Powered by RND
PodcastsTechnologiesThreat Vector by Palo Alto Networks

Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks
Threat Vector by Palo Alto Networks
Dernier épisode

Épisodes disponibles

5 sur 89
  • Inside AI Runtime Defense
    In this episode of Threat Vector, host David Moulton, Director of Thought Leadership for Unit 42, speaks with Spencer Thellmann, Principal Product Manager at Palo Alto Networks. Spencer brings a background in AI policy from the University of Cambridge and now leads development of real-time AI runtime security solutions. Together, they explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. Topics include prompt injection, model scanning, red teaming, agent posture control, and how AI changes cloud security architecture. Listeners will take away key mental models and practical guidance for building resilient, trustworthy AI systems. Explore More on AI Security and Strategy Defending in the AI Era: Learn how to protect your enterprise from the new threat landscape shaped by AI. Cybersecurity Perspectives Magazine: Stay ahead of the trends reshaping enterprise defense, including AI, cloud, and workforce security. Unit 42 Threat Frontier: Explore cutting-edge threat intelligence and research from Unit 42. Want more Threat Vector? Securing AI in the Enterprise with Tanya Shastri and Navneet Singh explores how to architect AI securely from the start. Enhancing Ethical Hacking with AI with Ryan Barger dives into offensive applications of AI in red teaming. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
    --------  
    34:13
  • Securing the Future of AI Agents
    AI agents are no longer a distant future concept. They have arrived, and the pace of their deployment is accelerating rapidly. In this episode of Threat Vector, David Moulton speaks with Nicole Nichols, Distinguished Engineer for Machine Learning Security at Palo Alto Networks. Nicole breaks down her new paper, Achieving a Secure AI Agent Ecosystem, where she outlines three foundational pillars for defending emerging agent-based systems: protecting agents from third-party compromise, ensuring user alignment, and guarding against malicious agents. With deep expertise spanning academia and industry, Nicole brings clarity on why structured collaboration, component provenance, and rigorous evaluation are essential for deploying autonomous AI safely. For listeners looking to dive deeper into securing AI-driven environments, Palo Alto Networks offers a range of valuable resources: Secure AI by Design, part of the Precision AI portfolio, offering complete AI security coverage from model development to runtime protection AI Access Security, delivering visibility, access control, and data protection for generative AI applications Cyberpedia: AI Security, a guide to understanding AI security practices, challenges, and strategies Nicole also shares candid perspectives on what still needs to be built, from containment strategies to community-driven security protocols. If you are serious about securing the next era of autonomous systems, this episode is your primer. Mentioned by Nicole:  “Can LLMs Separate Instructions From Data? And What Do We Even Mean By That?” Sahar Abdelnabi, et al. Join the conversation on our social media channels: Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠ Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠ ⁠⁠@paloaltonetworks⁠ Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠⁠
    --------  
    36:37
  • From Policy to Cyber Interference
    In this episode of Threat Vector, guest-host Michael Sikorski speaks with Thomas P. Bossert, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense that “interferes with attackers mid-operation.” Tom shares insights on how companies can shift from chasing ephemeral indicators to engaging with threat actors in encrypted traffic using active threat interference. We dive deep into the disconnect between policy rhetoric and real-world tech, why defensive action matters now, and how commercial cyber deterrence can work. Cyber leaders can expect a practical discussion on reshaping defense for today’s threat landscape. Join the conversation on our social media channels: Website:⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠ Threat Research:⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠ ⁠⁠@paloaltonetworks Twitter:⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠ ⁠http://paloaltonetworks.com⁠⁠
    --------  
    33:30
  • Communicating Cyber Risk Effectively to Your Board
    In this episode of Threat Vector, host David Moulton speaks with Abby Adlerman, CEO of Boardspan, about how boards approach cybersecurity oversight. Drawing on decades of experience advising Fortune 100 companies and non-profits, Abby shares the OARS framework—Oversight, Accountability, Risk, and Strategy—as a practical guide for engaging boards on cyber risk. She explains how CISOs can balance detail with clarity, meet board members where they are, and frame cybersecurity as a strategic business enabler rather than a cost center. Listeners will learn how to prepare for meaningful board discussions, avoid common pitfalls, and strengthen business resilience through governance, storytelling, and crisis preparedness. Join the conversation on our social media channels: Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠ Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠ Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠ LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠ YouTube:⁠ ⁠@paloaltonetworks Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠⁠
    --------  
    39:14
  • Designing Human-Centered Security Operations
    Security analysts are drowning in tools, alerts, and tabs. In this episode of Threat Vector, David Moulton, Senior Director of Thought Leadership for Unit 42, talks with Patrick Bayle, SecOps Consulting Manager, and Liz Pinder, SecOps Consultant, both with deep experience in Security Operations Centers. They explore how constant context switching impacts analyst performance, response time, and mental load. Hear how SOC leaders can design workflows that reduce noise, improve focus, and restore purpose with automation and unified platforms. It’s a must-listen for anyone building or managing a modern SOC. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
    --------  
    40:16

Plus de podcasts Technologies

À propos de Threat Vector by Palo Alto Networks

Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
Site web du podcast

Écoutez Threat Vector by Palo Alto Networks, Tech&Co, la quotidienne ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités
Applications
Réseaux sociaux
v7.23.7 | © 2007-2025 radio.de GmbH
Generated: 9/13/2025 - 11:45:47 PM