Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks
undefined
Sep 10, 2025 • 34min

Inside AI Runtime Defense

In this episode of Threat Vector, host David Moulton, Director of Thought Leadership for Unit 42, speaks with Spencer Thellmann, Principal Product Manager at Palo Alto Networks. Spencer brings a background in AI policy from the University of Cambridge and now leads development of real-time AI runtime security solutions. Together, they explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. Topics include prompt injection, model scanning, red teaming, agent posture control, and how AI changes cloud security architecture. Listeners will take away key mental models and practical guidance for building resilient, trustworthy AI systems. Explore More on AI Security and Strategy Defending in the AI Era: Learn how to protect your enterprise from the new threat landscape shaped by AI. Cybersecurity Perspectives Magazine: Stay ahead of the trends reshaping enterprise defense, including AI, cloud, and workforce security. Unit 42 Threat Frontier: Explore cutting-edge threat intelligence and research from Unit 42. Want more Threat Vector? Securing AI in the Enterprise with Tanya Shastri and Navneet Singh explores how to architect AI securely from the start. Enhancing Ethical Hacking with AI with Ryan Barger dives into offensive applications of AI in red teaming. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
undefined
Sep 4, 2025 • 37min

Securing the Future of AI Agents

AI agents are no longer a distant future concept. They have arrived, and the pace of their deployment is accelerating rapidly. In this episode of Threat Vector, David Moulton speaks with Nicole Nichols, Distinguished Engineer for Machine Learning Security at Palo Alto Networks. Nicole breaks down her new paper, Achieving a Secure AI Agent Ecosystem, where she outlines three foundational pillars for defending emerging agent-based systems: protecting agents from third-party compromise, ensuring user alignment, and guarding against malicious agents. With deep expertise spanning academia and industry, Nicole brings clarity on why structured collaboration, component provenance, and rigorous evaluation are essential for deploying autonomous AI safely. For listeners looking to dive deeper into securing AI-driven environments, Palo Alto Networks offers a range of valuable resources: Secure AI by Design, part of the Precision AI portfolio, offering complete AI security coverage from model development to runtime protection AI Access Security, delivering visibility, access control, and data protection for generative AI applications Cyberpedia: AI Security, a guide to understanding AI security practices, challenges, and strategies Nicole also shares candid perspectives on what still needs to be built, from containment strategies to community-driven security protocols. If you are serious about securing the next era of autonomous systems, this episode is your primer. Mentioned by Nicole:  “Can LLMs Separate Instructions From Data? And What Do We Even Mean By That?” Sahar Abdelnabi, et al. Join the conversation on our social media channels: Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠ Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠ ⁠⁠@paloaltonetworks⁠ Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠⁠
undefined
Aug 28, 2025 • 34min

From Policy to Cyber Interference

In a dynamic discussion, Thomas P. Bossert, President of Trinity Cyber and former Homeland Security Advisor, reveals the importance of proactive threat interference. He emphasizes how companies can engage directly with threat actors rather than passively defending against cyberattacks. The conversation dives into the disconnect between cybersecurity policy and real-world technology, the necessity for strategic frameworks, and the critical role of nonpartisan cooperation in fortifying defenses against evolving threats. Bossert's insights aim to reshape the cybersecurity landscape.
undefined
Aug 21, 2025 • 39min

Communicating Cyber Risk Effectively to Your Board

In this episode of Threat Vector, host David Moulton speaks with Abby Adlerman, CEO of Boardspan, about how boards approach cybersecurity oversight. Drawing on decades of experience advising Fortune 100 companies and non-profits, Abby shares the OARS framework—Oversight, Accountability, Risk, and Strategy—as a practical guide for engaging boards on cyber risk. She explains how CISOs can balance detail with clarity, meet board members where they are, and frame cybersecurity as a strategic business enabler rather than a cost center. Listeners will learn how to prepare for meaningful board discussions, avoid common pitfalls, and strengthen business resilience through governance, storytelling, and crisis preparedness. Join the conversation on our social media channels: Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠ Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠ Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠ LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠ YouTube:⁠ ⁠@paloaltonetworks Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠⁠
undefined
10 snips
Aug 14, 2025 • 40min

Designing Human-Centered Security Operations

Liz Pinder, a Systems Engineer Specialist at Palo Alto Networks, and Patrick Bayle, a SecOps Consulting Manager with nearly two decades in cybersecurity, dive deep into the challenges faced by Security Operations Centers (SOCs). They discuss the detrimental effects of context switching on analyst productivity and mental health. The pair explores the critical role of automation in enhancing incident response and the need for collaboration through innovative validation practices. Their insights offer invaluable strategies for modernizing SOC workflows and alleviating cognitive overload.
undefined
Aug 7, 2025 • 40min

Securing the Unsecurable: Inside the Black Hat NOC and Zero-Hour Resilience

In this episode of Threat Vector, host David Moulton speaks with Jason Reverri, Manager of Technical Product Engineering for Cortex at Palo Alto Networks, and James Holland, Distinguished Engineer for Technology Innovation at Palo Alto Networks, about the unique challenge of defending Black Hat—one of the world’s most complex cybersecurity events. Related Resources: Black Hat NOC: Protecting One of the World’s Most Dangerous Networks - Deep dive into defending Black Hat’s billion-threat environment Palo Alto Networks Secures Black Hat from Itself - Behind-the-scenes look at NOC operations and threat hunting 8 Tips for Surviving Black Hat and Other Hostile Networks - Practical security advice from NOC veterans Security Operations Blog - Latest insights on AI-driven security operations and automation Cortex XSIAM Solution Overview - Learn about the AI-driven security operations platform Join the conversation on our social media channels: Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠ Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠ Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠ LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠ YouTube:⁠ ⁠@paloaltonetworks Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠⁠
undefined
Jul 31, 2025 • 35min

Speaking Security in Board Language

Nigel Hedges, Executive General Manager of Cyber & Risk at Chemist Warehouse and Sigma Healthcare, dives into transforming cybersecurity into a business priority. He emphasizes the importance of aligning security strategies with enterprise goals and building trust with boards. Nigel discusses using storytelling to effectively communicate risks, bridging the gap between technical jargon and board-level conversations. He also highlights the value of team culture and creativity in fostering collaboration and resilience in cybersecurity initiatives.
undefined
Jul 26, 2025 • 36min

Muddled Libra: From Spraying to Preying in 2025

Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com
undefined
Jul 24, 2025 • 35min

Smart UX, Safer Systems

Join David Moulton and Nelson Lee as they explore the vital role of user experience (UX) in cybersecurity. Nelson, drawing from his background at Google and Apple, shares insights on how intuitive design can transform complex security challenges. The discussion highlights the impact of poor UX, using the Arcade platform as a prime example of successful design in incident response. They also delve into how AI and LLMs are set to revolutionize UX, simplifying interactions and enhancing security platforms. Discover how prioritizing UX leads to greater adoption and more effective security solutions. Join the conversation on our social media channels: Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Threat Research:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com⁠
undefined
Jul 17, 2025 • 39min

Frenemies With Benefits

Michael Daniel, President and CEO of the Cyber Threat Alliance, brings over two decades of public sector cybersecurity experience. He and Michael Sikorski explore how competing entities can collaborate in the cybersecurity arena. The discussion highlights the importance of real-time threat intelligence sharing, especially post-WannaCry. They delve into the ethical aspects of vulnerability disclosure and the evolving trust in public-private partnerships. Tune in for valuable insights on overcoming collaboration challenges to improve global cyber defenses.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app