{
	"id": "f3a54893-16b1-4452-9d33-82b8008672ee",
	"created_at": "2026-04-06T15:54:23.34317Z",
	"updated_at": "2026-04-10T13:11:26.604245Z",
	"deleted_at": null,
	"sha1_hash": "49027b4ced513a4ef22d4896b39a33a2057b3ea5",
	"title": "Palo Alto Networks - Sign In",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 111754,
	"plain_text": "By signing in, you agree to our Terms and acknowledge our Privacy Statement.\r\n©2026 Palo Alto Networks, Inc. All rights reserved.\r\nCOMPANY\r\nAbout Palo Alto Networks\r\nCareers\r\nLEGAL NOTICES\r\nPrivacy\r\nTerms of Use\r\nRESOURCES\r\nSupport\r\nLive Community\r\nEmail Subscription\r\nBeacon\r\nhttps://live.paloaltonetworks.com/t5/Ignite-2016-Blog/Breakout-Recap-Cybersecurity-Best-Practices-Part-1-Preventing/ba-p/75913\r\nPage 1 of 1\n\nhttps://live.paloaltonetworks.com/t5/Ignite-2016-Blog/Breakout-Recap-Cybersecurity-Best-Practices-Part-1-Preventing/ba-p/75913    \nBy signing in, you agree to our Terms and acknowledge our Privacy Statement. \n  COMPANY LEGAL NOTICES RESOURCES\n  About Palo Alto Networks Privacy Support\n  Careers Terms of Use Live Community\n    Email Subscription\n    Beacon\n©2026 Palo Alto Networks, Inc. All rights reserved.   \n  Page 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://live.paloaltonetworks.com/t5/Ignite-2016-Blog/Breakout-Recap-Cybersecurity-Best-Practices-Part-1-Preventing/ba-p/75913"
	],
	"report_names": [
		"75913"
	],
	"threat_actors": [],
	"ts_created_at": 1775490863,
	"ts_updated_at": 1775826686,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/49027b4ced513a4ef22d4896b39a33a2057b3ea5.pdf",
		"text": "https://archive.orkl.eu/49027b4ced513a4ef22d4896b39a33a2057b3ea5.txt",
		"img": "https://archive.orkl.eu/49027b4ced513a4ef22d4896b39a33a2057b3ea5.jpg"
	}
}