May 2025 Rewind: LIVEcommunity Highlights

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Community Blogs
8 min read
Community Team Member

May-2025-Monthly-Rewind_palo-alto-networks.jpg

 

 

Welcome to our May 2025 Rewind, where we review some of LIVEcommunity’s popular headlines from the past month!

 

In May, we featured articles and blogs on: the latest community release notes, Always Innovating in NetSec’s latest blog, Threat Bulletin’s May edition, Threat Vector's latest podcast episodes, a new PANCast episode, the latest Product-centric blogs, and a lot more! Read on to see the community's May 2025 highlights. 

 

Community Highlights

 

Community Release Notes - May 12, 2025

In this Community release, we've introduced several enhancements to elevate your overall experience. Resource availability is now presented more clearly, making it easier to see what’s accessible to you. Improved visibility offers better context around the products you use, leading to more relevant responses. We've also streamlined navigation and increased translation accuracy to deliver a smoother, more inclusive experience for all users. Learn more in our blog…

 

Other Interesting Highlights

 

Always Innovating In NetSec - April 2025

Our Always Innovating in NetSec blog series continues to spotlight how the Palo Alto Networks NetSec Platform delivers continuous value through cloud-delivered innovations that help customers stay ahead of evolving threats. This month’s edition showcased a wave of powerful advancements—enhancing threat detection, simplifying cloud security, and unifying digital experience monitoring. These innovations reflect our ongoing commitment to helping customers improve protection and operational efficiency across hybrid and multi-cloud environments. Explore more in our blog…

 

Unit 42 Threat Bulletin - April 2025

Welcome back! Unit 42 is reviving our monthly Threat Bulletin newsletter. We’d love to hear your thoughts on the new look and feel. Drop a comment below and tell us what you think! Catch up now… 

 

Contributions by Our Members

 

How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples

Palo Alto Networks NGFW and Prima Access have many predefined IPS vulnerability signatures but sometimes extra custom signatures are needed that are specific to the application being protected as this need internal domain knowledge. Find out more in our article…

 

Palo Alto Networks NAT Session Distribution as a Way to Implement Server Load Balancing

The Palo Alto Network Destination NAT Session Distribution can be used to implement similar to Load Balancer functionality by using one of the "distribution" methods. You need to allow the traffic with a with a security policy rule from the correct source zone to the correct destination zone. Learn more in our article…

 

Palo Alto Networks 7-byte Custom Signature Minimum Removed in Newer Versions and Why it Matters!

In the newer versions after 9.1, Palo Alto Networks now does not have 7-byte minimum length limit and is really useful, as an example, to make a signature that will block traffic to a web page if too many times the login parameter "user" is seen in the HTTP requests query or body parameters from a source IP address. Read more in our article…

 

Product Insights

 

Exceptional User Experience—Now Across Consumer Browsers Chrome and Edge with ADEM Real User Monitor...

Ensuring a flawless digital experience is more important—and more complex—than ever, as applications could be distributed making every application transaction critical to monitor. IT teams are continuously deploying critical applications, investing in robust infrastructure, and striving for seamless digital workflows. But what happens to the user's experience, particularly when they're accessing web applications through their everyday browsers? Are they encountering frustrating delays? Read more in our blog…

 

Divide AND Protect Your Network with Secure, Automated Microsegmentation

Originally published on ZeroNetworks.com on May 07, 2025 and written in collaboration with Albert Estevez Polo. Modern enterprise networks span data centers, clouds, branch locations, remote endpoints, and everything in between – a complex, ever-shifting web of workloads, devices, and identities. While perimeter defenses remain critical, modern threats demand a defense-in-depth strategy to swiftly contain threats and block lateral movement. This is achieved through integrated best-in-class protections across network boundaries and data center environments, augmented by granular access controls.. Click on the link to read more…

 

Performance Testing Palo Alto Networks Firewalls: Real-World Traffic, Real Results

At the heart of enterprise security, performance matters just as much as protection. We recently conducted rigorous performance testing on Palo Alto Networks next-generation firewalls to validate throughput, connections per second (CPS), and real-world application handling under realistic traffic loads.

 

This blog post walks through our test methodology, equipment setup, and key findings—ensuring you get transparency behind the numbers in the Palo Alto Networks datasheet. Read more in our blog…

 

Palo Alto Networks Leads in C2 Threat Prevention

At its core, Command-and-Control (C2) refers to the covert communication link established between a compromised system and the attacker’s remote infrastructure. Through this channel, attackers can:

 

  • Send malicious commands to the infected system
  • Extract stolen information
  • Move laterally across the network
  • Deploy additional malware 

Click on the link to read more…

 

Prisma AIRS Helps Protect Containers and AI apps Running on Red Hat OpenShift

Palo Alto Networks is pleased to announce that Prisma AIRS™ now supports Red Hat OpenShift, the industry leading hybrid cloud applications platform powered by Kubernetes. With this release, customers can bring AI-powered threat prevention for runtime network protection to each container running on Red Hat OpenShift clusters. Click on the link to read more…

 

Palo Alto Networks VM-Series Enhances Security for Virtualized Workloads on Red Hat OpenShift Virtua...

We're excited to announce that Palo Alto Networks VM-Series next-generation firewalls are now supported on Red Hat OpenShift Virtualization. This integration provides more seamless, robust security capabilities for your workloads running on Red Hat OpenShift Virtualization, enhancing your overall security posture and simplifying management. Read more in our blog…

 

Announcing The Learning Center: Your Personalized Path to Cybersecurity Expertise! (Beacon Sunsettin...

At Palo Alto Networks, our commitment to fast-paced innovation and smart work is matched by our dedication to continuous learning. To further empower your growth in the evolving cybersecurity landscape, we're excited to introduce The Learning Center, your new personalized and dynamic learning hub! This upgrade replaces our current platform, Beacon, which will be sunsetting. Read more in our blog…

 

Enhancing Industrial Cybersecurity: Integrating VM-Series Firewalls with Siemens IPC BX-21A in OT En...

Operational Technology (OT) Security is essential for safeguarding industrial control systems and critical infrastructure against cyber threats, which could cause operational disruptions and safety hazards. Palo Alto Networks, a leader in cybersecurity, collaborates with Siemens, a global powerhouse in industrial automation, to provide advanced OT security solutions. This partnership leverages both companies' expertise to protect vital systems against increasingly sophisticated cyberattacks, helping to ensure continuity, safety, and resilience in essential services and manufacturing processes. Read more in our blog…

 

The Quantum Countdown: How Hybrid Encryption is Quietly Fortifying Your Web Browsing and Application...

The internet as we know it is built on a bedrock of encryption. From your online banking to your private messages, complex mathematical problems keep your data safe from prying eyes. But a new kind of computational power is looming on the horizon – quantum computers – and they threaten to turn that bedrock into sand. This isn't a far-off sci-fi scenario; it's a challenge demanding action today. Fortunately, a quiet revolution is already underway in your web browser, a crucial first step known as hybrid key exchange. Learn more in our blog…

 

Watch the Latest Videos on our Youtube Channel

 

 

Stay Connected – Discover What’s New with the Fuel User Group

 

May 2025 Spark User Summit: PAN-OS Release Versioning

On Thursday, May 22, Fuel hosted a Spark User Summit featuring PAN-OS release versioning best practices. The speaker, Rohit Sawhney, went into an amazing level of detail around how the release numbers are assigned to the different PAN-OS versions, how Palo Alto Networks delivers fixes and updates, best practices for your upgrade process, and other resources that are available to everyone. Click on the link to watch now…

 

A New PANCast Episode Is Out!

 

PANCast™ is a Palo Alto Networks podcast that provides actionable insights from cybersecurity experts to customers, helping them ensure each day is more secure than the one before it. Visit our PANCast™ homepage to learn more and watch our previous podcasts in this series.

 

 

Catch Up on Threat Vector Podcast Episodes Now!

 

Threat Vector is your compass in the world of cyberthreats. We unravel cyber threat intelligence secrets through engaging discussions, expert interviews, and insightful analysis. Hear our unique threat intelligence, cutting-edge techniques, and real-world case studies. We'll equip you with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

 

 

Stay in the Loop

 

Be sure to subscribe to our Monthly Rewinds to stay up-to-date on LIVEcommunity news, updates, and more! 



 

  • 279 Views
  • 0 comments
  • 0 Likes
Register or Sign-in
Labels