Blogs
The Blogs page offers insights into new product features, cybersecurity solutions, and updates relevant to the Palo Alto Networks cybersecurity community. Dive into in-depth technical articles on our innovations, robust systems, and cutting-edge cybersecurity solutions from Palo Alto Networks Engineering.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Blogs
The Blogs page offers insights into new product features, cybersecurity solutions, and updates relevant to the Palo Alto Networks cybersecurity community. Dive into in-depth technical articles on our innovations, robust systems, and cutting-edge cybersecurity solutions from Palo Alto Networks Engineering.

Browse the Community

Community Blogs

LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.

1289 Posts

Engineering Blogs

Discover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.

10 Posts

Activity in Blogs

Introduction to Hyperscale security fabric (HSF) and various components

1 min read

This video introduces Hyperscale Security Fabric (HSF), a new solution from the Palo Alto Networks Software Firewalls team designed to deliver scalable, high-performance firewall clustering for modern environments. HSF enables multiple VM-Series firewalls to operate together as a unified security fabric, providing horizontal scale and built-in...

JayGolf by Community Team Member
  • 118 Views
  • 0 replies
  • 0 Likes

How Prisma SD-WAN AI transforms Network Operations: Strata Copilot

3 min read

For seasoned network administrators, the routine is all too familiar. The 'Old Way' of managing a WAN was a lot like fighting a wildfire, constantly racing to contain the next flare-up before it consumes the entire network. You’d wake up to an inbox full of alerts, log into five different consoles (one for the router, one for the firewall, one f...

How Prisma SD-WAN AI transforms Network Operations- Strata Copilot.png
query 1.png
query 2.png
query 3.png

2026 Unit 42 Global Incident Response Report – Attacks Now 4x Faster

5 min read

Each year, thousands of organizations experience a cyber incident. An incident can begin with a SOC alert, zero-day vulnerability, ransom demand or widespread business disruption. When the call comes, our global incident responders quickly mobilize to investigate, contain and eradicate the threat. This year’s Unit 42® 2026 Global Incident Res...

2026 Unit 42 Global Incident Response Report – Attacks Now 4x Faster.png
srubin by L0 Member
  • 517 Views
  • 0 replies
  • 0 Likes

Thank you for your support in the 2026 CMX Community Industry Awards!

2 min read

We’re incredibly grateful to the members of LIVEcommunity and Fuel User Group who helped champion Palo Alto Networks in the 2026 Community Industry Awards hosted by CMX, a global leader dedicated to advancing the community profession and recognizing excellence across the industry. CMX plays a vital role in shaping the future of community-led o...

Cheryl - Winner, Executive Leader - smaller.png

When agents lose their instincts: How AI safety can be undone in a single prompt

8 min read

This blog was written by Jane Leung, Product Marketing Manager Over the past 48 hours, a stark headline has dominated security coverage: “Single prompt breaks AI safety in 15 major language models.” Reporting from CSO Online and Microsoft points to a troubling conclusion: The safety controls built into today’s leading AI models may be far mor...

General Graphics (1).jpg
JayGolf by Community Team Member
  • 573 Views
  • 0 replies
  • 0 Likes

Fuel Workshop: User-ID and IPsec VPN Deployment and Troubleshooting

2 min read

On February 3rd, 2026, Fuel hosted a workshop on two different deployment and troubleshooting topics: User-ID and IPsec VPN on PAN-OS for the next-generation firewall. During this event, we heard from Siddhant Chawla, assisted by Angelo Eisma, on how to perform deployments of and troubleshooting for both User-ID functionality as well as IPsec...

Fuel Workshop - February 2026 - User-ID and IPsec VPN Deployment and Troubleshooting.png

Behind the Mic: How David Moulton Turned a "Side Project" into a Million-Download Powerhouse

4 min read

We recently hit a massive milestone: Episode 100 of the Threat Vector podcast. To celebrate, I reached out to the man behind the microphone, David Moulton, to get the inside story on how this show went from a small biweekly segment to the #2 technology podcast in the U.S. David was kind enough to share some behind-the-scenes stories—including ...

Threat Vector visual.png
David-Moulton.jpeg
Threat Vector Template.jpg
kiwi by Community Team Member
  • 1194 Views
  • 2 replies
  • 1 Likes

Fuel Workshop: SASE Easy Onboarding

2 min read

On January 27, 2026, Fuel hosted a workshop on SASE Easy Onboarding. During this event, we heard from Suman Dey as he showed us how to take advantage of the SASE Easy Onboarding process built into Prisma Access. In these videos, you will be able to see all of the ways that Suman was able to see all of the different aspects of how simple this ...

Fuel Workshop - January 2026 - SASE Easy Onboarding - Watch Now.png

Detection of Pastejacking Social Engineering Tactics

3 min read

As social engineering tactics become more sophisticated, threat actors are increasingly leveraging user-driven execution models. Palo Alto Networks has implemented detection capabilities for Pastejacking phishing attacks, a category of threats that weaponize the user’s clipboard to bypass traditional security perimeters. Understanding Pastejac...

Screenshot 2026-02-04 at 8.38.43 AM.png
Screenshot 2026-02-04 at 8.45.59 AM.png
Screenshot 2026-02-04 at 8.48.21 AM.png
tuvu01 by L3 Networker
  • 1325 Views
  • 0 replies
  • 0 Likes

Easily Create Intent-Driven Dashboards Using Natural Language

3 min read

In the world of Network Security Operations, we often find ourselves "drowning in data but starving for insights." You know the drill: a critical ticket comes in, and suddenly you’re jumping between five different tabs, exporting logs to spreadsheets, and manually stitching together a story to find a root cause. Traditional dashboards are great ...

prajamani_4-1769772989069.png
AI Canvas.png
Transparency.png
Reporting.png

Tune your PAN Firewall for effective security!

2 min read

A production deployment of a security solution must balance effective security with operational metrics - stability, uptime, and a seamless experience for end-users. Production environments deal with real-world traffic where the primary focus is on policy enforcement, integration with existing network stacks, and maintaining a high quality of ex...

mlawson by L2 Linker
  • 3321 Views
  • 0 replies
  • 1 Likes

How to Vibe Code Without Creating Tech Debt

5 min read

Simple principles that make AI-assisted coding reliable in real codebases. Vibe coding is now part of daily engineering work: describe intent, let an AI assistant generate code, iterate fast, ship faster. We did that too. And it worked—at first. Then we started noticing patterns repeating across changes. Each one looked small. Together, they q...

smadugundi_1-1769611196213.png

From Log Chaos to Intelligence: How LogWatch Agent Revolutionises Operational Analysis

8 min read

This blog is written by Puneet Gupta Have you ever been in this situation? It's 3 AM. Production is down. Customers are hitting errors. Your phone won't stop ringing. You grep through thousands of log lines across services, packet captures, and metrics dashboards. The clock is ticking. Every minute costs real money. Finally, you find somethi...

pugupta_8-1769610307365.png
universal_problem.png
TSE Agent.png
Jenkins pipeline correlation using logwatch.png
pugupta by L2 Linker
  • 2847 Views
  • 0 replies
  • 0 Likes

Cloud-Delivered Security Service (CDSS) January Newsletter

7 min read

Cloud-Delivered Security Service: The Monthly Newsletter for Security That Never Sleeps Welcome to the January edition of the Cloud-Delivered Security Service (CDSS) Newsletter Welcome to the January edition of the Cloud Delivered Security Services (CDSS) Newsletter. As threats continue to evolve in speed, scale, and sophistication driven by A...

Screenshot 2026-01-05 at 1.46.49 PM.png
Screenshot 2026-01-27 at 10.15.45 PM.png
Screenshot 2026-01-27 at 10.19.27 PM.png
Screenshot 2026-01-27 at 10.23.52 PM.png
tbolatiwa by L3 Networker
  • 2946 Views
  • 0 replies
  • 2 Likes

Precision and Scale: Enhancing Control with Custom FQDN Lists and Automatic EDL Subdomain Expansion

3 min read

This blog was written by Gokul Pokuri, Sr. Tehcnical Marketing Engineer How Advanced DNS Security Resolver delivers precise control without added complexity In the world of distributed enterprise security, speed and precision are not just metrics, they are survival traits. While global threat intelligence feeds are essential for stopping kno...

Strata Graphics (1).jpg
JayGolf_0-1769192333079.png
JayGolf_0-1769193255466.png
JayGolf_1-1769193301084.png
JayGolf by Community Team Member
  • 4179 Views
  • 0 replies
  • 0 Likes
Register or Sign-in