This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community and translation experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
While relatively new as a discipline, the Internet of Things (IoT) has matured out of its initial stages of incubation into a clearly defined set of use cases that deliver discernible benefits to a variety of market verticals. IoT security can be understood as a security strategy and protection mechanism that specifically safeguards from the possibility of cyberattacks on IoT devices that are connected to the network and purposely built for a fixed set of functionalities.
Hello, interested in exporting device list from iot platform.
I see a API endpoint for this but it doesn't have examples or document how to do filte... —
Read more
Hello Everyone,
What does Discover Mobile Device Attributes the limitation mean?
==========
IoT Security can learn mobile (cellular) device attr... —
Read more
hello,
we onboarded IOT license on PA-400 series , we configured the tenant properly and we associated the device.
we enabled service edge ( green... —
Read more
Hi team,
I was trying to get the data via API about the vulnerabilities of the OT tenant. I have the ID key and the secret access with my user, which ... —
Read more
To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating:
Rules and Best Practices
Be ... —
Read more
07-22-2025
—
Private 5G is revolutionizing industrial networks, but also it is
expanding the attack surface. In this blog, we break down how Palo Alto
Networks and OneLayer tackle challenges like asset visibility, Zero
Trust, and threat prevention in mission-c... —
Read more
Labels:
5G IoT SecurityIoT SecurityNext-Generation Firewall. NGFWPrisma AccessZero Trust Network Access 1091
1
by
mrappardin Community Blogs
07-10-2025
—
The rise of AI and IoT is transforming industries, with connected
devices now outnumbering users three to one. While these devices fuel
new business models and operational efficiency, they also create
significant cybersecurity risks. A staggering ... —
Read more
Labels:
IoT SecurityNext-Generation FirewallPrisma AccessSD-WAN 1138
by
tasawantin Community Blogs
06-04-2025
—
Big news for your enterprise security posture: Palo Alto Networks IoT
Security is fully integrated into Strata Cloud Manager - accelerating
IoT/OT security outcomes with AI-powered, fully integrated into network
security workflows. —
Read more
03-10-2025
—
The Cybersecurity and Infrastructure Security Agency (CISA) detected an
apparent backdoor in the firmware of the Contec CMS8000, a device used
to monitor patient vital signs in the Healthcare and Public Health
sector. After analyzing three version... —
Read more
12-19-2024
—
Organizations in industrial sectors depend on secure, stable networks to
maintain operational uptime and efficiency. In these environments,
downtime can result in severe consequences, including safety risks,
regulatory noncompliance, and financial... —
Read more
Labels:
Asset discoveryCortex XSOARIoT SecurityNext-Generation FirewallOTOT SecurityPAN-OS 10.2 3160
by
dparein Community Blogs
04-28-2021
—
IoT Security is an on-demand cloud subscription service designed to
discover and protect the growing number of connected “things” on your
network. Unlike IT devices such as laptop computers that perform a wide
variety of tasks, IoT devices tend to be purpose-built with a narrowly
defined set of f... —
Read more
03-04-2021
—
Unmanaged Internet of Things (IoT), Internet of Medical Things (IoMT),
and operational technology (OT) devices make up more than 50% of the
devices on hospital networks.1 With Omdia estimating there were more
than 250 million medical devices introduced to the market globally in
2020,2 an expected... —
Read more
03-04-2021
—
Unmanaged Internet of Things (IoT), Internet of Medical Things (IoMT),
and operational technology (OT) devices make up more than 30% of the
devices on enterprise networks.1 Organizations require these devices to
enable their business, yet they cannot trust them. IoT devices pose
immense cybersecu... —
Read more