Community Blogs
LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1280 PostsLIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1280 PostsDiscover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.
10 PostsSimple principles that make AI-assisted coding reliable in real codebases. Vibe coding is now part of daily engineering work: describe intent, let an AI assistant generate code, iterate fast, ship faster. We did that too. And it worked—at first. Then we started noticing patterns repeating across changes. Each one looked small. Together, they q...
This blog is written by Puneet Gupta Have you ever been in this situation? It's 3 AM. Production is down. Customers are hitting errors. Your phone won't stop ringing. You grep through thousands of log lines across services, packet captures, and metrics dashboards. The clock is ticking. Every minute costs real money. Finally, you find somethi...
Cloud-Delivered Security Service: The Monthly Newsletter for Security That Never Sleeps Welcome to the January edition of the Cloud-Delivered Security Service (CDSS) Newsletter Welcome to the January edition of the Cloud Delivered Security Services (CDSS) Newsletter. As threats continue to evolve in speed, scale, and sophistication driven by A...
This blog was written by Gokul Pokuri, Sr. Tehcnical Marketing Engineer How Advanced DNS Security Resolver delivers precise control without added complexity In the world of distributed enterprise security, speed and precision are not just metrics, they are survival traits. While global threat intelligence feeds are essential for stopping kno...
Palo Alto Networks is addressing the growing threat of lateral movement within private and public cloud environments by introducing PAN traffic Redirector for creating a Micro-perimeter around your critical workloads. This solution enables organizations to establish granular security directly around high-value "crown jewel" workloads, such as da...
At Palo Alto Networks, we understand that your security operations rely on a delicate balance: you need the latest innovations to stop emerging threats, but you also require absolute stability in your network infrastructure. To better serve this need, we are standardizing our release cycle and support policy starting with PAN-OS 12.1. This new...
Native cloud firewalls provide baseline controls that are tightly integrated with cloud infrastructure. For early deployments, that simplicity works well. As environments scale, architectures become more distributed, identity replaces addressing as the primary abstraction, and east-west traffic overtakes traditional north-south flows. At this po...
This blog was written by Heather Robertson, Senior Product Marketing Manager In today’s dynamic security landscape, understanding the true state of your overall security posture is more critical and more challenging than ever. Network security configurations shift, firewall rules evolve, new applications emerge, identities and devices change, ...
New URL Filtering Category: Browser-Runtime-Attack We intend to introduce a new category called “Browser-Runtime-Attack” under Advanced URL Filtering. ACTION REQUIRED: An action may be required. The “Browser-Runtime-Attack” category action is currently set to ALERT only for the default profile. If you have multiple URL Filtering security pro...
This blog was written by Mohit Bhasin, Principal Product Marketing Manager Top 5 Reasons Why Customers Love Cortex Cloud In early 2025, we launched Cortex Cloud, this was a transformative shift in how enterprises secure their cloud environments. Cortex Cloud is the evolution of Prisma Cloud, re-architected on the Cortex platform to merge i...
In the dynamic world of cloud computing, maintaining a consistently enforced security posture can be a balancing act. While Microsoft Azure reliably manages infrastructure health, the necessity of underlying platform events—such as scheduled host maintenance or impending hardware degradation—still introduces operational risk for critical network...
The Cloud-Delivered Security Service Edge: The Monthly Newsletter for Security That Never Sleeps Welcome to the December edition of the Cloud-Delivered Security Service (CDSS) Newsletter The Cloud-Delivered Security Services (CDSS) Monthly Newsletter brings you the latest updates, insights, and innovations from Palo Alto Networks’ cloud-powere...
Please note - this event is scheduled with relation to Singapore time (GMT+8), 11:30 AM to 2:00 PM. Please plan your day and attendance accordingly. Hi there, As a valued Palo Alto Networks customer, we invite you to a workshop designed for professionals seeking to deepen their expertise in Easy Onboarding capabilities in Prisma SASE.This wo...
In the modern cybersecurity landscape, providing employees with permanent, always-on administrative privileges is a dangerous practice that leaves organizations vulnerable to credential theft and lateral movement. When a user account with standing privileges is compromised, attackers gain immediate and unrestricted keys to the kingdom, often goi...
On December 18th, 2025, Fuel welcomed Megaport to our Fuel Technical Alliance (FTA) series of virtual events. During this session, Bill McLeod and Brian Bowman of Megaport introduced Fuel membership to their offering of NaaS - Networking as a Service. With the ability to help you get your disparate environments (cloud, on-prem, multi-cloud, r...
| Subject | Likes |
|---|---|
| 2 Likes | |
| 2 Likes | |
| 2 Likes | |
| 2 Likes | |
| 1 Like |


