When three terabytes of data can be stolen in 39 seconds, the traditional defense playbook has to change. Wendi Whitmore recently joined HumanX to explain why the real AI threat is not clunky malware but the terrifying efficiency of the operation itself. From audio deepfakes to automated social engineering, the gap between detection and disaster is closing faster than ever. See how AI is rewriting the rules for defenders. https://bit.ly/49c2V21
Palo Alto Networks
Computer and Network Security
SANTA CLARA, California 1,907,323 followers
About us
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.
- Website
-
http://www.paloaltonetworks.com
External link for Palo Alto Networks
- Industry
- Computer and Network Security
- Company size
- 10,001+ employees
- Headquarters
- SANTA CLARA, California
- Type
- Public Company
- Specialties
- Security Operating Platform, Cloud Security, SaaS Security, Network Security, Next-Generation Firewall, Cybersecurity, Threat and Malware Prevention, URL Filtering, Threat Intelligence, Enterprise Security Platform, Endpoint Security, Threat Research, Unit 42, NextWave Partners, Amazon Web Services, Microsoft Azure, Google Cloud Platform, VMware NSX, Application Framework, Behavioral Analytics, Logging Service, Network Security Management, LIVE Community, Cybersecurity Canon, Fuel User Group, and Cyber Threat Alliance
Locations
Employees at Palo Alto Networks
Updates
-
Your security roadmap called. It wants a trip to New York 🗽 We're two days out from Ignite on Tour, and the timing couldn't be better. AI adoption is accelerating, complexity is rising, and your teams need to move faster than ever. Join us May 20 at Convene 30 Hudson Yards for keynotes, live demos, and hands-on workshops designed to close the gap between strategy and execution. Swipe for a preview of what's on the agenda: 🗺️ Keynote: Securing the AI Enterprise, see what's next in AI security, SecOps, cloud, and identity. 🔥 Industry Perspectives: AI Security Hot Takes, get real experiences, and honest takes on critical security topics 🧠 Expert Panel: Using the AI Advantage to Solve the Unsolvable, learn how AI is turning cybersecurity's hardest problems into solvable one And more! Bring a stronger defense strategy back to your business. Secure your spot now. https://bit.ly/42hV2En
-
Empowering the next generation of tech leaders is at the heart of our mission at Palo Alto Networks 🤝 Our team in India recently conducted an impactful session with The Lightship Initiative, where volunteers shared insights into the world of cybersecurity with nearly 60 talented students from underserved backgrounds. From discussing STEM careers to overcoming personal hurdles, it was a powerful reminder of how we can collectively navigate toward a more inclusive and secure future. Check out the full story on our career blog. https://bit.ly/4wwB0Uv
-
Machine identities now outnumber employees 109 to 1. Privilege is no longer reserved for admins, it's universal. Every user, service account, workload, and AI agent carries the access an attacker needs to move laterally and reach what matters. The fastest attackers move from foothold to exfiltration in 72 minutes. Idira by Palo Alto Networks is built to democratize privilege controls. One control plane. Dynamic Zero Standing Privilege applied to every human, machine, and agentic identity, so defenders can stop attackers in seconds. Peretz Regev shares how Idira does this for the AI Enterprise.
-
What an unforgettable week in Austin ✨ The energy at IMPACT 26 was electric, and we are so grateful to our community of cybersecurity leaders, practitioners, and other innovators who joined us to map out the future of identity security. You made this our biggest, best event yet 🧡🤠 Together, we changed the rules of the game. We celebrated a huge milestone with the launch of Idira by Palo Alto Networks, the next-generation platform built to discover, control, and govern every identity. By eliminating silos and securing all human, machine, and agentic identities, Idira sets a new standard for modern PAM. We did more than just theorize about what's next. Side by side, we established a new path forward for the industry. Thank you for your passion and incredible energy. Catch up on the big moments and watch our speaker sessions here 👇 https://bit.ly/4eJAD2x
-
You wouldn’t hand over your car keys without a second thought or give your credit card to anyone who asks, so why would you allow overly broad permissions at work? In the modern enterprise, giving someone a little too much power or granting access to those who don’t need it creates a world of chaos. Today, identity has become the primary attack vector because adversaries no longer break in - they simply log in using pervasive, uncontrolled privileges. Idira by Palo Alto Networks is the next-generation identity security platform built to secure every human, machine, and agentic identity for the AI enterprise. By replacing static, always-on access with dynamic, zero standing privilege controls, Idira helps you discover hidden risks and automate governance at machine speed. It’s time to control the chaos and secure every identity. Learn more. https://bit.ly/4u4KLaS
-
Radical collaboration is the only way to deliver real-time protection. Following the launch of our Frontier AI Defense initiative, we've continued testing the latest frontier AI models, including Claude Opus 4.7 and OpenAI’s GPT-5.5-Cyber as part of the Trusted Access for Cyber program. The urgency is real: we have a critical three-to five-month window to gain a strategic advantage over attackers. Expanding on our collaboration with our initial partners Accenture, Deloitte, IBM, NTT DATA, and PwC, we’re proud to welcome a new cohort of strategic partners Cognizant, HCLTech, Infosys, Kyndryl, McKinsey & Company, Orange Cyberdefense, Tata Consultancy Services, and Wipro, who will join us in delivering AI readiness at scale. By combining our technology with these partners’ deep consulting expertise, we’re delivering machine-speed security, intelligence-led resilience, and hardened defenses. See the full announcement in our latest blog. https://bit.ly/4uScRWZ
-
Our results from testing the latest frontier AI models are in, here’s what we found.
On April 7, 2026, we began testing Anthropic’s Claude Mythos model as a launch partner for Project Glasswing. Our conclusion: the latest models are extraordinarily capable at finding vulnerabilities and chaining them into critical exploit paths in near real-time. Since then, we’ve continued testing the latest frontier AI models, including Claude Opus 4.7 and OpenAI’s GPT-5.5-Cyber as part of the Trusted Access for Cyber program. The question was: “Are we overstating the model capabilities?” With more testing, I can confidently say we weren’t. The models are likely even better at finding vulnerabilities than we initially realized. Today, we’re providing an update on our ongoing research, our learnings uncovered in the process, and the approach we’re taking to protect our customers. • We released our May ‘Patch Wednesday’ security advisories, our monthly cadence of transparent vulnerability disclosure and remediation. For the first time, a majority of findings resulted from frontier AI models scanning our code. We’re among the first companies to release our findings, covering a full, initial scan of all 130+ products across all three platforms. As of today, we’ve patched all important vulnerabilities in our SaaS delivered products, and all customer-operated products now have patches available. • We expect that across open source and technology suppliers there will be a deluge of patches. We estimate a narrow three-to-five-month window for organizations to outpace adversaries before AI-driven exploits become the new norm. This impending vulnerability deluge demands organizations act urgently. • Regardless of current restricted access, we believe similar capabilities will soon be available in more models. We now estimate a narrow three-to-five-month window for organizations to outpace the adversary before AI-driven exploits start to become the new norm. This impending vulnerability deluge demands urgency. Without appropriate safeguards, organizations will soon encounter an entirely new class of risk. To stay ahead, we recommend organizations: identify and patch vulnerabilities across applications, products and code; assess, reduce and remediate exposure; implement best-in-class protections; and transition to real-time security operations. So far, frontier AI models only find new attacks, not new attack techniques. This means that with the right innovations, we can expand our use of AI to solve the security challenges organizations are facing, and deliver what our customers need to stay ahead of the ever-evolving threat landscape. We’re working on several innovations to do exactly this. More on our ongoing research, what every organization should do now, and the approach we’re taking to protecting Palo Alto Networks customers in my blog: https://lnkd.in/gwhV7evt
-
“We're going to have millions of agents floating around in the IT infrastructure. All these agents need to be identified. All these agents need to be understood. All their data needs to be brought together.” Our CEO & Chairman Nikesh Arora kicked off Day 2 of IMPACT 26 with a keynote discussing the next frontier of security. As the agentic workforce scales, traditional identity tools can’t keep up. That’s why we launched Idira by Palo Alto Networks - to unify and secure every human, machine, and AI identity on a single platform.
-
-
-
-
-
+1
-
-
We are thrilled to welcome Sonny Singh to the team as president of Idira. 🛡️ Sonny is a world-class operator with 35 years of experience leading strategic business units, and understands that a robust architecture is the foundation for rapid transformation. Join us in welcoming Sonny and celebrating this next chapter of the AI enterprise!
I am incredibly excited to share that I have joined Palo Alto Networks as president of Idira. We are at a unique moment in the history of technology. As Nikesh Arora recently noted, the "AI train" is moving at a pace where the models aren't just finding vulnerabilities—they are exposing every piece of bad code written in the last 30 years. We’ve entered the "Agentic Shift," where autonomous AI agents outnumber humans and the attack threshold has shrunk to mere minutes. In this world, the old ways of managing identity are no longer sufficient. Identity has become the new control plane. That is why I am so energized to lead the Idira™ team. By integrating the industry’s deepest PAM heritage from CyberArk with the scale and AI precision of the Palo Alto Networks platform, we are delivering a "find it, fix it" mandate for the modern enterprise. We aren't just managing access; we are eliminating identity debt and securing the future of innovation through Zero Standing Privilege. For 35 years, I’ve been a student of "Buzz to Biz"—the art of turning technological innovation into tangible business outcomes. There is no greater outcome today than ensuring an enterprise can innovate with speed because its security is autonomous, integrated, and absolute. I look forward to working with this world-class team and our customers to redefine what it means to be a secure AI enterprise.