Quantcast
Channel: XSOAR 8.4: What’s New - Palo Alto Networks Blog
Browsing all 57 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Let AI Handle the Heavy Lifting in the Modern SOC

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...

View Article


Image may be NSFW.
Clik here to view.

Witnessing a Revolution in Cybersecurity with AI

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...

View Article

Image may be NSFW.
Clik here to view.

AI, Cybersecurity and the Rise of Large Language Models

Artificial intelligence (AI) plays a crucial role in both defending against and perpetrating cyberattacks, influencing the effectiveness of security measures and the evolving nature of threats in the...

View Article

Image may be NSFW.
Clik here to view.

On Credible and Cyber-Contextual Labeling

Background Machine learning (ML) powered methods are rapidly taking over the cybersecurity medium, performing a variety of complex tasks, including detection, prevention, and prioritization. Albeit not...

View Article

Image may be NSFW.
Clik here to view.

The Power of AI Assistants and Advanced Threat Detection

Smarter Security {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo...

View Article


Image may be NSFW.
Clik here to view.

Playbook of the Week: Streamlining Suspicious Data Upload Alert Investigations

Manual Investigations: The Struggle Is Real Data exfiltration refers to the unauthorized transfer of sensitive or confidential information from a network or system to an external location. This covert...

View Article

Image may be NSFW.
Clik here to view.

Playbook of the Week: Prisma Cloud Compute - Compliance Alert v2

Enhancing Compliance Alert Handling in Cortex XSOAR Maintaining compliance with regulations and security standards is paramount for organizations in today's dynamic and ever-evolving cybersecurity...

View Article

Image may be NSFW.
Clik here to view.

What’s Next in Cortex — XSIAM for Cloud and Other Innovations

Tackling Diverse SecOps Challenges Simultaneously Security operations teams are tasked with solving a variety of different challenges. They face the complexities of protecting growing and dynamic cloud...

View Article


Image may be NSFW.
Clik here to view.

XSOAR 8 On-Premises Now Available!

We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-premises deployment for policy or regulatory reasons can now take...

View Article


Image may be NSFW.
Clik here to view.

Confirm Attack Surface Vulnerabilities with Cortex Xpanse Attack Surface Testing

As organizations’ attack surfaces continue to grow, we’ve seen that traditional vulnerability testing is insufficient to secure an organization’s externally-facing assets. Conventional vulnerability...

View Article

Leading with a Prevention-First Approach for Cloud Detection and Response

As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cyberthreats targeting the...

View Article

Image may be NSFW.
Clik here to view.

AI's Offensive & Defensive Impacts

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...

View Article

Image may be NSFW.
Clik here to view.

Cortex Copilot - In SecOps, You Should Secure Smarter, Not Harder

There are a lot of moving parts in security operations. As cyberthreats continue advancing in speed and complexity, analysts must investigate and remediate incidents as quickly as possible. However,...

View Article


Image may be NSFW.
Clik here to view.

Playbook of the Week: Automating Response to Living-Off-the-Land (LOTL) Attacks

Organizations face increasingly sophisticated cyberattacks in today's rapidly evolving threat landscape. Attackers leverage common tools and living-Off-the-Land binaries (LOLBins) to blend in with...

View Article

Image may be NSFW.
Clik here to view.

Securing Kubernetes Clusters: The Cortex XDR and XSIAM Approach

Kubernetes has revolutionized the way we deploy and manage applications, but its complexity and dynamic nature also introduce a new set of security challenges. Attackers are constantly looking for ways...

View Article


Image may be NSFW.
Clik here to view.

The Dark Side of AI in Cybersecurity — AI-Generated Malware

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...

View Article

Prowling the Wilds — Upgrade Your SOC and Hunt Down Threats

It would be nice to imagine our SOC analysts as the apex predators of the IT jungle, stalking the network perimeter and tracking the scent of trespassing attackers. But, for most SOCs and their...

View Article


Image may be NSFW.
Clik here to view.

AI in Cyber Is Here to Stay — How to Weather This Sea Change

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and...

View Article

Image may be NSFW.
Clik here to view.

Creating a Security Program with Less Complexity and More Visibility

Developing a strong security program is like tending a garden. It takes a lot of work, and you don’t always see immediate results. Every day you water the soil, pull the weeds, spray the bugs, and...

View Article

Image may be NSFW.
Clik here to view.

SmartGrouping - Precision AI™-Driven Investigation

SmartGrouping is a crucial aspect of security operations, allowing to connect disparate alerts and paint a comprehensive picture of an attack. It's like piecing together a puzzle, where each alert...

View Article
Browsing all 57 articles
Browse latest View live