* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate) * whitepaper # Palo Alto Networks ## whitepaper [![New White Paper on Preventing Credential Phishing, Theft and Abuse](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2017/03/Linkedin.jpg)](https://www2.paloaltonetworks.com/blog/2017/03/unit42-new-white-paper-preventing-credential-phishing-theft-abuse/) [New White Paper on Preventing Credential Phishing, Theft and Abuse \------------------------------------------------------------------](https://www2.paloaltonetworks.com/blog/2017/03/unit42-new-white-paper-preventing-credential-phishing-theft-abuse/) Get Unit 42's latest white paper: "Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse" [Threat Brief](https://www.paloaltonetworks.com/blog/category/threat-brief/?ts=markdown) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) Mar 21, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![5 Steps To Prevent Data Breaches Due to Insider and Privilege Misuse](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2015/10/blog-generic-banner.jpg) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [5 Steps To Prevent Data Breaches Due to Insider and Privilege Misuse](https://www2.paloaltonetworks.com/blog/2016/10/5-steps-to-prevent-data-breaches-due-to-insider-and-privilege-misuse/) My previous blog post showed that data breaches related to insider and privilege misuse are the hardest to discover and are costly to resolve. I also explained that prevention star... Oct 03, 2016 By [Navneet Singh](https://www.paloaltonetworks.com/blog/author/navneet-singh/?ts=markdown "Posts by Navneet Singh") [](https://www2.paloaltonetworks.com/blog/2016/09/cso-ask-the-right-questions-advice-to-ceos-and-cisos-addressing-the-state-of-the-art-paradox/) [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) ## [Ask the Right Questions: Advice to CEOs and CISOs Addressing the State of t...](https://www2.paloaltonetworks.com/blog/2016/09/cso-ask-the-right-questions-advice-to-ceos-and-cisos-addressing-the-state-of-the-art-paradox/) As we've previously discussed, the Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR), which will be introduced in 2018, include among t... Sep 26, 2016 By [Greg Day](https://www.paloaltonetworks.com/blog/author/greg-day/?ts=markdown "Posts by Greg Day") [](https://www2.paloaltonetworks.com/blog/2016/09/this-is-the-hardest-type-of-data-breach-to-discover-luckily-its-preventable/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [This Is the Hardest Type of Data Breach to Discover. Luckily, It's Preventa...](https://www2.paloaltonetworks.com/blog/2016/09/this-is-the-hardest-type-of-data-breach-to-discover-luckily-its-preventable/) Not all data breaches are created equal. Some cost more, others less. Some are easy to detect, others difficult. As I was reading the Verizon 2016 Data Breach Investigations Report... Sep 12, 2016 By [Navneet Singh](https://www.paloaltonetworks.com/blog/author/navneet-singh/?ts=markdown "Posts by Navneet Singh") [](https://www2.paloaltonetworks.com/blog/2016/06/securing-data-in-the-data-center-reducing-the-attack-surface-and-preventing-threats/) [Data Center](https://www.paloaltonetworks.com/blog/category/data-center-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Securing Data In The Data Center: Reducing the Attack Surface and Preventin...](https://www2.paloaltonetworks.com/blog/2016/06/securing-data-in-the-data-center-reducing-the-attack-surface-and-preventing-threats/) Attacks against corporate and government data centers continue to evolve at a substantial rate, and center on three major categories: Jun 15, 2016 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2016/04/next-generation-security-with-palo-alto-networks-vm-series-and-vmware-nsx/) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) ## [Next-Generation Security with Palo Alto Networks VM-series and VMware NSX](https://www2.paloaltonetworks.com/blog/2016/04/next-generation-security-with-palo-alto-networks-vm-series-and-vmware-nsx/) There are a number of barriers to securing the private cloud, and one of those is the ability to deploy security services at the same pace as virtual machine deployments, without c... Apr 21, 2016 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/09/here-are-5-things-your-cybersecurity-team-must-do/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ## [Here Are 5 Things Your Cybersecurity Team Must Do](https://www2.paloaltonetworks.com/blog/2015/09/here-are-5-things-your-cybersecurity-team-must-do/) Cybersecurity is a hot topic these days. Corporate breaches in the headlines have turned hackers into the new super villains. "Revenge of the Nerds" is alive and well, and hacking is their super power. It's no... Sep 03, 2015 By [Karin Shopen](https://www.paloaltonetworks.com/blog/author/karin-shopen/?ts=markdown "Posts by Karin Shopen") [](https://www2.paloaltonetworks.com/blog/2015/08/slideshow-how-enterprises-can-break-the-cyber-attack-lifecycle/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Slideshow: How Enterprises Can Break the Cyber Attack Lifecycle](https://www2.paloaltonetworks.com/blog/2015/08/slideshow-how-enterprises-can-break-the-cyber-attack-lifecycle/) The Cyber Attack Lifecycle is a sequence of events that an attacker must go through to successfully infiltrate a network and exfiltrate data from it. ... Aug 12, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/07/secure-server-configurations-for-virtualized-environments/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Secure Server Configurations for Virtualized Environments](https://www2.paloaltonetworks.com/blog/2015/07/secure-server-configurations-for-virtualized-environments/) The evolution of data centers is affecting both centralized and distributed environments. As IT operations gain familiarity with server virtualization, security groups can evolve to best practices for secure se... Jul 23, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/07/important-considerations-for-cloud-security-whether-public-or-private/) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Important Considerations for Cloud Security, Whether Public or Private](https://www2.paloaltonetworks.com/blog/2015/07/important-considerations-for-cloud-security-whether-public-or-private/) Security is one of the most critical considerations for cloud computing, regardless of whether the deployment is public or private. We recently teamed... Jul 13, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/06/better-network-security-for-distributed-enterprises/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Better Network Security for Distributed Enterprises](https://www2.paloaltonetworks.com/blog/2015/06/better-network-security-for-distributed-enterprises/) As recent breaches have shown, attackers are quick to take advantage of the vulnerabilities that distributed environments introduce. Security teams need to be fast in updating both the effectiveness and efficie... Jun 26, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/06/join-palo-alto-networks-and-sans-for-conquering-network-security-challenges-in-distributed-enterprises/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) ## [Join Palo Alto Networks and SANS for 'Conquering Network Security Challenge...](https://www2.paloaltonetworks.com/blog/2015/06/join-palo-alto-networks-and-sans-for-conquering-network-security-challenges-in-distributed-enterprises/) Join Palo Alto Networks and the SANS Institute for "Conquering Network Security Challenges in Distributed Enterprises," a webinar that will examine how current security methods in... Jun 14, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/06/mind-the-gap-whats-hampering-your-cybersecurity-efforts/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Mind the Gap: What's Hampering Your Cybersecurity Efforts?](https://www2.paloaltonetworks.com/blog/2015/06/mind-the-gap-whats-hampering-your-cybersecurity-efforts/) This week we announced more than 70 new features as part of the official launch of PAN-OS 7.0. Follow the below infographic to understand where organi... Jun 11, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/05/using-the-global-threat-community-to-prevent-known-and-unknown-threats/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Using the Global Threat Community to Prevent Known and Unknown Threats](https://www2.paloaltonetworks.com/blog/2015/05/using-the-global-threat-community-to-prevent-known-and-unknown-threats/) Organizations can't keep up with advanced attackers if their only option is to clean up after the fact. May 06, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/04/lets-design-a-secure-cloud-together/) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ## [Let's Design A Secure Cloud Together](https://www2.paloaltonetworks.com/blog/2015/04/lets-design-a-secure-cloud-together/) Securing cloud environments has never been more challenging. Cyberattacks are on the rise and attackers are targeting critical datacenter assets using applications commonly found on your network. It is now an imperative that you control what's on your network, while pre... Apr 09, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2015/01/moving-beyond-proxies-better-approach-web-security/) [Web Security](https://www.paloaltonetworks.com/blog/category/web-security/?ts=markdown) ## [Moving Beyond Proxies: A Better Approach to Web Security](https://www2.paloaltonetworks.com/blog/2015/01/moving-beyond-proxies-better-approach-web-security/) Once upon a time, proxies fulfilled a need traditional firewalls could not meet: visibility into web traffic starting with the categorization of HTTP, and later HTTPS, traffic. However, little to no emphasis wa... Jan 19, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2014/12/dont-miss-single-threat-intelligence-update-unit-42/) [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Don't Miss A Single Threat Intelligence Update from Unit 42!](https://www2.paloaltonetworks.com/blog/2014/12/dont-miss-single-threat-intelligence-update-unit-42/) Unit 42 is the Palo Alto Networks threat intelligence team. Made up of accomplished cybersecurity researchers and industry experts, Unit 42 gathers, researches, analyzes, and provi... Dec 29, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/07/palo-alto-networks-news-week-july-25/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 25](https://www2.paloaltonetworks.com/blog/2014/07/palo-alto-networks-news-week-july-25/) Here's a roundup of this week's top Palo Alto Networks news. Jul 25, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2014/07/financial-services-foundation-better-security/) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Financial Services](https://www.paloaltonetworks.com/blog/category/financial-services/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Mobility](https://www.paloaltonetworks.com/blog/category/mobility/?ts=markdown), [PCI compliance](https://www.paloaltonetworks.com/blog/category/pci-compliance/?ts=markdown), [Vertical](https://www.paloaltonetworks.com/blog/category/vertical/?ts=markdown) ## [Financial Services: The Foundation of a Better Security](https://www2.paloaltonetworks.com/blog/2014/07/financial-services-foundation-better-security/) From mobile to cloud computing, financial services organizations rely more than ever on innovative technologies to remain competitive. This focus is m... Jul 24, 2014 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language