<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article April 2024 Rewind: LIVEcommunity Highlights in News</title>
    <link>https://live.paloaltonetworks.com/t5/news/april-2024-rewind-livecommunity-highlights/ta-p/584871</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_April-Rewind_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59295iF3AEBDB591A4D224/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_April-Rewind_palo-alto-networks.jpg" alt="Title_April-Rewind_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Welcome to our &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;April 2024 Rewind&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;, where we review some of LIVEcommunity’s biggest headlines from the past month!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In April, we featured a ton of articles and blogs on: our recent member spotlight, the release of Threat Vector podcast episodes - catch up now!, how to register for the upcoming Precision AI™ and upcoming InterSECt 2024 events, the latest Product-centric blogs, new PANCast episodes and a lot more! Read on to see the community's April 2024 highlights.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Community Highlights&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Recent Member Spotlight&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read highlights of our most engaged contributors with our monthly LIVEcommunity Member Spotlight!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/member-spotlights/livecommunity-april-2024-member-spotlight-pavelk/ba-p/581810" target="_blank" rel="noopener"&gt;LIVEcommunity April 2024 Member Spotlight: @PavelK&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Other Interesting Highlights&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/precision-ai-unveiling-the-future-of-ai-amp-cybersecurity/ba-p/584823" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Precision AI™: Unveiling the Future of AI &amp;amp; Cybersecurity - Register Now!&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join us as we dive into cutting-edge technologies and unveil the latest advancements in &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;artificial intelligence and cybersecurity&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;. Discover how AI is changing the face of cyberthreats and is revolutionizing the way we safeguard our digital landscapes. Engage with industry leaders, experts and visionaries as we explore the transformative potential of AI-driven security solutions. Don't miss your chance to be part of this groundbreaking event on the future of cybersecurity. Read more to learn about this virtual event…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/the-next-chapter-of-sase-begins-register-today-for-intersect/ba-p/583774" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;The Next Chapter of SASE Begins: Register Today for InterSECt 2024!&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join us at &lt;/SPAN&gt;&lt;A href="https://intersect.paloaltonetworks.com/?utm_campaign=intersect-2024&amp;amp;utm_medium=communities&amp;amp;utm_source=live-community-global-sase&amp;amp;utm_content=live-event" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;InterSECt 2024&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;, a 2-hour virtual experience, where industry leaders, tech visionaries and cybersecurity professionals gather at the intersection of security and innovation. You’ll learn how the latest advancements in SASE are leveraging the power of AI to deliver industry-leading security, while meeting complex user and operational needs to drive meaningful results.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Product Insights&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/playbook-of-the-week-streamlining-suspicious-data-upload-alert/ba-p/583609#M3189" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Playbook of the Week: Streamlining Suspicious Data Upload Alert Investigations&lt;/STRONG&gt;&lt;/A&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-ssl-forward-proxy/ta-p/542814" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Data exfiltration involves covertly transferring sensitive data outside a network, posing serious risks like privacy breaches. Investigating such breaches is challenging and time-consuming. Introducing Cortex XDR - Large Upload playbook—a solution to streamline the &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;investigation of large upload alerts&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;, enhancing efficiency in addressing data exfiltration threats.. Learn more in our blog…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/playbook-of-the-week-prisma-cloud-compute-compliance-alert-v2/ba-p/583801#M3193" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Playbook of the Week: Prisma Cloud Compute - Compliance Alert v2&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evolving cybersecurity landscape. However, simply receiving alerts about compliance issues is often not enough to effectively mitigate risks. To address this challenge, we are thrilled to introduce an enhanced use case for handling compliance alerts from &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Prisma Cloud Compute&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt; in Cortex XSOAR. Read more in our blog…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/on-credible-and-cyber-contextual-labeling/ba-p/583444#M3188" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;On Credible and Cyber-Contextual Labeling&lt;/STRONG&gt;&lt;/A&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-ssl-forward-proxy/ta-p/542814" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Machine learning (ML) powered methods are rapidly taking over the cybersecurity medium, performing a variety of complex tasks, including detection, prevention, and prioritization. Albeit not required by all methods, accurate labels of the training data at hand are generally necessitated to allow appropriate control over the underlying models’ characteristics and infusion of cybersecurity context. Nevertheless, the generation of credible labels in the cybersecurity domain embodies a great challenge that has yet to be properly addressed. Learn more in our blog…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/xsoar-8-on-premises-now-available/ba-p/583769#M3190" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;XSOAR 8 On-Premises Now Available!&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We are pleased to announce the support for on-premises deployments for &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;XSOAR 8&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reasons can now take advantage of the latest features of Cortex XSOAR. Find out more in our blog…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/confirm-attack-surface-vulnerabilities-with-cortex-xpanse-attack/ba-p/583951#M3195" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Confirm Attack Surface Vulnerabilities with Cortex Xpanse Attack Surface Testing&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As organizations’ attack surfaces continue to grow, we’ve seen that traditional vulnerability testing is insufficient to secure an organization’s externally-facing assets. Conventional &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;vulnerability management (VM)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt; tools lack a comprehensive inventory of known and unknown external assets. This means that external vulnerability testing is incomplete as well as manual and infrequent. Find out more in our blog…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/new-advanced-url-filtering-category-marijuana/ba-p/583789" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;New Advanced URL Filtering category: Marijuana&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Palo Alto Networks will release a new &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Advanced URL Filtering category called “Marijuana”&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;. Action may be required. The default action for this new Marijuana category is “allow.” If you currently alert on or block marijuana websites (using a combination of “Health and Medicine” and “Abused Drugs”), you will need to ensure that you set the action to “alert” or “block” as appropriate for this new Marijuana category. Find out more in our blog…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/what-s-next-in-cortex-xsiam-for-cloud-and-other-innovations/ba-p/583947#M3194" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;What’s Next in Cortex — XSIAM for Cloud and Other Innovations&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Security operations teams are tasked with solving a variety of different challenges. They face the complexities of protecting growing and dynamic cloud environments; investigating and resolving security incidents quickly; proactively managing risks, preventing the next major breach; and so much more. Find out more in our blog…&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/detect-log-and-block-unsanctioned-post-quantum-ciphers-pqc-with/ba-p/584107" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Detect, Log, and Block Unsanctioned Post-Quantum Ciphers (PQC) with Threat IDs on PANW Firewalls&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Quantum Threat of a Cryptographically Relevant Quantum Computer’s (CRQC)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt; ability to break existing encryption and break the security and privacy fabric is one of the most significant threats we’ve encountered since cryptography became widely accepted about four decades ago. As a result, the United States White House has issued a mandate for companies to prepare now (!) for a post-quantum world. Find out more in our blog…&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=A4hkpZr0S80" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Palo Alto VM Series Active/Passive High Availability on Google Cloud&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this video you will learn how to deploy and configure Palo Alto VM Series in &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Active/Passive High Availability on Google Cloud Platform&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;. This also demonstrates Session synchronization capability of VM Series firewall on GCP. Find out more by watching the video…&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/threat-brief-operation-midnighteclipse-post-exploitation/ba-p/584850" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated April 24)&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;threat brief&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt; is frequently updated as new threat intelligence is available for us to share. The full update log is at the end of this post and offers the fullest account of all changes made.&lt;/SPAN&gt;&lt;STRONG&gt; Updated April 24&lt;/STRONG&gt;&lt;SPAN&gt; to include a link to the relevant Customer Support Portal Knowledge Base article. Find out more in our blog…&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/leading-with-a-prevention-first-approach-for-cloud-detection-and/ba-p/584867" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Leading with a Prevention-First Approach for Cloud Detection and Response&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cyberthreats targeting the cloud and traditional enterprise assets. These trends have necessitated a paradigm shift toward more advanced security measures in &lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;cloud security practices&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;. Find out more in our blog…&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;New PANCast Episodes Are Out!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PANCast™ is a Palo Alto Networks podcast that provides actionable insights from cybersecurity experts to customers, helping them ensure each day is more secure than the one before it. Visit our &lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/tkb-p/palo-alto-networks-podcasts-PANCast" target="_blank" rel="noopener"&gt;PANCast™ homepage&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN&gt; to learn more and watch our previous podcasts in this series.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-40-prisma-cloud-api-discovery-using-waas/ta-p/583316" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;PANCast™ Episode 40: Prisma Cloud API Discovery Using WAAS&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F_u5VPyfLsjc%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_u5VPyfLsjc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F_u5VPyfLsjc%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast™ Episode 40: Prisma Cloud API Discovery Using WAAS" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-41-scaling-on-prisma-access/ta-p/584437" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;PANCast™ Episode 41: Scaling on Prisma Access&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F5JpAAxq8Kp4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5JpAAxq8Kp4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F5JpAAxq8Kp4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast™ Episode 41: Scaling on Prisma Access" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;New Threat Vector Podcast Episodes - Available Now!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Vector is your compass in the world of cyberthreats. We unravel cyber threat intelligence secrets through engaging discussions, expert interviews, and insightful analysis. Hear our unique threat intelligence, cutting-edge techniques, and real-world case studies. We'll equip you with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A class="in-cell-link" href="https://live.paloaltonetworks.com/t5/threat-vector/how-to-defend-against-adversarial-ai-and-deepfakes/ta-p/585361" target="_blank" rel="noopener"&gt;How to Defend Against Adversarial AI and Deepfakes&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A class="in-cell-link" href="https://live.paloaltonetworks.com/t5/threat-vector/understanding-the-midnight-eclipse-activity-and-cve-2024-3400/ta-p/585372" target="_blank" rel="noopener"&gt;Understanding the Midnight Eclipse Activity and CVE 2024-3400&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Catch Up on Previous Threat Vector Podcast Episodes Now&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vector/cybersecurity-in-the-ai-era-insights-from-unit-42-s-kyle-wilhoit/ta-p/582526" target="_blank" rel="noopener"&gt;Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vector/mission-driven-security-from-marine-corps-to-silicon-valley/ta-p/582691" target="_blank" rel="noopener"&gt;Mission-Driven Security: From Marine Corps to Silicon Valley&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vector/the-role-of-threat-hunting-in-cybersecurity/ta-p/582687" target="_blank" rel="noopener"&gt;The Role of Threat-Hunting in Cybersecurity&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vector/beyond-the-breach-strategies-against-ivanti-vulnerabilities/ta-p/582696" target="_blank" rel="noopener"&gt;Beyond the Breach: Strategies Against Ivanti Vulnerabilities&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vector/deep-dive-into-the-2024-incident-response-report-with-unit-42-s/ta-p/582700" target="_blank" rel="noopener"&gt;Deep Dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" Sikorski&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vector/the-sec-s-cybersecurity-law-a-new-compliance-era-with-jacqueline/ta-p/582705" target="_blank" rel="noopener"&gt;The SEC's Cybersecurity Law, a New Compliance Era with Jacqueline Wudyka&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;April ‘24 Discussion Highlight: Posts With Accepted Solutions&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Nominated Discussions help LIVEcommunity Solutions Engineers highlight a discussion that has an &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/how-and-why-to-accept-solutions/ba-p/553827" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Accepted Solution&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, and turn it into an article with additional helpful information, documentation, and clarity! Here are the Nominated Discussions we published this past month:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-vpn-troubleshooting/ta-p/584932" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Nominated Discussion - VPN Troubleshooting&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Stay in the Loop&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Be sure to &lt;/SPAN&gt;&lt;STRONG&gt;subscribe&lt;/STRONG&gt;&lt;SPAN&gt; to our &lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/news/tkb-p/Community_News" target="_blank" rel="noopener"&gt;News section&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN&gt; to stay up-to-date on LIVEcommunity news, updates, and more!&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 01 May 2024 16:40:43 GMT</pubDate>
    <dc:creator>emgarcia</dc:creator>
    <dc:date>2024-05-01T16:40:43Z</dc:date>
    <item>
      <title>April 2024 Rewind: LIVEcommunity Highlights</title>
      <link>https://live.paloaltonetworks.com/t5/news/april-2024-rewind-livecommunity-highlights/ta-p/584871</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In April, we featured a ton of articles and blogs on: our recent member spotlight, the release of Threat Vector podcast episodes - catch up now!, how to register for the upcoming Precision AI™ and upcoming InterSECt 2024 events, the latest Product-centric blogs, new PANCast episodes and a lot more! Read on to see the community's April 2024 highlights.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_April-Rewind_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59296iB9950A46AA72AD10/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_April-Rewind_palo-alto-networks.jpg" alt="Title_April-Rewind_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 16:40:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/news/april-2024-rewind-livecommunity-highlights/ta-p/584871</guid>
      <dc:creator>emgarcia</dc:creator>
      <dc:date>2024-05-01T16:40:43Z</dc:date>
    </item>
  </channel>
</rss>

