* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * AUTR # Palo Alto Networks ## AUTR [](https://www2.paloaltonetworks.com/blog/2016/02/four-imperatives-for-cybersecurity-success-in-the-digital-age-part-1/) [Four Imperatives for Cybersecurity Success in the Digital Age: Part 1 \---------------------------------------------------------------------](https://www2.paloaltonetworks.com/blog/2016/02/four-imperatives-for-cybersecurity-success-in-the-digital-age-part-1/) Having joined Palo Alto Networks following a 35-year career in the U.S. military, the past decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader international business world. [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown) [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) Feb 16, 2016 By [John Davis](https://www.paloaltonetworks.com/blog/author/john-davis/?ts=markdown "Posts by John Davis") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** [](https://www2.paloaltonetworks.com/blog/2016/02/securing-government-heres-what-we-should-learn-from-2015/) [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown) ## [Securing Government: Here's What We Should Learn from 2015](https://www2.paloaltonetworks.com/blog/2016/02/securing-government-heres-what-we-should-learn-from-2015/) I recently presented to the 2016 Cyber Defence and Network Security (CDANS) conference in the United Kingdom. As I was preparing remarks for senior U.S. and European military leade... Feb 11, 2016 By [Pamela Warren](https://www.paloaltonetworks.com/blog/author/pwarren/?ts=markdown "Posts by Pamela Warren") [](https://www2.paloaltonetworks.com/blog/2015/11/our-commitment-to-sharing-threat-intelligence/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) ## [Our Commitment to Sharing Threat Intelligence](https://www2.paloaltonetworks.com/blog/2015/11/our-commitment-to-sharing-threat-intelligence/) Part of my role as the Director of Threat Intelligence for Palo Alto Networks is to share the intelligence we produce with others who can put it to use in defending their networks. We believe wholeheartedly tha... Nov 23, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") ![A View Into the Cyber3 Conference – Crafting Security in a Less Secure World](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2015/10/blog-generic-banner.jpg) [Application usage \& risk report](https://www.paloaltonetworks.com/blog/category/application-usage-risk-report/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) ## [A View Into the Cyber3 Conference -- Crafting Security in a Less Secure Worl...](https://www2.paloaltonetworks.com/blog/2015/11/a-view-into-the-cyber3-conference-crafting-security-in-a-less-secure-world/) Palo Alto Networks was a Gold sponsor of the official side program of the "Cyber3 Conference Okinawa 2015---Crafting Security in a Less Secure World", a... Nov 15, 2015 By [Martina Schulze-Warnecke](https://www.paloaltonetworks.com/blog/author/martina/?ts=markdown "Posts by Martina Schulze-Warnecke") [](https://www2.paloaltonetworks.com/blog/2015/10/webinar-turn-the-tables-on-adversaries-with-proactive-defense/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Webinar: Turn the Tables on Adversaries with Proactive Defense](https://www2.paloaltonetworks.com/blog/2015/10/webinar-turn-the-tables-on-adversaries-with-proactive-defense/) The Palo Alto Networks Application Usage and Threat Report gives you visibility into the real-world threat and application landscape, helps you better... Oct 23, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/10/channel-scoop-october-23-2015/) [Channel Scoop](https://www.paloaltonetworks.com/blog/category/channel-scoop/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) ## [Channel Scoop -- October 23, 2015](https://www2.paloaltonetworks.com/blog/2015/10/channel-scoop-october-23-2015/) Sit back and relax. Let us do the information gathering and give you the channel scoop. Oct 23, 2015 By [Lang Tibbils](https://www.paloaltonetworks.com/blog/author/lang-tibbils/?ts=markdown "Posts by Lang Tibbils") [](https://www2.paloaltonetworks.com/blog/2015/10/palo-alto-networks-news-of-the-week-october-10/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- October 10](https://www2.paloaltonetworks.com/blog/2015/10/palo-alto-networks-news-of-the-week-october-10/) All of our top news from this past week has been rounded up right here for easy consumption!Unit 42 was especially busy this week: Oct 10, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/10/understanding-global-application-usage-and-threats-to-enterprises/) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) ## [Understanding Global Application Usage and Threats to Enterprises](https://www2.paloaltonetworks.com/blog/2015/10/understanding-global-application-usage-and-threats-to-enterprises/) "A single arrow is easily broken, but not ten in a bundle." -- Japanese proverbIs prevention of cyber attacks impossible? Is trying to prevent attacks... Oct 06, 2015 By [Bryan Lee](https://www.paloaltonetworks.com/blog/author/bryan-lee/?ts=markdown "Posts by Bryan Lee") [](https://www2.paloaltonetworks.com/blog/2015/03/data-breach-frequency-doesnt-slow-cloud-computing-momentum/) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Data Center](https://www.paloaltonetworks.com/blog/category/data-center-2/?ts=markdown) ## [Data Breach Frequency Doesn't Have to Slow Cloud Computing Momentum](https://www2.paloaltonetworks.com/blog/2015/03/data-breach-frequency-doesnt-slow-cloud-computing-momentum/) According to Identifytheft.org, in 2014, there were 783 data breaches resulting in the loss of more than 85 million records -- a bad year for secure data by any measurement. This ye... Mar 02, 2015 By [Matt Keil](https://www.paloaltonetworks.com/blog/author/matt/?ts=markdown "Posts by Matt Keil") [](https://www2.paloaltonetworks.com/blog/2014/10/visit-palo-alto-networks-gitex-2014/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) ## [Visit Palo Alto Networks at GITEX 2014!](https://www2.paloaltonetworks.com/blog/2014/10/visit-palo-alto-networks-gitex-2014/) GITEX Technology Week returns to the Dubai World Trade Centre on October 12-16. As one of the most important technology conferences in the Middle East, North Africa and South Asia regions, it gathers more than... Oct 02, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/10/web-security-tips-using-url-categories-security-policy/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Web Security](https://www.paloaltonetworks.com/blog/category/web-security/?ts=markdown) ## [Web Security Tips: Using URL Categories in Your Security Policy](https://www2.paloaltonetworks.com/blog/2014/10/web-security-tips-using-url-categories-security-policy/) Almost all UTMs or so-called next-generation firewalls have URL filtering capability, but they are not well integrated enough to utilize URL categories in a security policy. By tak... Oct 01, 2014 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2014/09/visit-palo-alto-networks-infosecurity-netherlands/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) ## [Visit Palo Alto Networks at Infosecurity The Netherlands!](https://www2.paloaltonetworks.com/blog/2014/09/visit-palo-alto-networks-infosecurity-netherlands/) Palo Alto Networks returns to Infosecurity The Netherlands October 29-30 at Jaarbeurs Utrecht. Sep 16, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/08/palo-alto-networks-provides-new-breed-intelligence-detect-prevent/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) ## [Palo Alto Networks Provides a New Breed of Intelligence to Detect and Preve...](https://www2.paloaltonetworks.com/blog/2014/08/palo-alto-networks-provides-new-breed-intelligence-detect-prevent/) Back in June, Microsoft patched 59 Internet Explorer vulnerabilities and Palo Alto Networks discovered 21 of them, all rated critical. Then in July, w... Aug 05, 2014 By [Tim Treat](https://www.paloaltonetworks.com/blog/author/tim-treat/?ts=markdown "Posts by Tim Treat") [](https://www2.paloaltonetworks.com/blog/2014/07/business-application-threat-join-us-moderated-discussion/) [Application Advisory/Analysis](https://www.paloaltonetworks.com/blog/category/application-analysis/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Business Application or Threat? Join Us for a Moderated Discussion](https://www2.paloaltonetworks.com/blog/2014/07/business-application-threat-join-us-moderated-discussion/) Over the past few weeks we've shared findings from our 2014 Application Usage and Threat Report, which explains the intertwined relationship between c... Jul 16, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/07/stop-encouraging-shadow-start-safely-enabling-innovation/) [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Stop Encouraging "Shadow IT" and Start Safely Enabling Innovation](https://www2.paloaltonetworks.com/blog/2014/07/stop-encouraging-shadow-start-safely-enabling-innovation/) According to most information workers, when it comes to security, "IT needs to lead, follow or get out of the way." A 2013 Software-as-a-Service study conducted by Stratecast and s... Jul 10, 2014 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2014/07/application-usage-threat-report/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) ## [A Look Back At the 2014 Application Usage And Threat Report](https://www2.paloaltonetworks.com/blog/2014/07/application-usage-threat-report/) \[\<a href="//storify.com/PANW/application-usage-and-threat-report" target="\_blank"\>View the story "Application Usage And Threat Report" on Storify\&... Jul 04, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/07/learn-whats-really-happening-network/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Learn What's Really Happening On Your Network](https://www2.paloaltonetworks.com/blog/2014/07/learn-whats-really-happening-network/) Today's cyber threats hide in plain sight amidst your network traffic, using applications as infiltration vectors, exhibiting application-like evasion tactics and leveraging commonly used network applications f... Jul 02, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/06/palo-alto-networks-news-week-june-27/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- June 27](https://www2.paloaltonetworks.com/blog/2014/06/palo-alto-networks-news-week-june-27/) Here's a roundup of top Palo Alto Networks news from this past week. Jun 27, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/06/udp-malware-hiding-place-of-choice/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) ## [UDP: The Malware Hiding Place of Choice](https://www2.paloaltonetworks.com/blog/2014/06/udp-malware-hiding-place-of-choice/) Our 2014 Application Usage and Threat Report reveals that attackers are using existing applications on networks and carrying out threat activity using traditional exploit techniques in nontraditional ways. Amon... Jun 26, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/06/ssl-capable-applications-consistent-among-regions/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [SSL-Capable Applications Consistent Among Regions](https://www2.paloaltonetworks.com/blog/2014/06/ssl-capable-applications-consistent-among-regions/) Last week we reviewed subtle differences in application usage among enterprises in different regions, based on the data in our 2014 Application Usage and Threat Report. A number of you have asked if we noticed... Jun 23, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/06/visit-palo-alto-networks-gartner-security-risk-management-summit-2014/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) ## [Visit Palo Alto Networks at Gartner Security and RIsk Management Summit 201...](https://www2.paloaltonetworks.com/blog/2014/06/visit-palo-alto-networks-gartner-security-risk-management-summit-2014/) Come on over and visit Palo Alto Networks at this week's Gartner Security and Risk Management Summit 2014 in National Harbor, Maryland, which kicks off today. We'll be sharing new... Jun 23, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language