News

Palo Alto Networks Blog
paloaltonetworks. com > blog > security-operations > cortex-xdr-is-the-only-endpoint-security-market-leader-certified-in-avcs-edr-detection-test

Cortex XDR is the Only Endpoint Security Market Leader Certified in AVC's EDR Detection Test

3+ day, 18+ hour ago  (292+ words) This rigorous evaluation specifically measures the ability of EDR solutions to detect and provide visibility into complex, multi-step attack scenarios. Our performance in the 2026 test confirms that Cortex XDR provides the deep technical visibility and intelligent correlation required to stop…...

Symbols: btc-usd
Palo Alto Networks Blog
paloaltonetworks. com > blog > 2026 > 05 > why-behind-nextwaves-new-requirements

The "Why" Behind Next Wave's New Requirements

4+ day, 15+ hour ago  (524+ words) Our objective was never simply to raise the standards for engagement in our program. It was to inspire partners at all levels " Registered, Innovator, Platinum and Diamond " to invest deliberately and continuously in learning, so they can deepen their proficiency…...

Symbols: nasdaq:panw
Palo Alto Networks Blog
paloaltonetworks. com > blog > 2026 > 05 > expanding-ecosystem-autonomous-defense

Beyond the Frontier " Expanding the Ecosystem for Autonomous Defense

4+ day, 16+ hour ago  (189+ words) Over the past few weeks, we have reached a critical turning point in cybersecurity. Following the launch of our Frontier AI Defense initiative, we've continued testing the latest frontier models (including Anthropic's Mythos and Claude Opus 4. 7, as well as Open…...

Symbols: nyse:s
Palo Alto Networks Blog
paloaltonetworks. com > blog > 2026 > 05 > from-wargames-to-cyberwar

From War Games to Cyberwar

5+ day, 16+ hour ago  (489+ words) Vessey came back a week later with an answer: "Mr. President, the problem is much worse than you think." Fifteen months after that, Reagan signed a classified presidential directive titled "National Policy on Telecommunications and Automated Information Systems Security" " the…...

Palo Alto Networks
paloaltonetworks. com > resources > datasheets > identity-security-for-humans

Secure Every Identity With the Right Privilege Controls

5+ day, 11+ hour ago  (40+ words) Palo Alto Networks Secure Every Identity With the Right Privilege Controls Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports...

Palo Alto Networks
paloaltonetworks. com > resources > techbriefs > stop-managing-infrastructure-start-managing-risk

PAM Self-Hosted to Saa S Migration Solution Brief

5+ day, 19+ hour ago  (100+ words) Palo Alto Networks PAM Self-Hosted to Saa S Migration Solution Brief Self-hosted PAM was built for a different threat environment. Attackers now begin scanning for a newly announced CVE within 15 minutes, the fastest attacks reach exfiltration in 72 minutes, and 90% of…...

Symbols: btc-usd
Palo Alto Networks
paloaltonetworks. com > resources > guides > the-gorilla-guide-to-modern-identity-governance-and-administration

The Gorilla Guide to Modern Identity Governance and Administration

5+ day, 21+ hour ago  (89+ words) Palo Alto Networks The Gorilla Guide to Modern Identity Governance and Administration Legacy IGA is the science project that never ends. Years to implement, manual spreadsheets for every access review, ticket queues backing up, and a compliance posture that's only…...

Symbols: btc-usd
Palo Alto Networks Blog
paloaltonetworks. com > blog > identity-security > secure-ai-agents-controls-visibility-mcp-data-access

Secure AI Agents " New Controls and Visibility for MCP Data Access

5+ day, 22+ hour ago  (871+ words) Innovation is only as good as your visibility. As organizations rapidly adopt AI agents to automate workflows and enhance productivity, too often, security teams are forced to fly at machine speed without a flight plan. The nondeterministic nature of AI…...

Symbols: btc-usd,nasdaq:csco
Palo Alto Networks
paloaltonetworks. com > resources > techbriefs > secure-workload-access

Secure Workload Access Solution Brief

5+ day, 21+ hour ago  (122+ words) Palo Alto Networks Secure Workload Access Solution Brief The document provides an overview of Idira Secure Workload Access, an identity-driven security solution by Palo Alto Networks. It addresses a critical security gap in modern infrastructure: while traditional secrets management and…...

Symbols: btc-usd
Palo Alto Networks Blog
paloaltonetworks. com > blog > cloud-security > unified-human-identities-identity-risk-context

Introducing Unified Human Identities: See the Person Behind Every Account

1+ week, 3+ day ago  (762+ words) Identity has become one of the more complex parts of the enterprise to secure because it no longer lives in one place. It spans cloud roles, Saa S applications, identity providers, on-premises directories, privileged accounts and the access paths that…...

Symbols: nyse:s,btc-usd