Blogs
The Blogs page offers insights into new product features, cybersecurity solutions, and updates relevant to the Palo Alto Networks cybersecurity community. Dive into in-depth technical articles on our innovations, robust systems, and cutting-edge cybersecurity solutions from Palo Alto Networks Engineering.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Blogs
The Blogs page offers insights into new product features, cybersecurity solutions, and updates relevant to the Palo Alto Networks cybersecurity community. Dive into in-depth technical articles on our innovations, robust systems, and cutting-edge cybersecurity solutions from Palo Alto Networks Engineering.

Browse the Community

Community Blogs

LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.

1286 Posts

Engineering Blogs

Discover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.

10 Posts

Activity in Blogs

Thank you for your support in the 2026 CMX Community Industry Awards!

2 min read

We’re incredibly grateful to the members of LIVEcommunity and Fuel User Group who helped champion Palo Alto Networks in the 2026 Community Industry Awards hosted by CMX, a global leader dedicated to advancing the community profession and recognizing excellence across the industry. CMX plays a vital role in shaping the future of community-led o...

Cheryl - Winner, Executive Leader - smaller.png

When agents lose their instincts: How AI safety can be undone in a single prompt

8 min read

This blog was written by Jane Leung, Product Marketing Manager Over the past 48 hours, a stark headline has dominated security coverage: “Single prompt breaks AI safety in 15 major language models.” Reporting from CSO Online and Microsoft points to a troubling conclusion: The safety controls built into today’s leading AI models may be far mor...

General Graphics (1).jpg
JayGolf by Community Team Member
  • 64 Views
  • 0 replies
  • 0 Likes

Fuel Workshop: User-ID and IPsec VPN Deployment and Troubleshooting

2 min read

On February 3rd, 2026, Fuel hosted a workshop on two different deployment and troubleshooting topics: User-ID and IPsec VPN on PAN-OS for the next-generation firewall. During this event, we heard from Siddhant Chawla, assisted by Angelo Eisma, on how to perform deployments of and troubleshooting for both User-ID functionality as well as IPsec...

Fuel Workshop - February 2026 - User-ID and IPsec VPN Deployment and Troubleshooting.png

Behind the Mic: How David Moulton Turned a "Side Project" into a Million-Download Powerhouse

4 min read

We recently hit a massive milestone: Episode 100 of the Threat Vector podcast. To celebrate, I reached out to the man behind the microphone, David Moulton, to get the inside story on how this show went from a small biweekly segment to the #2 technology podcast in the U.S. David was kind enough to share some behind-the-scenes stories—including ...

Threat Vector visual.png
David-Moulton.jpeg
Threat Vector Template.jpg
kiwi by Community Team Member
  • 702 Views
  • 2 replies
  • 1 Likes

Fuel Workshop: SASE Easy Onboarding

2 min read

On January 27, 2026, Fuel hosted a workshop on SASE Easy Onboarding. During this event, we heard from Suman Dey as he showed us how to take advantage of the SASE Easy Onboarding process built into Prisma Access. In these videos, you will be able to see all of the ways that Suman was able to see all of the different aspects of how simple this ...

Fuel Workshop - January 2026 - SASE Easy Onboarding - Watch Now.png

Detection of Pastejacking Social Engineering Tactics

3 min read

As social engineering tactics become more sophisticated, threat actors are increasingly leveraging user-driven execution models. Palo Alto Networks has implemented detection capabilities for Pastejacking phishing attacks, a category of threats that weaponize the user’s clipboard to bypass traditional security perimeters. Understanding Pastejac...

Screenshot 2026-02-04 at 8.38.43 AM.png
Screenshot 2026-02-04 at 8.45.59 AM.png
Screenshot 2026-02-04 at 8.48.21 AM.png
tuvu01 by L3 Networker
  • 910 Views
  • 0 replies
  • 0 Likes

Easily Create Intent-Driven Dashboards Using Natural Language

3 min read

In the world of Network Security Operations, we often find ourselves "drowning in data but starving for insights." You know the drill: a critical ticket comes in, and suddenly you’re jumping between five different tabs, exporting logs to spreadsheets, and manually stitching together a story to find a root cause. Traditional dashboards are great ...

prajamani_4-1769772989069.png
AI Canvas.png
Transparency.png
Reporting.png

Tune your PAN Firewall for effective security!

2 min read

A production deployment of a security solution must balance effective security with operational metrics - stability, uptime, and a seamless experience for end-users. Production environments deal with real-world traffic where the primary focus is on policy enforcement, integration with existing network stacks, and maintaining a high quality of ex...

mlawson by L2 Linker
  • 3129 Views
  • 0 replies
  • 1 Likes

How to Vibe Code Without Creating Tech Debt

5 min read

Simple principles that make AI-assisted coding reliable in real codebases. Vibe coding is now part of daily engineering work: describe intent, let an AI assistant generate code, iterate fast, ship faster. We did that too. And it worked—at first. Then we started noticing patterns repeating across changes. Each one looked small. Together, they q...

smadugundi_1-1769611196213.png

From Log Chaos to Intelligence: How LogWatch Agent Revolutionises Operational Analysis

8 min read

This blog is written by Puneet Gupta Have you ever been in this situation? It's 3 AM. Production is down. Customers are hitting errors. Your phone won't stop ringing. You grep through thousands of log lines across services, packet captures, and metrics dashboards. The clock is ticking. Every minute costs real money. Finally, you find somethi...

pugupta_8-1769610307365.png
universal_problem.png
TSE Agent.png
Jenkins pipeline correlation using logwatch.png
pugupta by L2 Linker
  • 2802 Views
  • 0 replies
  • 0 Likes

Cloud-Delivered Security Service (CDSS) January Newsletter

7 min read

Cloud-Delivered Security Service: The Monthly Newsletter for Security That Never Sleeps Welcome to the January edition of the Cloud-Delivered Security Service (CDSS) Newsletter Welcome to the January edition of the Cloud Delivered Security Services (CDSS) Newsletter. As threats continue to evolve in speed, scale, and sophistication driven by A...

Screenshot 2026-01-05 at 1.46.49 PM.png
Screenshot 2026-01-27 at 10.15.45 PM.png
Screenshot 2026-01-27 at 10.19.27 PM.png
Screenshot 2026-01-27 at 10.23.52 PM.png
tbolatiwa by L3 Networker
  • 2548 Views
  • 0 replies
  • 2 Likes

Precision and Scale: Enhancing Control with Custom FQDN Lists and Automatic EDL Subdomain Expansion

3 min read

This blog was written by Gokul Pokuri, Sr. Tehcnical Marketing Engineer How Advanced DNS Security Resolver delivers precise control without added complexity In the world of distributed enterprise security, speed and precision are not just metrics, they are survival traits. While global threat intelligence feeds are essential for stopping kno...

Strata Graphics (1).jpg
JayGolf_0-1769192333079.png
JayGolf_0-1769193255466.png
JayGolf_1-1769193301084.png
JayGolf by Community Team Member
  • 3780 Views
  • 0 replies
  • 0 Likes

Reduce Lateral Risk via Layer 7 Micro-Perimeter Protection

3 min read

Palo Alto Networks is addressing the growing threat of lateral movement within private and public cloud environments by introducing PAN traffic Redirector for creating a Micro-perimeter around your critical workloads. This solution enables organizations to establish granular security directly around high-value "crown jewel" workloads, such as da...

ahood_1-1768586305201.png
ahood by L2 Linker
  • 4310 Views
  • 0 replies
  • 0 Likes

Streamlining Innovation and Stability: The New 12.1 PAN-OS Release Cycle & Support Policy

4 min read

At Palo Alto Networks, we understand that your security operations rely on a delicate balance: you need the latest innovations to stop emerging threats, but you also require absolute stability in your network infrastructure. To better serve this need, we are standardizing our release cycle and support policy starting with PAN-OS 12.1. This new...

rohsawhney_0-1768556449637.png
New PAN-OS Release Cycle & Support Policy.png

Native Cloud Firewalls Are Foundational - Until Scale Changes the Equation

3 min read

Native cloud firewalls provide baseline controls that are tightly integrated with cloud infrastructure. For early deployments, that simplicity works well. As environments scale, architectures become more distributed, identity replaces addressing as the primary abstraction, and east-west traffic overtakes traditional north-south flows. At this po...

ahood by L2 Linker
  • 4597 Views
  • 0 replies
  • 0 Likes
Register or Sign-in