Boosting Identity Security with Cortex XDR/XSIAM Honey Users
In today’s digital landscape, identity-based attacks are becoming increasingly prevalent and sophisticated. To counter these threats, it’s crucial to employ proactive defensive strategies that not only...
View ArticleCortex XSOAR Ranked #1 for SOC Automation
Introduction Automation is vital for SecOps teams to stay agile in today’s unpredictable cybersecurity landscape, where the growing complexity of threats and the sheer volume of alerts can quickly...
View ArticleIntroducing Cortex Canvas: Unleashing the Power of Visual Storytelling
In today's cyber landscape, security teams face the challenge of complex attack scenarios and collaborating effectively to safeguard their organizations. Palo Alto Networks is committed to empowering...
View ArticleBye Whack-a-Mole: The New Cortex Generic Persistence Analytics Module
Research by: Matan Haim Guez, Tom Fakterman, Yoav Zemah Executive Summary One of the key phases of a cyberattack lifecycle is the persistence phase. In its essence, persistence deals with maintaining a...
View ArticleCortex Copilot - Another Step Forward in SOC Transformation
When Incidents Pile Up, You Need A Way Out Security operations is hard. End-to-end attacks—from compromise to impact—happen in a matter of hours. This requires security analysts to quickly identify...
View ArticleCutting Through the Noise: Simplifying SIEM Alerts with Cortex
A Deluge of Data Like many of us in the world of cybersecurity, your SecOps team has likely been overwhelmed by the volume of alerts flooding your SIEM systems. We've all been there—sifting through...
View ArticleCloud Security — Maturing Past the Awkward Teenage Years
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider The genesis of cloud computing can be traced back to the 1960s concept of utility computing, but it came into its own...
View ArticleBanking on AI to Defend the Financial Services Sector
As cyberthreats evolve, financial institutions are leveraging AI to bolster their defenses, streamline operations and protect their assets. Like other data-rich industries, banking, capital markets,...
View ArticleShaking Up Security — The Power of AI-Native SOCs
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider Like legacy security tools, such as traditional firewalls and signature-based antivirus software, organizations that...
View ArticleOptimize Analyst Workflows with Cortex Copilot
For any organization, finding, hiring, and retaining IT and security talent poses a challenge. It will take years for enough new analysts to enter the field and gain enough experience to solve the...
View Article