Let AI Handle the Heavy Lifting in the Modern SOC
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...
View ArticleWitnessing a Revolution in Cybersecurity with AI
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...
View ArticleAI, Cybersecurity and the Rise of Large Language Models
Artificial intelligence (AI) plays a crucial role in both defending against and perpetrating cyberattacks, influencing the effectiveness of security measures and the evolving nature of threats in the...
View ArticleOn Credible and Cyber-Contextual Labeling
Background Machine learning (ML) powered methods are rapidly taking over the cybersecurity medium, performing a variety of complex tasks, including detection, prevention, and prioritization. Albeit not...
View ArticleThe Power of AI Assistants and Advanced Threat Detection
Smarter Security {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo...
View ArticlePlaybook of the Week: Streamlining Suspicious Data Upload Alert Investigations
Manual Investigations: The Struggle Is Real Data exfiltration refers to the unauthorized transfer of sensitive or confidential information from a network or system to an external location. This covert...
View ArticlePlaybook of the Week: Prisma Cloud Compute - Compliance Alert v2
Enhancing Compliance Alert Handling in Cortex XSOAR Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evolving cybersecurity...
View ArticleWhat’s Next in Cortex — XSIAM for Cloud and Other Innovations
Tackling Diverse SecOps Challenges Simultaneously Security operations teams are tasked with solving a variety of different challenges. They face the complexities of protecting growing and dynamic cloud...
View ArticleXSOAR 8 On-Premises Now Available!
We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reasons can now take...
View ArticleConfirm Attack Surface Vulnerabilities with Cortex Xpanse Attack Surface Testing
As organizations’ attack surfaces continue to grow, we’ve seen that traditional vulnerability testing is insufficient to secure an organization’s externally-facing assets. Conventional vulnerability...
View ArticleLeading with a Prevention-First Approach for Cloud Detection and Response
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cyberthreats targeting the...
View ArticleAI's Offensive & Defensive Impacts
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...
View ArticleCortex Copilot - In SecOps, You Should Secure Smarter, Not Harder
There are a lot of moving parts in security operations. As cyberthreats continue advancing in speed and complexity, analysts must investigate and remediate incidents as quickly as possible. However,...
View ArticlePlaybook of the Week: Automating Response to Living-Off-the-Land (LOTL) Attacks
Organizations face increasingly sophisticated cyberattacks in today's rapidly evolving threat landscape. Attackers leverage common tools and living-Off-the-Land binaries (LOLBins) to blend in with...
View ArticleSecuring Kubernetes Clusters: The Cortex XDR and XSIAM Approach
Kubernetes has revolutionized the way we deploy and manage applications, but its complexity and dynamic nature also introduce a new set of security challenges. Attackers are constantly looking for ways...
View ArticleThe Dark Side of AI in Cybersecurity — AI-Generated Malware
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...
View ArticleProwling the Wilds — Upgrade Your SOC and Hunt Down Threats
It would be nice to imagine our SOC analysts as the apex predators of the IT jungle, stalking the network perimeter and tracking the scent of trespassing attackers. But, for most SOCs and their...
View ArticleAI in Cyber Is Here to Stay — How to Weather This Sea Change
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...
View ArticleCreating a Security Program with Less Complexity and More Visibility
Developing a strong security program is like tending a garden. It takes a lot of work, and you don’t always see immediate results. Every day you water the soil, pull the weeds, spray the bugs, and...
View ArticleSmartGrouping - Precision AI™-Driven Investigation
SmartGrouping is a crucial aspect of security operations, allowing to connect disparate alerts and paint a comprehensive picture of an attack. It's like piecing together a puzzle, where each alert...
View Article