Blogs
The Blogs page offers insights into new product features, cybersecurity solutions, and updates relevant to the Palo Alto Networks cybersecurity community. Dive into in-depth technical articles on our innovations, robust systems, and cutting-edge cybersecurity solutions from Palo Alto Networks Engineering.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Blogs
The Blogs page offers insights into new product features, cybersecurity solutions, and updates relevant to the Palo Alto Networks cybersecurity community. Dive into in-depth technical articles on our innovations, robust systems, and cutting-edge cybersecurity solutions from Palo Alto Networks Engineering.

Browse the Community

Community Blogs

LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.

1233 Posts

Engineering Blogs

Discover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.

10 Posts

Activity in Blogs

An Automated Approach to Red Teaming Language Models and AI Applications

9 min read

authors: @nramanan, @sdrolia Executive Summary Traditional cybersecurity tools are blind to AI's newest threat vector: malicious conversations. As organizations deploy AI systems to handle customer service, financial advice, and healthcare guidance, they face sophisticated attacks that exploit natural language understanding rather than code...

figure 1.jpg
figure 2.jpg
figure 3.jpg
figure 4.jpg
nramanan by L1 Bithead
  • 138 Views
  • 0 replies
  • 0 Likes

October 2025 Spark User Summit - Device Security: Comprehensive Protection for Managed, Unmanaged, and IoT Devices

2 min read

This next Spark User Summit will be taking place on October 23rd, 2025 at 9:30 AM Pacific Time. This month, Fuel will be welcoming in Victor Kameyama and Karthik Thumula to give us a comprehensive overview of Device Security. As organizations adopt connected devices at unprecedented speed, their attack surface is expanding just as fast. From...

October Spark - Device Security Comprehensive Protection for Managed, Unmanaged, and IoT Devices.png

September 2025 Spark User Summit: Strengthen Your Cyber Defense with Advanced Security Built to Combat AI-driven Attacks

2 min read

On September 25th, Fuel hosted another Spark User Summit and we spoke with two very informed experts on how to improve and harden your cyber defense. During this roundtable, speakers Srinivas Avasarala and Taylor Ettema discussed the issues with the changes in attacks from threat actors. No longer are they using a single, simple, one-dimension...

Watch Now - Spark User Summit - September 2025 - Strengthen Your Cyber Defense.png

Ignite & Activate Series – Part 2: Preventing Patient Zero | How to  Defend Against Zero-Day Exploits  With Advanced Threat Prevention

4 min read

By: Nina Smith Watch this short video to learn how to enable ATP with Inline Cloud Analysis and prevent zero-day exploits. Note: PAN-OS 11.0, an ATP license, and a consistent cloud connection are required. In Part 1 of our Ignite and Activate Series, we explored how attackers are increasingly motivated to create cyber threats that are more...

ninsmith_0-1758789858027.png
ninsmith by L3 Networker
  • 318 Views
  • 0 replies
  • 4 Likes

September 2025 Spark User Summit: PAN-OS 12.1 - Orion

2 min read

On Thursday, September 18th, Fuel had another of our monthly Spark User Summits and we heard from two experts on the new offerings of PAN-OS 12.1, Orion. Speakers Imran Bashir and John Harrison introduced us to some of the new functionality that's coming with Orion including Quantum security offerings, multicloud protection, and implementation ...

Watch Now - Spark User Summit - September 2025 - PAN-OS 12.1 - Orion.png

The Password Problem: Why Your Credentials Are a Liability

5 min read

The Password Problem: Why Your Credentials Are a Liability In the modern digital landscape, passwords have become more of a security liability than a protective measure. In 2024 alone, credential abuse was the top attack vector, accounting for 22% of publicly reported cyberattacks (source: Verizon 2025 DBIR). Credential abuse isn't just about...

Secure IDP-Managed Applications.jpg
Enhance Security on Kerberos Authenticated Applications.jpg
Legacy and Custom Applications.jpg
blevin by L2 Linker
  • 345 Views
  • 0 replies
  • 0 Likes

Raising the Bar for Incident Response

4 min read

Author: Jack Hughes Palo Alto Networks Unit 42 Recognised by UK’s NCSC as an Enhanced Level Cyber Incident Response Assured Service Provider The UK’s National Cyber Security Centre (NCSC) has officially added Palo Alto Networks Unit 42 to the Enhanced Level of its Cyber Incident Response (CIR) scheme, reflecting the high standards we bring ...

VTran15_0-1758622730417.png
VTran15 by L1 Bithead
  • 251 Views
  • 0 replies
  • 0 Likes

PAN-OS Modernization: Securing Tomorrow's Enterprise Today with 12.1 Orion

7 min read

PAN-OS Modernization: Securing Tomorrow's Enterprise Today with 12.1 Orion The Future is Now: Unveiling PAN-OS 12.1 Orion Headline: PAN-OS 12.1 Orion: The Future-Ready Foundation for Unrivaled Security, Performance, and Operational Agility Over a decade ago, the cybersecurity world was a chaotic battlefield of fragmented point solutions...

kiwi_1-1758611165239.png

From Data Chaos to AI-Powered Insights: Introducing AI Canvas

3 min read

Blog authored by Suhas Reddy Inturi Every day, network security professionals face a daunting challenge: an explosion of data. This isn’t a new problem, but the sheer volume, velocity, and fragmentation of modern security data has made traditional, static dashboards and manual troubleshooting critically insufficient. For example, a large globa...

ctu by L3 Networker
  • 486 Views
  • 0 replies
  • 0 Likes

Always Innovating In NetSec Series - July 2025

3 min read

July has been a month of powerful innovation and customer impact across Network Security. From major product milestones to new services and customer-focused resources, we continue to deliver on our promise of helping organizations stay ahead of today’s most complex threats. This month’s Always Innovating in NetSec highlights several key develo...

tbolatiwa_0-1758028221442.png

SSL Decryption, AI Training, and Data Privacy: Separating Fact from FUD

3 min read

From time to time, posts circulate that raise concerns about SSL/TLS decryption and the handling of logs in cloud-delivered security services. While healthy skepticism is important in cybersecurity, some of these narratives mix valid technical points with misleading claims — creating more fear, uncertainty, and doubt (FUD) than clarity. Let's br...

kiwi_0-1758026426180.png
mmohile by L1 Bithead
  • 285 Views
  • 0 replies
  • 0 Likes

Palo Alto Networks Extends Multilayered Quantum Safe VPN Support with ETSI 014 protocol, leveraging Quantum Key Distribution (QKD)

10 min read

The Need for Post-Quantum Resistant VPN Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH) are used extensively in both PKI encryption and IKE key exchange mechanisms (KEMs) to create shared key material to perform data encryption. This technology is at risk of being broken by a cryptographically r...

JayGolf_0-1757648992271.png
JayGolf_2-1757649076001.png
JayGolf_1-1757650767173.png
JayGolf_2-1757650811927.png
ashah1 by L2 Linker
  • 1207 Views
  • 0 replies
  • 2 Likes

Palo Alto Networks Introduces PAN-OS® 12.1 Orion

8 min read

Palo Alto Networks Introduces PAN-OS® 12.1 Orion Discover how PAN-OS® 12.1 Orion Major Features protects against tomorrow’s threats today. By: @Jigar | @ibashir As enterprises accelerate AI adoption, scale multicloud environments, and prepare for the quantum era, the complexity of securing dynamic infrastructures continues to grow. Threat ac...

kiwi_9-1757431398980.png
Figure1.jpg
Figure2.jpg
Figure3.jpg
kiwi by Community Team Member
  • 2207 Views
  • 1 replies
  • 2 Likes

Traffic Redirector: Preventing Lateral Threat Movement to Secure Critical Assets

5 min read

Co-authors: Josh Pederson, Senior Product Marketing Manager Jasmine Punia, Senior Product Manager Today, data centers and clouds are sprawling, dynamic environments where a single workload breach can lead to a catastrophic lateral spread. Micro-segmentation, creating secure zones around individual applications and workloads, is needed in mo...

A Unified Architecture for Multi-Cloud Security: From Visibility to Complete Protection

4 min read

Co-authors: Josh Pederson, Senior Product Marketing Manager Mani Ganesan, Director, Product Management Geetha Anandakrishnan, Principal Product Manager At Palo Alto Networks, we recognize that the shift to multi-cloud is the new operational standard, and we understand the profound security challenges this creates. Security teams face a dail...

discover.png
automated-deployment2.png
deploy.png
Register or Sign-in