Please turn JavaScript on

Palo Alto Networks Blog

Follow Palo Alto Networks Blog's news and updates in a matter of seconds! We will deliver any update via email, phone or you can read them from here on the site on your own news page.

You can even combine different feeds with the feed for Palo Alto Networks Blog.

Subscribing and unsubscribing is fast, easy and risk free.

The whole service is free of cost.

Palo Alto Networks Blog: Palo Alto Networks Blog | Stay protected in an AI world

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.37 / day

Message History

Key Takeaways Built on the Pioneers of PAM (privileged access management): Idira™ is Palo Alto Networks next-generation identity security platform, extending privileged access controls to every human, machine and AI agent identity in the AI enterprise. Zero Standing Privilege by Default: Idira replaces static, always-on access with dynamic privilege, granted just-in-time on a s...

Read full story

For the last several months, we have had early, unbounded access to the latest frontier AI models. What we’ve seen from that vantage point has made it clear that the window for organizations to get ahead of what’s coming is shorter than most leaders realize.

We have moved past the era of incremental AI improvements into a threat landscape shift. Our testing has reveale...


Read full story
Elevating AI Security

Every AI system you deploy is a potential attack surface. Models and agents can carry embedded backdoors, malicious operators or compromised dependencies. Once running, these artifacts can exfiltrate sensitive data or execute unauthorized code, creating persistent vulnerabi...


Read full story

Not hours. Not days. It takes thirty-nine seconds from initial access to data exfiltration.

That stat, pulled from Unit 42® research, isn't hypothetical. It's what defenders are up against right now, while most organizations are still building security teams around manual detection and response workflows that were never designed to operate at machine speed.

Wend...


Read full story

Modern phishing campaigns are no longer trying to convince users. They are trying to outrun them. By forcing an automatic progression from click to download, attackers eliminate the moment of hesitation entirely by forcing files to download instantly using trusted cloud platforms like Dropbox and Google Drive.

Detecting when these legitimate SaaS auto-download features...


Read full story