{"id":43954,"date":"2021-11-16T19:48:00","date_gmt":"2021-11-16T19:48:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/"},"modified":"2021-11-16T19:48:00","modified_gmt":"2021-11-16T19:48:00","slug":"palo-alto-software-advances-end-to-end-enterprise-cloud-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/","title":{"rendered":"Palo Alto software advances end-to-end enterprise cloud security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2021\/10\/3-ways-to-use-cis-cloud-security-resources-on-the-aws-cloud-100905673-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Palo Alto Networks has bolstered its security software to better protect &nbsp;enterprise Software-as-a-Service (SaaS) applications.<\/p>\n<p>The company rolled out a new version of its core cloud-security package, Prisma Cloud 3.0, which includes the ability to code security directly into SaaS applications. The package includes a cloud-access security broker (CASB) to control access to cloud resources.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">[Get regularly scheduled insights by signing up for Network World newsletters.]<\/a><\/aside>\n<p>Prisma is a cloud-based security bundle that includes access control, advanced threat protection, user-behavior monitoring, and other services that promise to protect enterprise applications and resources. Managed through a single console, Prisma includes firewall as a service,<a href=\"https:\/\/www.networkworld.com\/article\/3571453\/how-the-network-can-support-zero-trust.html\"> Zero Trust network access<\/a> and a secure web gateway.&nbsp;<\/p>\n<aside class=\"fakesidebar\">\n<p>The overarching goal is to protect web and non-web applications. The challenge securing cloud environments stems from the nature of the cloud itself. Workloads and resources in the cloud are broadly distributed and highly ephemeral, wrote Ankur Shah, senior vice president and general manager of Palo Alto\u2019s Prisma Cloud business in a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/11\/shift-left-with-prisma-cloud-3-0\/\" rel=\"nofollow\">blog<\/a> about the new software. \u201cOne new cloud account connects with workloads, applications, and data, where each point presents potential attack vectors,\u201d he wrote.<\/p>\n<p>Palo Alto Networks Unit 42 cloud-threat researchers found that between April and June 2020, cloud security incidents increased by an astounding 188%, and some industries saw increases of more than 400%, Shah stated.<\/p>\n<p>The new Prisma Cloud release includes support for infrastructure as code (IaC) scanning and code fixes that can be embedded into developer tools across the development lifecycle.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>The package has also been upgraded to support agentless scanning that looks at cloud provider APIs and disk snapshots to determine vulnerabilities.<\/p>\n<p>Prisma Cloud also now includes pre-defined rules, application profiling, and automated policy creation to simplify and accelerate microsegmentation where needed.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>\u201cThese new rules are validated, predefined microsegmentation rules that can help secure common applications in just minutes,\u201d Shah stated. \u201cApplication profiling is a simple workflow that automatically generates the optimal, least-privilege microsegmentation rules for any cloud-native application, with a single click. These new capabilities help security teams accelerate their Zero Trust adoption, simplify policy creation and minimize human error.\u201d<\/p>\n<p>On the CASB front, Palo Alto has bolstered the broker\u2019s machine-learning capabilities to help identify new or unsanctioned SaaS applications as they become popular, classify them, and apply appropriate security policies, according to Anand Oswal, senior vice president and general manager of Palo Alto. The idea is to protect sensitive data in real-time with Enterprise Data Loss Prevention, which incorporates machine learning, optical character recognition, and natural language processing, Oswal stated.&nbsp;<\/p>\n<p>With increased business use of Slack, Microsoft Teams, Zoom, and other collaboration apps, users are sending shorter, more frequent messages. \u201cConfidential information is more unstructured than ever and increasingly difficult to protect with existing CASB solutions,\u201d Oswal stated. \u201cThis makes data breach prevention, compliance and data privacy very difficult tasks for any organization.\u201d&nbsp;<\/p>\n<p>Legacy CASB solutions focus only on apps accessible via HTTP\/S, so they miss non-SaaS and non-web apps that account for over half of all enterprise traffic. They rely on static databases and support requests for app discovery, hindering their ability to identify or contain new SaaS apps before they are a risk. They also lack APIs to secure collaboration applications heavily utilized by hybrid workforces, Oswal stated.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>The Next Generation CASB within Prisma Cloud addresses those concerns and uses Palo Alto\u2019s global network of 80,000 customers with millions of sensors across SaaS, IaaS, endpoint, network and Unit 42 research to help stop known, unknown, and zero-day threats, Oswal stated. The CASB has also been integrated into the vendor&#8217;s <a href=\"https:\/\/www.networkworld.com\/article\/3633652\/palo-alto-shapes-sase-package-for-hybrid-enterprises.html\">Prisma SASE<\/a> package.<\/p>\n<p>Beyond Prisma, Palo Alto rolled out the first specialization offering for its NextWave Managed Service Program (MSP). The NextWave MSP is made up of about &nbsp;300 partners who integrate, support and help manage Palo Alto security services.<\/p>\n<p>The specialization brings support for Palo Alto\u2019s Cortex eXtended Managed Detection and Response (XMDR) service which offers network, endpoint and cloud data security.<\/p>\n<p>The Cortex XMDR Specialization will let partners worldwide combine Cortex XDR, with their managed-services offerings to help customers streamline security operations center (SOC) operations and quickly mitigate cyber threats, Palo Alto stated.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<\/aside>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3640545\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nPalo Alto Networks has bolstered its security software to better protect \u00a0enterprise Software-as-a-Service (SaaS) applications.The company rolled out a new version of its core cloud-security package, Prisma Cloud 3.0, which includes the ability to code security directly into SaaS applications. The package includes a cloud-access security broker (CASB) to control access to cloud resources.[Get regularly scheduled insights by signing up for Network World newsletters.]<br \/>\nPrisma is a cloud-based security bundle that includes access control, advanced threat protection, user-behavior monitoring, and other services that promise to protect enterprise applications and resources. Managed through a single console, Prisma includes firewall as a service, Zero Trust network access and a secure web gateway.\u00a0To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43955,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[536,307],"class_list":["post-43954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-security","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Palo Alto software advances end-to-end enterprise cloud security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Palo Alto software advances end-to-end enterprise cloud security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-16T19:48:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2021\/10\/3-ways-to-use-cis-cloud-security-resources-on-the-aws-cloud-100905673-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Palo Alto software advances end-to-end enterprise cloud security\",\"datePublished\":\"2021-11-16T19:48:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg\",\"keywords\":[\"Cloud Security\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\",\"name\":\"Palo Alto software advances end-to-end enterprise cloud security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg\",\"datePublished\":\"2021-11-16T19:48:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cloud-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Palo Alto software advances end-to-end enterprise cloud security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Palo Alto software advances end-to-end enterprise cloud security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Palo Alto software advances end-to-end enterprise cloud security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-16T19:48:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2021\/10\/3-ways-to-use-cis-cloud-security-resources-on-the-aws-cloud-100905673-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Palo Alto software advances end-to-end enterprise cloud security","datePublished":"2021-11-16T19:48:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/"},"wordCount":718,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg","keywords":["Cloud Security","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/","url":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/","name":"Palo Alto software advances end-to-end enterprise cloud security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg","datePublished":"2021-11-16T19:48:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/palo-alto-software-advances-end-to-end-enterprise-cloud-security.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/palo-alto-software-advances-end-to-end-enterprise-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-security\/"},{"@type":"ListItem","position":3,"name":"Palo Alto software advances end-to-end enterprise cloud security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43954"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43955"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}