News
Nutanix and Palo Alto Networks Integrate for Robust Model Trust
1+ hour, 58+ min ago (171+ words) The Nutanix Enterprise AI platform provides a unified, scalable and secure foundation for the entire AI lifecycle: from data preparation and model fine-tuning to deployment and management. By integrating cutting-edge AI security tools by Palo Alto Networks directly into this…...
Shai-Hulud 2. 0: How Cortex Helps Protect Against the Resurgent npm Worm
5+ mon, 1+ week ago (138+ words) Shai-Hulud 2. 0 exposes the fragility of software supply chains. Learn how the npm worm spreads through developer ecosystems and how Cortex detects and blocks it....
Lessons Ted Lasso Can Teach You About CDR
5+ mon, 3+ week ago (97+ words) Ted Lasso's lessons inspire a smarter, faster, more collaborative approach to cloud detection and response. Learn to turn chaos into confidence....
How the Latest Frontier AI Models Are Driving the Need for Real-Time Cloud Security
2+ hour, 58+ min ago (314+ words) Major shifts in cybersecurity rarely come from a single breakthrough attack. They emerge when a new capability changes the scale, speed and economics of attack development. AI-assisted vulnerability discovery is sure to be one of those shifts. To understand why…...
Stop Chasing Ghosts: The Strategic Case for Compensating Controls
2+ mon, 3+ week ago (43+ words) Transform theoretical risk into operational outcomes. Cortex Exposure Management's new Security and Compensating Controls feature reveals your true residual risk....
How Mythos-Class Models Change Exposure Management
1+ day, 1+ hour ago (192+ words) That pressure changes what defenders need. Before any product enters the conversation, three requirements come into focus: Put simply, protecting your business from frontier AI threats starts with managing your attack surface. A team first needs to see what stands…...
39 Seconds " That's How Long It Takes to Lose Your Data
1+ day, 1+ hour ago (801+ words) Not hours. Not days. It takes thirty-nine seconds from initial access to data exfiltration. That stat, pulled from Unit 42" research, isn't hypothetical. It's what defenders are up against right now, while most organizations are still building security teams around manual…...
Securing Your Saa S and Data in the Age of AI Agents
1+ day, 1+ hour ago (827+ words) Your newest employee doesn't need sleep, doesn't use MFA, and has full access to your sensitive customer data. It's not a rogue insider. It's a Saa S agent. These non-human entities are rapidly becoming the most privileged and least monitored…...
Unveiling Autonomous Playbooks: Immediate Threat Response in XSIAM - Palo Alto Networks Blog
1+ day, 19+ hour ago (643+ words) Unveiling Autonomous Playbooks: Immediate Threat Response in XSIAM'Palo Alto Networks Security teams today face a frustrating paradox: the need to automate is urgent, but the journey to get there can be slow, complex, and resource-intensive. Turning everyday security processes into…...
The Dangerous Momentum of Autodownload Phishing
1+ day, 17+ hour ago (598+ words) Modern phishing campaigns are no longer trying to convince users. They are trying to outrun them. By forcing an automatic progression from click to download, attackers eliminate the moment of hesitation entirely by forcing files to download instantly using trusted…...