* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate) * Secure the Cloud # Palo Alto Networks ## Secure the Cloud [![Streamline Risk Management with Context-Based Risk Prioritization](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2024/02/GettyImages-825151044-edit.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/risk-prioritization-remediation/) [Streamline Risk Management with Context-Based Risk Prioritization \-----------------------------------------------------------------](https://www2.paloaltonetworks.com/blog/cloud-security/risk-prioritization-remediation/) Gain full visibility of your cloud environment, prioritize critical threats, and remediate risks with context-based risk prioritization for smarter cloud security. [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) Nov 09, 2023 By [Kasi Annamalai](https://www.paloaltonetworks.com/blog/author/kasi-annamalai/?ts=markdown "Posts by Kasi Annamalai") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Top 3 IAM Risks in Your GitHub Organization](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Taking-a-Call.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Top 3 IAM Risks in Your GitHub Organization](https://www2.paloaltonetworks.com/blog/cloud-security/prevent-inadequate-iam-github-organization/) Learn the top 3 IAM risks for GitHub Organizations, and discover practical tips to protect your organization with IAM for your source control management system. Jul 18, 2023 By [Omer Gil](https://www.paloaltonetworks.com/blog/author/omer-gil/?ts=markdown "Posts by Omer Gil") and [Yaron Avital](https://www.paloaltonetworks.com/blog/author/yaron-avital/?ts=markdown "Posts by Yaron Avital") ![ChatGPT and Checkov: Fix IaC Security Issues Fast](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/05/Man-working-3.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [ChatGPT and Checkov: Fix IaC Security Issues Fast](https://www2.paloaltonetworks.com/blog/cloud-security/chatgpt-checkov-iac-security/) Discover how Checkov works with ChatGPT to help you quickly identify and remediate IaC security issues with automatically suggested code fixes and rich security context. Jun 27, 2023 By [Steve Giguere](https://www.paloaltonetworks.com/blog/author/steve-giguere/?ts=markdown "Posts by Steve Giguere") ![How To Prevent the 5 Most Common Software Supply Chain Weaknesses](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/05/Hive-Mind.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [How To Prevent the 5 Most Common Software Supply Chain Weaknesses](https://www2.paloaltonetworks.com/blog/cloud-security/common-software-supply-chain-weaknesses/) Learn the basics of software supply chain security and 7 best practices to protect yourself against common software supply chain weaknesses. Jun 13, 2023 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![Achieving Comprehensive Cloud Security: The Power of Consolidation](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/04/NetSec-Adhoc-Updated-Blog-Image-Resize-497328705.png) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Achieving Comprehensive Cloud Security: The Power of Consolidation](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-security-consolidation/) Modern enterprises need a holistic approach to cloud security management --- one that enables, rather than hinders, the timely achievement of business outcomes. By understanding the ... May 08, 2023 By [Martijn Baecke](https://www.paloaltonetworks.com/blog/author/martijn-baecke/?ts=markdown "Posts by Martijn Baecke") ![Addressing Critical Violations From Login to Reporting With Prisma Cloud](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/04/word-image-183205-1.png) [Cloud Native Application Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-application-platform/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/platform/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Addressing Critical Violations From Login to Reporting With Prisma Cloud](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-security-user-interface/) Prisma Cloud's Command Center user interface improves cloud security by showing you critical issues on one dashboard connected to all the info you nee... May 03, 2023 By [Paul Dickens](https://www.paloaltonetworks.com/blog/author/paul-dickens/?ts=markdown "Posts by Paul Dickens") ![Top 6 Considerations for Integrating Cloud Security and GitOps](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/01/Man-working-1.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Top 6 Considerations for Integrating Cloud Security and GitOps](https://www2.paloaltonetworks.com/blog/cloud-security/6-considerations-for-integrating-cloud-security-and-gitops/) Learn how to leverage GitOps to continuously enforce cloud security guardrails as infrastructure is developed, delivered, and deployed. Apr 27, 2023 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![Why Are Net-Effective Permissions Critical for Cloud IAM?](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/03/NetSec-Adhoc-Updated-Blog-Image-Resize-508484039-1.png) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Why Are Net-Effective Permissions Critical for Cloud IAM?](https://www2.paloaltonetworks.com/blog/cloud-security/net-effective-permissions-iam/) With a CIEM tool to understand access entitlements across cloud environments, orgs can apply the principle of least privilege to reduce their attack surface. Apr 19, 2023 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Crawl, Walk, Run: Operationalizing Your IaC Security Program](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/11/Right-There.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Crawl, Walk, Run: Operationalizing Your IaC Security Program](https://www2.paloaltonetworks.com/blog/cloud-security/how-to-implement-an-infrastructure-as-code-security-program/) Learn how to operationalize your infrastructure as code security program with our rollout timeline and guidance for your first ninety days. Jan 10, 2023 By [Mike Urbanski](https://www.paloaltonetworks.com/blog/author/mike-urbanski/?ts=markdown "Posts by Mike Urbanski") ![How To Prevent the IaC Misconfiguration Snowball Effect](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/12/Skyscraper-with-a-Twist.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [How To Prevent the IaC Misconfiguration Snowball Effect](https://www2.paloaltonetworks.com/blog/cloud-security/iac-misconfiguration-snowball-effect/) See why one infrastructure as code (IaC) misconfiguration can snowball into thousands of security alerts, and learn how proactive, embedded IaC security can help you mitigate this problem. Jan 03, 2023 By [Payton O'Neal](https://www.paloaltonetworks.com/blog/author/payton-oneal/?ts=markdown "Posts by Payton O’Neal") ![Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/12/Confirming.jpg) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and ...](https://www2.paloaltonetworks.com/blog/cloud-security/secrets-security-across-files-repositories-pipelines/) Secrets security requires detection across hundreds of access tokens, API keys, certificates, passwords, etc., embedded into existing developer workfl... Dec 13, 2022 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![You Must Comply! Why You Need Proactive Open Source License Compliance](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/04/NetSec-Adhoc-Updated-Blog-Image-Resize-666009646.png) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [You Must Comply! Why You Need Proactive Open Source License Compliance](https://www2.paloaltonetworks.com/blog/cloud-security/why-you-need-proactive-open-source-license-compliance/) Learn the basics of open-source license compliance and discover how to adopt a proactive, developer-first approach to open-source security. Dec 06, 2022 By [Steve Giguere](https://www.paloaltonetworks.com/blog/author/steve-giguere/?ts=markdown "Posts by Steve Giguere") ![Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/08/Cityscape.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App ...](https://www2.paloaltonetworks.com/blog/cloud-security/infrastructure-as-code-security-and-appsec-streamlined-devsecops/) Learn how to get streamlined DevSecOps when you consolidate AppSec and infrastructure as code security. Nov 15, 2022 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![Prisma Cloud Provides New Extensive Use Cases for Azure Customers](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/11/iStock-938605236-edit-1280x1280-1.jpeg) [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Prisma Cloud Provides New Extensive Use Cases for Azure Customers](https://www2.paloaltonetworks.com/blog/cloud-security/prisma-cloud-provides-new-extensive-use-cases-for-azure-customers/) Microsoft Azure customers can now secure their data and networks and gain broader governance across their cloud assets. Nov 10, 2022 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![6 Key Kubernetes DevSecOps Principles: People, Processes, Technology](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/10/WFH-Woman-1.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [6 Key Kubernetes DevSecOps Principles: People, Processes, Technology](https://www2.paloaltonetworks.com/blog/cloud-security/kubernetes-devsecops-principles/) Learn 6 key principles to keep in mind when developing a Kubernetes DevSecOps strategy---from embedding the right processes across the application lifecycle to measuring the right KP... Nov 08, 2022 By [Faith Kilonzi](https://www.paloaltonetworks.com/blog/author/faith-kilonzi/?ts=markdown "Posts by Faith Kilonzi") ![9 Essential Infrastructure Security Considerations for Kubernetes](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/07/Zero-Trust.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [9 Essential Infrastructure Security Considerations for Kubernetes](https://www2.paloaltonetworks.com/blog/cloud-security/kubernetes-infrastructure-security-considerations/) Learn 9 security best practices to keep in mind while building out your Kubernetes architecture with Infrastructure as Code (IaC). Oct 20, 2022 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![Secure Vulnerable Images Found in IaC Templates With Prisma Cloud](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Getting-it-Done.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Secure Vulnerable Images Found in IaC Templates With Prisma Cloud](https://www2.paloaltonetworks.com/blog/cloud-security/secure-vulnerable-images-in-iac-templates-with-prisma-cloud/) Learn how to proactively identify and scan vulnerable images sourced in IaC and CI/CD files with Prisma Cloud's new Image Referencer capability. Oct 18, 2022 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/10/Whats-That-Ep-06-Thumbnail.png) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Software Composition Analysis (SCA): How Does It Help Keep Cloud Applicatio...](https://www2.paloaltonetworks.com/blog/cloud-security/software-composition-analysis-sca-how-does-it-help-keep-cloud-applications-secure/) Learn how software composition analysis (SCA) helps to identify and remedy open source vulnerabilities and license compliance issues. Oct 11, 2022 By [Tohar Zand](https://www.paloaltonetworks.com/blog/author/tohar-zand/?ts=markdown "Posts by Tohar Zand") ![Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/08/Whats-That-Ep-04-Thumbnail-V1-1.png) [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Web Application \& API Security](https://www.paloaltonetworks.com/blog/cloud-security/category/web-application-api-security/?ts=markdown) ## [Web Application Firewalls (WAFs): What You Need To Know About the Security ...](https://www2.paloaltonetworks.com/blog/cloud-security/web-application-firewalls-what-you-need-to-know/) Web Application Firewalls play a key role in securing web applications. Learn how they work and how WAFs will need to evolve to meet future security r... Aug 31, 2022 By [Mohit Bhasin](https://www.paloaltonetworks.com/blog/author/mohit-bhasin/?ts=markdown "Posts by Mohit Bhasin") ![Building the Business Case for DevSecOps](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/08/iStock-1149958306.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Building the Business Case for DevSecOps](https://www2.paloaltonetworks.com/blog/cloud-security/building-the-business-case-for-devsecops/) Find out how the collaboration and productivity benefits of DevSecOps outweigh the upfront investment costs of training and implementation. Aug 16, 2022 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![Maturing Your Cloud Security Program](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/07/Fog-upon-City.jpg) [Cloud Native Application Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-application-platform/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Maturing Your Cloud Security Program](https://www2.paloaltonetworks.com/blog/cloud-security/maturing-your-cloud-security-program/) Mature your enterprises' cloud security program with Cloud Native Application Protection Platforms (CNAPPs) and leverage several clear benefits. Aug 15, 2022 By [Joe Rogalski](https://www.paloaltonetworks.com/blog/author/joe-rogalski/?ts=markdown "Posts by Joe Rogalski") Load more blogs Load more blogs ### Subscribe to the Newsletter! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language