Overview
Explore
Expertise
Ecosystem
Select a tab
48 results found
Stop Stacking Boxes. Start Designing Security.
Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026
What is the Prisma Access Browser
The Prisma Access Browser, a custom Chromium-based browser by Palo Alto Networks, integrates advanced security services to offer seamless, robust protection. It validates users, limits access based on roles and eliminates the need for cumbersome VPNs, making it an ideal solution for modern, flexible work environments.
Blog
•Nov 11, 2024
Introduction to XQL: Writing Your First Query
Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024
When Identity Becomes the Battlefield: Why Palo Alto Networks + CyberArk Changes the Map
Palo Alto Networks' acquisition of CyberArk marks a structural shift in cybersecurity, making Identity Security a core platform pillar alongside Network and SecOps. By unifying privilege, machine and AI identity protection, the move accelerates platformization and operational resilience.
Blog
•Feb 12, 2026
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
Introduction to XQL: Writing Your First Correlation Rule
Correlation Rules in Cortex XDR and XSIAM are how we can use XQL queries to detect patterns, anomalies or sequences of activities that could indicate malicious behavior, even when each individual event might not appear suspicious on its own. Correlation Rules typically leverage data from multiple datasets, but for our example, we'll keep it simple to alert on failed login attempts to a NGFW, and build on the query later.
Blog
•Dec 31, 2024
PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists
Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023
Introduction to XQL: Custom Datasets for Threat Hunting
Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025
Texas A&M University System Teams Up with WWT for Cyber Range Challenge
Texas A&M University Systems partners with WWT for a Cyber Range Capture the Flag competition, empowering students with hands-on threat-hunting experience. Sponsored by industry leaders, this event highlights Texas A&M's commitment to reinvesting in its students and preparing future cybersecurity professionals.
Blog
•Dec 15, 2025
How to Optimize Your End-User Computing Environment to Escape the AI Price Increases
Escaping AI‑driven endpoint price increases comes down to smarter, data‑driven decisions across the endpoint estate. Using persona analysis, DEX insights and targeted optimizations, organizations can achieve meaningful gains today while extending device lifecycles and reducing near‑term spend.
Blog
•Mar 3, 2026
Platformizing the AI Decade with Palo Alto Networks
Palo Alto Networks' recent acquisitions signal a structural shift from portfolio integration to true platformization for the AI decade. By securing AI pipelines, embedding identity enforcement, converging observability, and governing autonomous endpoints, the platform aligns to machine-speed risk—positioning enterprises to architect resilient, future-ready security rather than react to disruption.
Blog
•Feb 24, 2026
The Journey of a Cortex XSOAR Playbook: Theory and Concepts
Master Cortex XSOAR by shifting your perspective on automation. Dive into the foundational concepts of Incidents, Indicators and Playbooks to design scalable, resilient workflows. Embrace integrations, sub-playbooks and error handling to enhance efficiency. Prepare to transform raw data into actionable insights, setting the stage for advanced automation.
Blog
•Jul 31, 2025