Category: Palo Alto Networks Blog

The Hidden AI Risk Lurking In Your Business

The adoption of unsanctioned GenAI applications can lead to a broad range of cybersecurity issues, from data leakage to malware. The post The Hidden AI Risk Lurking In Your Business appeared first on Palo Alto Networks Blog. This article has…

Using Time in Your Favor During a Ransomware Attack

For organizations to overcome ransomware attacks, buying time can change the balance of power and set you up for a more successful resolution. The post Using Time in Your Favor During a Ransomware Attack appeared first on Palo Alto Networks…

Incident Response by the Numbers

Unit 42 helped hundreds of clients assess, respond and recover from attacks, collecting data and compiling our 2024 Incident Response Report. The post Incident Response by the Numbers appeared first on Palo Alto Networks Blog. This article has been indexed…

Identity Protection That Spans the Entire Attack Lifecycle

Palo Alto Networks Identity Threat Detection and Response (ITDR) offering emerges as a critical pillar of modern cybersecurity strategy. The post Identity Protection That Spans the Entire Attack Lifecycle appeared first on Palo Alto Networks Blog. This article has been…

Secure GenAI Applications by Design

AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies. The post Secure GenAI Applications by Design appeared first on Palo Alto Networks Blog. This article has been indexed from…

Enabling the Safe Use of GenAI Applications

AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies. The post Enabling the Safe Use of GenAI Applications appeared first on Palo Alto Networks Blog. This article has been…