Ctrl + Alt + Delusion: Revisiting “WarGames” 42 Years Later

Shall we play a game? Auditing the classic cyber-thriller “WarGames.”

We’ve Entered the ‘Big Game Hunting’ Era of Ransomware

Outsmart next-gen ransomware before it locks you out.

Beyond the Backlog: Escaping Application Security Debt with ASPM

Escape security debt with a prevention-first ASPM approach.

Identity Under Siege: A Leader's Guide to the New Frontline of Security

Why identity is the new front line of enterprise security.

The First Principle of Resilience: Be Brave Enough to Fail

Resilience is a feedback loop: Learn from every failure.
EVENT
WEBINAR

Be Our Guest!

Join us at locations around the globe for insights, demos and more.
Find a city near you
MAGAZINE
WEBINAR

For Executives, By Executives

The definitive quarterly magazine for cybersecurity innovators.
Get the magazine

Trending Now

Securing Your AI-Powered Network Transformation: A Guide for C-Suite Leaders

The ultimate guide for securing AI-powered network transformations.

When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination

6 practical steps to enhance cyber resilience and combat threats.

Platformization Is Nothing Without AI: Mastering the Cybersecurity Balance

Security without AI is blind. AI without structure is powerless.

Staying Ahead of Evolving Cyberthreats: A CIO’s Perspective

How one CIO harnesses AI to counter evolving cyber threats.

All About A.I.

Beyond the Ivory Tower: The Blueprint for AI Research That Works

A breakthrough blueprint for outcome-driven AI security research.

Deliver Innovation to Fight AI with AI: How to Radically Simplify Cybersecurity

Stay ahead of evolving threats while redefining cybersecurity.

The Future of AI in Cybersecurity in a Word: Optimistic

How AI is transforming cybersecurity and outpacing emerging threats.

Fighting Back Against Cyberattackers: How to Counter AI with AI

Utilizing AI to counter evolving AI-powered cyber threats

Securing AI Agents: Building the Landing Gear While Flying the Plane

Defining the new security blueprint for the age of agentic AI.

Editor’s Picks

Ctrl + Alt + Delusion: “The Net” 30 Years Later

Ctrl + Alt + Delusion: “The Net” 30 Years Later

Revisiting “The Net”: What the ’90s thriller got right (and wrong).
How AI Will Forge the Next Generation of Cybersecurity Talent

How AI Will Forge the Next Generation of Cybersecurity Talent

Artificial intelligence won't replace cyber talent; it will empower it.
HYBRID ATTACKS IN THE AGE OF AI: HOW CLOUD-SOC CONVERGENCE IS OUR BEST DEFENSE

“Attackers Beware: Cortex Cloud has emerged as the solution to a potent offense. ”

Karim Temsamani
President, Next Generation Security
Explore the Solution

Podcasts

Press play on next-level intelligence
Listen to expert voices discuss trends and topics
Get every episode
Explore Palo Alto Networks TV
Your Remote Control
Hello, Tomorrow

Transforming Cybersecurity with AI

Video Player is loading.
Current Time 0:00
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time 0:00
 
1x
    • Chapters
    • descriptions off, selected
    • captions off, selected
      CIO to CIO

      Effectively securing AI

      CIO to CIO
      Video Player is loading.
      Current Time 0:00
      Duration 0:00
      Loaded: 0%
      Stream Type LIVE
      Remaining Time 0:00
       
      1x
        • Chapters
        • descriptions off, selected
        • captions off, selected
          Biggest cyber security challenge?

          Founder & CTO Nir Zuk

          Biggest cyber security challenge?
          Video Player is loading.
          Current Time 0:00
          Duration 0:00
          Loaded: 0%
          Stream Type LIVE
          Remaining Time 0:00
           
          1x
            • Chapters
            • descriptions off, selected
            • captions off, selected
              Unit 42 perspective

              What to know about incident response

              Unit 42 perspective
              Video Player is loading.
              Current Time 0:00
              Duration 0:00
              Loaded: 0%
              Stream Type LIVE
              Remaining Time 0:00
               
              1x
                • Chapters
                • descriptions off, selected
                • captions off, selected
                  CIO to CIO

                  Evaluating AI capabilities

                  CIO to CIO
                  Video Player is loading.
                  Current Time 0:00
                  Duration 0:00
                  Loaded: 0%
                  Stream Type LIVE
                  Remaining Time 0:00
                   
                  1x
                    • Chapters
                    • descriptions off, selected
                    • captions off, selected
                      Enterprise AI cybersecurity

                      What every CIO should know

                      Enterprise AI cybersecurity
                      Video Player is loading.
                      Current Time 0:00
                      Duration 0:00
                      Loaded: 0%
                      Stream Type LIVE
                      Remaining Time 0:00
                       
                      1x
                        • Chapters
                        • descriptions off, selected
                        • captions off, selected
                          Explore Palo Alto Networks TV
                          Your Remote Control
                          Hello, Tomorrow
                          Hello, Tomorrow
                          Transforming Cybersecurity with AI
                          CIO to CIO
                          CIO to CIO
                          Effectively securing AI
                          Biggest cyber security challenge?
                          Biggest cyber security challenge?
                          Founder & CTO Nir Zuk
                          Unit 42 perspective
                          Unit 42 perspective
                          What to know about incident response
                          CIO to CIO
                          CIO to CIO
                          Evaluating AI capabilities
                          Enterprise AI cybersecurity
                          Enterprise AI cybersecurity
                          What every CIO should know

                          Secure your future with powerful resources

                          Three Principles of Data Security in the AI Era

                          Three Principles of Data Security in the AI Era

                          Using AI as a defense for data prevention and threat detection.
                          Why Resilience—Not Prevention—Should Be Your Cybersecurity Goal

                          Why Resilience—Not Prevention—Should Be Your Cybersecurity Goal

                          Cyber resilience ensures fast attack recovery, minimizing damage.
                          Inside the Mind of State-Sponsored Cyberattackers

                          Inside the Mind of State-Sponsored Cyberattackers

                          Uncover the secrets of a cyber espionage campaign targeting government entities.
                          Mastering the Basic: Cyber Hygiene and Risk Management

                          Mastering the Basic: Cyber Hygiene and Risk Management

                          Strengthen cyber hygiene and positively boost your cybersecurity resilience.
                          The Future of Cybersecurity with Nir Zuk

                          The Future of Cybersecurity with Nir Zuk

                          How machine learning is reshaping cybersecurity defense.
                          STAY CONNECTED

                          Connect with our team today