Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

51 results found

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

Introduction to XQL: Writing Your First Correlation Rule

Correlation Rules in Cortex XDR and XSIAM are how we can use XQL queries to detect patterns, anomalies or sequences of activities that could indicate malicious behavior, even when each individual event might not appear suspicious on its own. Correlation Rules typically leverage data from multiple datasets, but for our example, we'll keep it simple to alert on failed login attempts to a NGFW, and build on the query later.
Blog
•Dec 31, 2024

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

External Dynamic Lists (EDLs) in Palo Alto Firewalls dynamically integrate IPs, URLs, and domains into security policies, reducing change requests. They empower SOCs to manage threats without firewall changes. Despite limitations, EDLs enhance security by automating updates and supporting authentication. Implementing EDLs optimizes security posture and streamlines threat management.
Blog
•Oct 10, 2023

Introduction to XQL: Custom Datasets for Threat Hunting

Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025

Introduction to Cortex XDR

Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023

Prisma AIRS Series - Part 1: Discovery

AI is spreading faster than most organizations can track it, across apps, APIs, and teams, often without clear visibility or control. This article explores why traditional discovery falls short and how Prisma AIRS approaches AI security as a connected system, starting with Discovery. By building a unified, contextual view of models, data, and interactions; including shadow AI, organizations can finally understand where risk exists and where control is needed. Next, we turn to Assessment; how to test what you've found.
Blog
•Apr 9, 2026

The Journey of a Cortex XSOAR Playbook: Theory and Concepts

Master Cortex XSOAR by shifting your perspective on automation. Dive into the foundational concepts of Incidents, Indicators and Playbooks to design scalable, resilient workflows. Embrace integrations, sub-playbooks and error handling to enhance efficiency. Prepare to transform raw data into actionable insights, setting the stage for advanced automation.
Blog
•Jul 31, 2025

When Identity Becomes the Battlefield: Why Palo Alto Networks + CyberArk Changes the Map

Palo Alto Networks' acquisition of CyberArk marks a structural shift in cybersecurity, making Identity Security a core platform pillar alongside Network and SecOps. By unifying privilege, machine and AI identity protection, the move accelerates platformization and operational resilience.
Blog
•Feb 12, 2026

Securing AI in Real-Time with Palo Alto Networks' AI Runtime Security

As AI adoption grows, so do the risks. Palo Alto Networks' AI Runtime Security offers real-time monitoring, advanced threat detection and zero-trust access controls to protect AI applications. This solution ensures data security, regulatory compliance and operational integrity, enabling businesses to confidently leverage AI's potential while mitigating vulnerabilities.
Blog
•Nov 19, 2024

What is the Prisma Access Browser

The Prisma Access Browser, a custom Chromium-based browser by Palo Alto Networks, integrates advanced security services to offer seamless, robust protection. It validates users, limits access based on roles and eliminates the need for cumbersome VPNs, making it an ideal solution for modern, flexible work environments.
Blog
•Nov 11, 2024

The State of Data Loss Prevention

Data Loss Prevention has regained prominence in recent years due to large scale breaches and increasingly stringent regulatory requirements. Vendors with varying tech heritages have been lining up to employ new technologies and techniques against this seemingly never-ending problem.
Blog
•Mar 31, 2025

Better AI, Not Less AI: The Case for Explainability in Security Operations

As organizations struggle with alert fatigue, traditional AI security tools fall short by operating as black boxes that offer verdicts without reasoning. Explainable AI (XAI) addresses this by showing analysts why decisions are made across triage, investigation, and response. The result is faster workflows, smarter detection and analysts who build real threat intuition.
Blog
•Apr 20, 2026

Palo Alto Networks

Palo Alto Networks' cybersecurity solutions include advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security.

325 Followers

At a glance

89Total
51Blogs
11Articles
7Labs
5Case Studies
5Events
4Learning Paths
3Videos
2Briefings
1Workshop
What's related
  • Security
  • Blog
  • Network Security with Palo Alto Networks
  • Palo Alto Next-Generation Firewalls
  • Network Security
  • Palo Alto Networks Prisma Access
  • AI Security
  • Palo Alto Networks Security Operations
  • Palo Alto Prisma SASE
  • Security Operations
  • ATC
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • Palo Alto Cortex XSOAR
  • SASE
  • AI & Data
  • Cloud
  • Cloud Security
  • Precision AI by Palo Alto Networks
  • Prisma® AIRS™ by Palo Alto Networks

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies