Ctrl + Alt + Delusion: Too Many Secrets — Revisiting “Sneakers” 33 Years Later

Ctrl + Alt + Delusion: Too Many Secrets — Revisiting “Sneakers” 33 Years Later

When cybersecurity meets Hollywood — three decades later.

AI’s Front Door: Why the Browser Is Your Most Critical Control Point

The browser is AI’s unlocked front door — and your biggest risk.

Why the AI Arms Race Can Only Be Won with Mission-Driven Talent

Winning the AI arms race isn’t about tech; it’s about people.

The Next Great Cybersecurity Threat: Agentic AI

How AI has moved into an active participant in our digital world.
WHAT'S NEXT
WEBINAR

Reimagine your industry, energize the world.

Explore what's possible
EVENT
WEBINAR

Be Our Guest!

Join us at locations around the globe for insights, demos and more.
Find a city near you
MAGAZINE
WEBINAR

For Executives, By Executives

The definitive quarterly magazine for cybersecurity innovators.
Get the magazine

The Year Ahead: What Will Become the 3 Pillars of Trust in an AI-First World?

See why trust is the most valuable asset on your balance sheet.

All About A.I.

The Next Great Cybersecurity Threat: Agentic AI

How AI has moved into an active participant in our digital world.

Is Your AI Well-Engineered Enough to Be Trusted?

A well-engineered system should be the prerequisite for any AI.

The AI Imperative: Security Designed for Trust, Control and Cooperation

The case for a new pact of AI trust, control and cooperation.

The Future of AI in Cybersecurity in a Word: Optimistic

How AI is transforming cybersecurity and outpacing emerging threats.

How AI Will Forge the Next Generation of Cybersecurity Talent

Artificial intelligence won't replace cyber talent; it will empower it.

From the Editor

Ctrl + Alt + Delusion: Crashing the Mainframe with “Hackers” at Age 30

Ctrl + Alt + Delusion: Crashing the Mainframe with “Hackers” at Age 30

Revisiting the cult classic “Hackers” 30 years later.
Ctrl + Alt + Delusion: “The Net” 30 Years Later

Ctrl + Alt + Delusion: “The Net” 30 Years Later

Revisiting “The Net”: What the ’90s thriller got right (and wrong).
Beyond the Backlog: Escaping Application Security Debt with ASPM

“For years, the model of finding issues in production and adding them to a remediation list has defined the industry...This model is fundamentally broken. ”

Sarit Tager
VP of Product Management, Cortex Cloud, Palo Alto Networks
Explore the Solution

Podcasts

Press play on next-level intelligence
Listen to expert voices discuss trends and topics
Get every episode
Explore Palo Alto Networks TV
Your Remote Control
Hello, Tomorrow

Transforming Cybersecurity with AI

CIO to CIO

Effectively securing AI

CIO to CIO
Biggest cyber security challenge?

Founder & CTO Nir Zuk

Biggest cyber security challenge?
Unit 42 perspective

What to know about incident response

Unit 42 perspective
CIO to CIO

Evaluating AI capabilities

CIO to CIO
Enterprise AI cybersecurity

What every CIO should know

Enterprise AI cybersecurity
Explore Palo Alto Networks TV
Your Remote Control
Hello, Tomorrow
Hello, Tomorrow
Transforming Cybersecurity with AI
CIO to CIO
CIO to CIO
Effectively securing AI
Biggest cyber security challenge?
Biggest cyber security challenge?
Founder & CTO Nir Zuk
Unit 42 perspective
Unit 42 perspective
What to know about incident response
CIO to CIO
CIO to CIO
Evaluating AI capabilities
Enterprise AI cybersecurity
Enterprise AI cybersecurity
What every CIO should know

Secure your future with powerful resources

Three Principles of Data Security in the AI Era

Three Principles of Data Security in the AI Era

Using AI as a defense for data prevention and threat detection.
Why Resilience—Not Prevention—Should Be Your Cybersecurity Goal

Why Resilience—Not Prevention—Should Be Your Cybersecurity Goal

Cyber resilience ensures fast attack recovery, minimizing damage.
Inside the Mind of State-Sponsored Cyberattackers

Inside the Mind of State-Sponsored Cyberattackers

Uncover the secrets of a cyber espionage campaign targeting government entities.
Mastering the Basic: Cyber Hygiene and Risk Management

Mastering the Basic: Cyber Hygiene and Risk Management

Strengthen cyber hygiene and positively boost your cybersecurity resilience.
The Future of Cybersecurity with Nir Zuk

The Future of Cybersecurity with Nir Zuk

How machine learning is reshaping cybersecurity defense.
STAY CONNECTED

Connect with our team today