Quantcast
Channel: Cortex XDR: Once, Twice, Three Times a Leader - Palo Alto Networks Blog
Browsing latest articles
Browse All 154 View Live

Image may be NSFW.
Clik here to view.

How Behavioral Analytics Stop Linux C2 & Credential Theft

Linux is the backbone of most web applications, the containers orchestrating your microservices, the build pipelines shipping your code, and the developer workstations for your engineering teams....

View Article


Always on the Case: Introducing the AgentiX Case Investigation Agent

In the modern SOC, every second counts. As adversaries weaponize AI to move from initial access to full impact in as little as 72 minutes, analysts need to be faster than ever when it comes to...

View Article


Image may be NSFW.
Clik here to view.

Securing Data in the AI Era: Purpose-Built DLP for the Modern Endpoint

Who This Is For This guide is for security architects, IT leaders, and compliance teams evaluating endpoint data loss prevention (DLP) solutions for organizations where employees routinely use AI...

View Article

Image may be NSFW.
Clik here to view.

When Global Conflict Reaches the SOC: Respond at Scale with XSIAM

On February 28, the United States launched Operation Epic Fury. In the hours that followed, cyber risk related to Iran rose quickly, with coordinated activity emerging across regions from hacktivists...

View Article

Image may be NSFW.
Clik here to view.

Why Small Security Teams Are Winning With Cortex XDR

You don't need a 50-person SOC to stop enterprise-grade threats. You need the right platform. Commercial businesses today face the same ransomware, cloud breaches, and multivector attacks that Fortune...

View Article


Image may be NSFW.
Clik here to view.

Why Your EDR Strategy Needs a Backup Plan

As enterprises increasingly rely on endpoint detection and response (EDR) systems to protect their digital assets, a new vulnerability has emerged: one that doesn't come from external threats, but from...

View Article

Image may be NSFW.
Clik here to view.

Unmasking Boggy Serpens' AI-Powered Surge

The CISO's Dilemma: When Trust is the Attack Vector The email that started this investigation didn't look suspicious. It came from a real account, from a real government ministry, and it landed in...

View Article

Image may be NSFW.
Clik here to view.

Continuing the Mission: Securing Black Hat Asia 2026

Black Hat Asia stands as the premier cybersecurity event in the APAC region, where elite researchers unveil zero-day exploits, trainers demonstrate cutting-edge attack techniques, and thousands of...

View Article


Image may be NSFW.
Clik here to view.

Threat Intelligence in the Era of AI

  Fig 1: Threat Intelligence AI Agent workflow When a novel EDR bypass drops on GitHub, or a critical CVE hits the CISA KEV catalog, the security teams don’t just need to know it exists. They need the...

View Article


Image may be NSFW.
Clik here to view.

Don’t Get Reeled In: The Case for AI-Driven Phishing Response

Turning User Reports Into Campaign Intelligence and Guided Response In the high-stakes waters of modern cybersecurity, user-reported phishing emails are often a double-edged sword. Your employees are...

View Article
Browsing latest articles
Browse All 154 View Live


Latest Images