Cortex Xpanse Articles
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.
Unit 42 and Cortex Xpanse invite you to dive into the latest insights and analysis on emerging cyber threats and vulnerabilities in this comprehensive report, gathered from extensive exposure and threat data collected over 12 months with Cortex Xpanse.    Read the full report here: Attack Surface Report    Have a question? Post it on our Discussion Forum Cortex Xpanse 
View full article
Incident Response Review the Incident management use cases and best practices here:  Incident Response in Cortex Xpanse Additional read: Have a question? Post it on our Discussion Forum Cortex Xpanse 
View full article
IT hygiene is built on the belief that there are ongoing, critical practices instrumental to the health and security of your IT infrastructure. With the global surge of digital transformation, including moves to the cloud and remote work, this becomes more challenging.   In this paper, we’ll define what IT hygiene really means, spotlight the danger of shadow IT and discuss why you need a system of record for all of your internet assets.
View full article
Interruption in the supply chain can cause an organization significant operational and strategic risk. Suppliers often hold tremendous amounts of data and intellectual property from organizations they’re working with. If these cloud assets are directly compromised, it puts everyone at risk.   In this paper, we’ll discuss: Common failures of supplier risk solutions Methods for improving security outcomes How to boost supply chain visibility Where to start Don’t wait to manage your supply chain. Find out how Cortex ®  Xpanse™ can help.
View full article
Some types of cyberattacks are straightforward and easy to handle. Phishing tries to trick users into opening a link or entering their credentials. Distributed denial-of-service (DDoS) attacks flood websites with so much traffic that real communications can’t get through.   Other network attacks are more difficult to understand. The details of the threat exposure can have a big influence on the complexity of the attack and the nature of its impact on your networks. In this paper, we highlight five of the more intricate perimeter exposures and discuss how you can defend against them.   Learn more.
View full article
  • 6 Posts
  • 181 Subscriptions
Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Top Contributors