Community Blogs
LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1286 PostsLIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1286 PostsDiscover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.
10 PostsWe’re incredibly grateful to the members of LIVEcommunity and Fuel User Group who helped champion Palo Alto Networks in the 2026 Community Industry Awards hosted by CMX, a global leader dedicated to advancing the community profession and recognizing excellence across the industry. CMX plays a vital role in shaping the future of community-led o...
This blog was written by Jane Leung, Product Marketing Manager Over the past 48 hours, a stark headline has dominated security coverage: “Single prompt breaks AI safety in 15 major language models.” Reporting from CSO Online and Microsoft points to a troubling conclusion: The safety controls built into today’s leading AI models may be far mor...
On February 3rd, 2026, Fuel hosted a workshop on two different deployment and troubleshooting topics: User-ID and IPsec VPN on PAN-OS for the next-generation firewall. During this event, we heard from Siddhant Chawla, assisted by Angelo Eisma, on how to perform deployments of and troubleshooting for both User-ID functionality as well as IPsec...
We recently hit a massive milestone: Episode 100 of the Threat Vector podcast. To celebrate, I reached out to the man behind the microphone, David Moulton, to get the inside story on how this show went from a small biweekly segment to the #2 technology podcast in the U.S. David was kind enough to share some behind-the-scenes stories—including ...
On January 27, 2026, Fuel hosted a workshop on SASE Easy Onboarding. During this event, we heard from Suman Dey as he showed us how to take advantage of the SASE Easy Onboarding process built into Prisma Access. In these videos, you will be able to see all of the ways that Suman was able to see all of the different aspects of how simple this ...
As social engineering tactics become more sophisticated, threat actors are increasingly leveraging user-driven execution models. Palo Alto Networks has implemented detection capabilities for Pastejacking phishing attacks, a category of threats that weaponize the user’s clipboard to bypass traditional security perimeters. Understanding Pastejac...
In the world of Network Security Operations, we often find ourselves "drowning in data but starving for insights." You know the drill: a critical ticket comes in, and suddenly you’re jumping between five different tabs, exporting logs to spreadsheets, and manually stitching together a story to find a root cause. Traditional dashboards are great ...
A production deployment of a security solution must balance effective security with operational metrics - stability, uptime, and a seamless experience for end-users. Production environments deal with real-world traffic where the primary focus is on policy enforcement, integration with existing network stacks, and maintaining a high quality of ex...
Simple principles that make AI-assisted coding reliable in real codebases. Vibe coding is now part of daily engineering work: describe intent, let an AI assistant generate code, iterate fast, ship faster. We did that too. And it worked—at first. Then we started noticing patterns repeating across changes. Each one looked small. Together, they q...
This blog is written by Puneet Gupta Have you ever been in this situation? It's 3 AM. Production is down. Customers are hitting errors. Your phone won't stop ringing. You grep through thousands of log lines across services, packet captures, and metrics dashboards. The clock is ticking. Every minute costs real money. Finally, you find somethi...
Cloud-Delivered Security Service: The Monthly Newsletter for Security That Never Sleeps Welcome to the January edition of the Cloud-Delivered Security Service (CDSS) Newsletter Welcome to the January edition of the Cloud Delivered Security Services (CDSS) Newsletter. As threats continue to evolve in speed, scale, and sophistication driven by A...
This blog was written by Gokul Pokuri, Sr. Tehcnical Marketing Engineer How Advanced DNS Security Resolver delivers precise control without added complexity In the world of distributed enterprise security, speed and precision are not just metrics, they are survival traits. While global threat intelligence feeds are essential for stopping kno...
Palo Alto Networks is addressing the growing threat of lateral movement within private and public cloud environments by introducing PAN traffic Redirector for creating a Micro-perimeter around your critical workloads. This solution enables organizations to establish granular security directly around high-value "crown jewel" workloads, such as da...
At Palo Alto Networks, we understand that your security operations rely on a delicate balance: you need the latest innovations to stop emerging threats, but you also require absolute stability in your network infrastructure. To better serve this need, we are standardizing our release cycle and support policy starting with PAN-OS 12.1. This new...
Native cloud firewalls provide baseline controls that are tightly integrated with cloud infrastructure. For early deployments, that simplicity works well. As environments scale, architectures become more distributed, identity replaces addressing as the primary abstraction, and east-west traffic overtakes traditional north-south flows. At this po...
| Subject | Likes |
|---|---|
| 2 Likes | |
| 2 Likes | |
| 2 Likes | |
| 2 Likes | |
| 1 Like |
| User | Likes Count |
|---|---|
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |


