Community Blogs
LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1233 PostsLIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1233 PostsDiscover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.
10 Postsauthors: @nramanan, @sdrolia Executive Summary Traditional cybersecurity tools are blind to AI's newest threat vector: malicious conversations. As organizations deploy AI systems to handle customer service, financial advice, and healthcare guidance, they face sophisticated attacks that exploit natural language understanding rather than code...
This next Spark User Summit will be taking place on October 23rd, 2025 at 9:30 AM Pacific Time. This month, Fuel will be welcoming in Victor Kameyama and Karthik Thumula to give us a comprehensive overview of Device Security. As organizations adopt connected devices at unprecedented speed, their attack surface is expanding just as fast. From...
On September 25th, Fuel hosted another Spark User Summit and we spoke with two very informed experts on how to improve and harden your cyber defense. During this roundtable, speakers Srinivas Avasarala and Taylor Ettema discussed the issues with the changes in attacks from threat actors. No longer are they using a single, simple, one-dimension...
By: Nina Smith Watch this short video to learn how to enable ATP with Inline Cloud Analysis and prevent zero-day exploits. Note: PAN-OS 11.0, an ATP license, and a consistent cloud connection are required. In Part 1 of our Ignite and Activate Series, we explored how attackers are increasingly motivated to create cyber threats that are more...
On Thursday, September 18th, Fuel had another of our monthly Spark User Summits and we heard from two experts on the new offerings of PAN-OS 12.1, Orion. Speakers Imran Bashir and John Harrison introduced us to some of the new functionality that's coming with Orion including Quantum security offerings, multicloud protection, and implementation ...
The Password Problem: Why Your Credentials Are a Liability In the modern digital landscape, passwords have become more of a security liability than a protective measure. In 2024 alone, credential abuse was the top attack vector, accounting for 22% of publicly reported cyberattacks (source: Verizon 2025 DBIR). Credential abuse isn't just about...
Author: Jack Hughes Palo Alto Networks Unit 42 Recognised by UK’s NCSC as an Enhanced Level Cyber Incident Response Assured Service Provider The UK’s National Cyber Security Centre (NCSC) has officially added Palo Alto Networks Unit 42 to the Enhanced Level of its Cyber Incident Response (CIR) scheme, reflecting the high standards we bring ...
PAN-OS Modernization: Securing Tomorrow's Enterprise Today with 12.1 Orion The Future is Now: Unveiling PAN-OS 12.1 Orion Headline: PAN-OS 12.1 Orion: The Future-Ready Foundation for Unrivaled Security, Performance, and Operational Agility Over a decade ago, the cybersecurity world was a chaotic battlefield of fragmented point solutions...
Blog authored by Suhas Reddy Inturi Every day, network security professionals face a daunting challenge: an explosion of data. This isn’t a new problem, but the sheer volume, velocity, and fragmentation of modern security data has made traditional, static dashboards and manual troubleshooting critically insufficient. For example, a large globa...
July has been a month of powerful innovation and customer impact across Network Security. From major product milestones to new services and customer-focused resources, we continue to deliver on our promise of helping organizations stay ahead of today’s most complex threats. This month’s Always Innovating in NetSec highlights several key develo...
From time to time, posts circulate that raise concerns about SSL/TLS decryption and the handling of logs in cloud-delivered security services. While healthy skepticism is important in cybersecurity, some of these narratives mix valid technical points with misleading claims — creating more fear, uncertainty, and doubt (FUD) than clarity. Let's br...
The Need for Post-Quantum Resistant VPN Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH) are used extensively in both PKI encryption and IKE key exchange mechanisms (KEMs) to create shared key material to perform data encryption. This technology is at risk of being broken by a cryptographically r...
Palo Alto Networks Introduces PAN-OS® 12.1 Orion Discover how PAN-OS® 12.1 Orion Major Features protects against tomorrow’s threats today. By: @Jigar | @ibashir As enterprises accelerate AI adoption, scale multicloud environments, and prepare for the quantum era, the complexity of securing dynamic infrastructures continues to grow. Threat ac...
Co-authors: Josh Pederson, Senior Product Marketing Manager Jasmine Punia, Senior Product Manager Today, data centers and clouds are sprawling, dynamic environments where a single workload breach can lead to a catastrophic lateral spread. Micro-segmentation, creating secure zones around individual applications and workloads, is needed in mo...
Co-authors: Josh Pederson, Senior Product Marketing Manager Mani Ganesan, Director, Product Management Geetha Anandakrishnan, Principal Product Manager At Palo Alto Networks, we recognize that the shift to multi-cloud is the new operational standard, and we understand the profound security challenges this creates. Security teams face a dail...
Subject | Likes |
---|---|
4 Likes | |
2 Likes | |
2 Likes | |
1 Like | |
1 Like |
User | Likes Count |
---|---|
4 | |
3 | |
2 | |
1 | |
1 |