Community Blogs
LIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1028 PostsLIVEcommunity blogs cover new product features and updates, cybersecurity solutions, and news pertinent to the Palo Alto Networks cybersecurity community.
1028 PostsDiscover in-depth technical insights on our journey to create robust, scalable systems and deliver cutting-edge cybersecurity solutions. Explore our innovations and gain a deeper understanding of Palo Alto Networks Engineering.
5 Posts
This blog written by Elad Koren and published on April 17, 2024.
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cybe
...
This post is also available in: 日本語 (Japanese).
This threat brief is frequently updated as new threat intelligence is available for us to share. The full update log is at the end of this post and offers the fullest account of
...
Join us as we dive into cutting-edge technologies and unveil the latest advancements in artificial intelligence and cybersecurity. Discover how AI is changing the face of cyberthreats and is revolutionizing the way we safeguard our dig
Tips and Tricks: Allow 1 YouTube video and block others
Read about how you can allow certain YouTube videos but block others through Palo Alto Networks devices and software. We reveal some excellent tips and tricks to help you apply this category to
...
How do Palo Alto Networks’ Cloud NGFW for AWS and VM-Series compare when it comes to elevating your security posture? Learn how the self-managed virtual appliance and managed cloud service stack-up to each other in capabilities such as security contr
...
Palo Alto Networks will release a new Advanced URL Filtering category called “Marijuana”.
ACTION: Action may be required. The default action for this new Marijuana category is “allow.” If you currently alert on or block marijuana websites (usi
...
As Software as a Service (SaaS) applications continue to shape the digital landscape, software security remains a paramount concern.
Within this realm of ever-present vulnerabilities, spoofing emerges as a sneaky threat. Spoofing occurs when a ma
...
The proliferation of unsanctioned Post-Quantum Ciphers leads to blind spots in your network visibility, with PANW Firewalls you can now DETECT, LOG and BLOCK unsanctioned ciphers.
The Quantum Threat of a Cryptographically Relevant Quantum Comput
...
There are numerous security concerns while using 3rd party Webhooks Providers like pipedream, webhook.site, etc. However, a lesser known alternative is rather than relying on third-party webhook pr
...
As a Prisma Cloud user, you have access to a specific Prisma Cloud stack. When a user logs in to a stack, it gets a JWT token to access that specific stack.
To access the CNA via the REST API, we n
The API which is to be used for Performing Config Search with Network RQL's - 'config from network ...'
/search/config API - https://pan.dev/prisma-cloud/api/cspm/search-config/
does
...
This blog was written by Greg Heon and published on April 15, 2024.
As organizations’ attack surfaces continue to grow, we’ve seen that traditional vulnerability testing is insufficient to secure an organization’s externally-facing assets. Con
...
This blog written by Gonen Fink and published on April 15, 2024.
Security operations teams are tasked with solving a variety of different challenges. They face the complexities of protecting
...
Join us at InterSECt 2024, a 2-hour virtual experience, where industry leaders, tech visionaries and cybersecurity professionals gather at the intersection of security and innovation. You’ll learn how the latest advancements in SASE are leveraging
...
This blog written by Tomer Haimof and published on April 11, 2024.
Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evol
...Subject | Likes |
---|---|
3 Likes | |
3 Likes | |
2 Likes | |
2 Likes | |
2 Likes |