Community Blogs
LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1261 PostsLIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1261 PostsDiscover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.
10 PostsAs organizations accelerate their digital transformation, the complexity of maintaining regulatory compliance and security best practices has grown exponentially. Security teams often find themselves navigating disjointed dashboards, wrestling with manual spreadsheets, and struggling to get a clear picture of their compliance posture across a di...
Big news, Community! We are thrilled to announce that the Community Team at Palo Alto Networks has once again been nominated for the prestigious CMX Community Industry Awards! Last year, thanks to your incredible enthusiasm and votes, we were one of the top 3 finalists. Being recognized as one of the best in the industry was a huge honor, bu...
On December 4th, Fuel hosted another one of our Workshops focusing on identifying and resolving performance issues with the management plane of your Next Generation Firewall (NGFW). During this event, we will hear from Staff Technical Support Engineers Siddhant Chawla and Angelo Eisma on what practices to follow to perform this troubleshooting....
This blog was written by Tuan Vu Countering Modern Evasive Threats The enterprise browser has become a high-value target as attackers shift toward more evasive web-based techniques. What began as a straightforward battle between security vendor databases and malicious domains has evolved into a more complex scenario. While security vendors c...
Co-authored by: Chintan Udeshi, Principal Product Manager We are excited to announce that Palo Alto Networks has introduced AliCloud Gateway Load Balancer (GWLB) support for VM-Series firewalls, enabling enterprises to secure critical workloads with greater elasticity and ease. This integration addresses long-standing challenges in cloud netwo...
This blog was written by Sabitha Muppuri (Sr Staff Site Reliability Engineer) The Critical Need for Vendor Tool Health Monitoring in Orchestration Environments In today's highly orchestrated and autoscaling cloud environments, vendor tool health plays an important role in maintaining application stability and performance. This blog entry wil...
The Cloud-Delivered Security Service Edge: The Monthly Newsletter for Security That Never Sleeps Welcome to the November 2025 edition of the Cloud-Delivered Security Services (CDSS) Newsletter The Cloud-Delivered Security Services (CDSS) Monthly Newsletter brings you the latest updates, insights, and innovations from Palo Alto Networks’ cloud-...
A Decade of Showing Up Greetings Everyone! Over the last ten years, this community has become a place people rely on every day. Whether they’re troubleshooting something urgent, sharing hard-earned experience, or helping someone avoid hours of trial and error. What’s kept LIVEcommunity moving forward isn’t marketing or big campaigns. It’s...
Author: @vangupta What is AI Canvas? AI Canvas is your no-code data exploration platform within Strata Cloud Manager. It revolutionizes how you interact with your security data, empowering you to ask questions in plain English and get immediate insights. Instead of navigating complex dashboards and filters, you can now have a conversation ...
By: @almraza Overview: Artificial Intelligence Category In 2023, Palo Alto Networks introduced the Artificial Intelligence category within Advanced URL Filtering to provide industry-leading visibility and policy control over the rapidly expanding landscape of AI-driven web traffic. This category enabled organizations to understand better an...
In today's dynamic threat landscape, securing web traffic is one of the biggest challenges organizations face. Traditional web proxies often fail to provide comprehensive protection, leaving you vulnerable to advanced threats and data loss. That's why we're excited to highlight the powerful native web proxy capabilities introduced in our PAN-O...
By: @lizwang Co-Author: @tbolatiwa Most software, whether benign or malicious, is built upon existing code. This inherent reuse has long given adversaries a powerful advantage, allowing them to replicate and adapt malicious techniques with ease. That advantage has now been amplified by large language models (LLMs). Adversaries can use AI to a...
By: @ssingh29 Co-Author: @tbolatiwa Attackers today are using sophisticated AI-driven tactics to evade traditional defenses and deceive even the most vigilant users. Phishing attacks, in particular, have become smarter, faster, and more convincing than ever before. As a result, organizations are recognizing the need for security that goes be...
By: @aechano Co-Author: @tbolatiwa Imagine a trusted employee clicks a legitimate-looking link. In a fraction of a second, an invisible chain of redirects begins. A stealthy, automated system analyzes their device, identifies them as a perfect target, and directs them to a sophisticated, custom-crafted phishing site or a tech-support scam. T...
In the first installment of this article, Securing the Autonomous Workforce, we looked at how AI agents are reshaping work and pushing beyond the limits of traditional security. What started as small experiments has turned into a network of autonomous systems that move faster than most teams can track. That shift has left enterprises guessing at...
| Subject | Likes |
|---|---|
| 2 Likes | |
| 2 Likes | |
| 1 Like | |
| 1 Like | |
| 1 Like |
| User | Likes Count |
|---|---|
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |


