third-party environments, giving security teams a clear picture of where agents exist. This supports OWASP risks tied to hidden components and unchecked dependencies, such as Agentic Supply Chain Vulnerabilities (ASI04). Once agents are visible, Prisma AIRS continuously monitors [how they behave](https://www.paloaltonetworks.com/blog/?p=347542&post_type=net_sec_post&preview=1&_ppp=40708ae97a) --- which tools they use, what data they access, and how their permissions change over time. Continuous monitoring helps detect and prevent Tool Misuse \& Exploitation (ASI02) and Identity \& Privilege Abuse (ASI03) before they turn into incidents. What's more, Prisma AIRS AI Runtime Security^TM^ can inspect RAG data context and tool schema for evidence of poisoning (ASI06), including attempts to hijack the agent's goal to perform malicious behavior (ASI01). Prisma AIRS is the most comprehensive platform that unifies discovery, identity, datapath control, supply chain verification and runtime behavior --- the full agent lifecycle. With Prisma AIRS organizations have a practical, scalable solution to secure agentic AI inline with the OWASP framework. ## Next Steps The release of the **OWASP Top 10 for Agentic Applications 2026** is a crucial moment for the industry. Autonomous agents are accelerating innovation --- and introducing entirely new classes of risk tied to data, identity, supply chain and runtime behavior. Organizations that embrace a comprehensive, visibility-first approach --- one that identifies agents, maps dependencies, protects RAG data, governs tool access and enforces runtime controls --- will be positioned to safely harness the next wave of autonomous AI. This is the new normal for AI security. Now, with the OWASP framework as a shared industry standard --- and with modern agentic security platforms such as [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security) and Cortex Cloud [AI-SPM](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management) --- organizations have a clear, actionable path to secure autonomous AI at scale. Agentic AI is not a future risk. It's already embedded in SaaS apps, internal automations and developer workflows today. The organizations that modernize now will define the industry standard for safe autonomous operations. If your organization is building or consuming agentic AI today, this is the moment to move from awareness to action. Here are the recommended next steps: 1. For a hands-on assessment of your Agentic AI Security posture, [contact Palo Alto Networks](https://www.paloaltonetworks.com/company/contact-sales)to evaluate your agent landscape. 2. To [activate your end-to-end cloud-native application security, check out our Cortex Cloud Security demo.](https://www.paloaltonetworks.com/cortex/cloud/demo) 3. To learn more about how to protect against the OWASP Agentic threats, [download our latest AI Agent Security datasheet](https://www.paloaltonetworks.com/resources/datasheets/prisma-airs-ai-agent-security). 4. [Dive into Prisma AIRS 2.0 to see the latest advancements](https://www.paloaltonetworks.com/blog/2025/10/prisma-airs-powering-secure-ai-innovation/) in AI discovery, posture management, agent security, and runtime protection. *** ** * ** *** ## Related Blogs ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown) [#### Is AI a New Challenge for Cloud Security? Yes and No.](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/ai-security-gap-cloud-models-agents/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown) [#### Understanding API Risk in the Age of AI](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/api-security-ai-risk/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [#### Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/owasp-top-10-llms-ai-security-guide/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security-posture-management/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [#### Why Self-Managed AI Models Are Blind Spots and What to Do About It](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/self-managed-ai-security-risks/) ### [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Security Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-platform/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Closing the Gap Between Cloud Visibility and Network Security](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/cloud-visibility-network-security-context-exposure-management/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Securing the Agentic Endpoint](https://origin-researchcenter.paloaltonetworks.com/blog/2026/02/securing-the-agentic-endpoint/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language