Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Home/CyberSecurity News/Palo Alto Networks Completes CyberArk Identity Security Acquisition
CyberSecurity News

Palo Alto Networks Completes CyberArk Identity Security Acquisition

Palo Alto Networks has completed its acquisition of CyberArk, a leading identity security firm, in a $25 billion deal. The transaction, announced on February 11, 2026, strategically positions...

Emy Elsamnoudy
Emy Elsamnoudy
February 16, 2026 2 Min Read
0 0

Palo Alto Networks has completed its acquisition of CyberArk, a leading identity security firm, in a $25 billion deal. The transaction, announced on February 11, 2026, strategically positions identity security as a foundational element of the company’s platform strategy, particularly amid rising AI-driven threats.

The deal addresses the escalating role of identities in cyberattacks, where machine identities outnumber human ones by over 80 to 1, and 75% of organizations rely on outdated privilege models.

Nearly 90% of enterprises have faced identity-related breaches, with credential abuse as the top vector. By integrating CyberArk’s platform, Palo Alto Networks aims to extend privileged access controls to all identities, human, machine, and emerging AI agents, reducing standing privileges and accelerating breach responses by up to 80%.

Palo Alto Networks and CyberArk

CyberArk’s solutions remain available standalone while integration into Palo Alto’s ecosystem begins, promising no disruptions for existing users and an enhanced roadmap for efficiency and resilience.

This acquisition eliminates identity silos, enabling unified management across hybrid cloud environments alongside network security and operations tools. Customers gain comprehensive protection tailored for the AI era, where autonomous agents demand robust privilege controls.

Nikesh Arora, Chairman and CEO of Palo Alto Networks, emphasized the strategic timing: “The emerging wave of AI agents will require us to secure every identity, human, machine, and agent.” He highlighted ending silos for trusted, end-to-end security. Matt Cohen, CyberArk’s CEO, called it a “win-win,” blending portfolios to halt identity-driven attacks and fueling innovation.

Shareholders receive $45 in cash and 2.2005 Palo Alto shares for each CyberArk ordinary share, marking Palo Alto’s largest acquisition. The company plans a secondary listing on the Tel Aviv Stock Exchange under the “CYBR” ticker, honoring CyberArk’s Israeli roots and supporting its largest non-Silicon Valley R&D hub. Palo Alto’s Q2 FY2026 earnings call is set for February 17, 2026, at 1:30 p.m. PT.

This move cements Palo Alto’s leadership across network, cloud, operations, AI, and now identity security, serving over 70,000 customers via AI-powered platforms and Unit 42 intelligence.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

LockBit 5.0 Ransomware Attacks Windows, Linux LockBit’s Version

Next Post

Hackers Exploit AI Summarize Buttons for Weaponize AI’

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us