

Threat Vector by Palo Alto Networks
Palo Alto Networks and N2K Networks
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next.Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
Episodes
Mentioned books

Feb 27, 2025 • 36min
10,000 Days in Cybersecurity
Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, shares nearly 30 years of invaluable experience in the cybersecurity realm. He delves into how cybersecurity has transformed over the past 10,000 days, addressing the rise of AI-driven threats and the shift toward zero trust strategies. Haider emphasizes the urgent need for collaboration between security leaders and the integration of cybersecurity in digital transformation. He also highlights platformization as a key to enhancing resilience in today’s fast-paced threat landscape.

Feb 20, 2025 • 36min
Transform Your SOC And Get Ahead Of The Threats
Clay Brothers, a Senior Director at Palo Alto Networks' Unit 42, shares his expertise on transforming Security Operations Centers amidst evolving threats. He emphasizes the necessity of integrating AI and automation to enhance threat detection and response. The conversation dives into real-world examples of SOC modernization, highlighting the shift from manual processes to automated solutions. Clay advocates for proactive risk assessments, showcasing how to build cyber resilience and future-proof security operations against sophisticated cyber challenges.

Feb 13, 2025 • 36min
Unlocking Cybersecurity ROI with Platformization
Mark Hughes, Global Managing Partner of Cybersecurity Services at IBM, and Karim Temsamani, President of Next Generation Security at Palo Alto Networks, dive into the critical topic of cybersecurity platformization. They reveal how integrating security solutions can slash incident detection times by 72 days and amplify ROI by four times. The conversation emphasizes the necessity for organizations to simplify their toolsets and leverage AI to bolster security measures. Moreover, they highlight the urgency of translating cybersecurity risks into language executives can understand for better decision-making.

Feb 9, 2025 • 25min
LIVE! From Philly
Dive into the world of podcasting and cybersecurity with insights from a live session in Philly. Discover the essential elements of creating high-quality podcast experiences, from sound quality to effective guest preparation. Learn about transformative stories that interweave personal experiences with innovative tech in healthcare. Explore the balance between creativity and structure in audience engagement, and witness the importance of experimentation in marketing, ensuring your content evolves alongside audience needs.

12 snips
Feb 6, 2025 • 35min
Rethinking Cloud Security Strategies
Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, dives into the complexities of cloud security. He discusses how platformization is reshaping security strategies, making them more integrated and proactive. The conversation highlights AI's transformative role in threat detection, as well as the need for security leaders to dismantle silos and empower DevOps. Mathur also shares insights on optimizing security for organizations of all sizes and the importance of automation in enhancing efficiency.

Jan 31, 2025 • 23min
Inside DeepSeek’s Security Flaws
Join Sam Rubin, SVP of Unit 42 Consulting, and Kyle Wilhoit, Director of Threat Research, as they delve into the security vulnerabilities of the DeepSeek AI model. They discuss cutting-edge jailbreaking techniques like 'Bad Liker Judge' and 'Deceptive Delight,' exposing risks of harmful content generation. The conversation emphasizes the importance of understanding these vulnerabilities, especially for non-technical users, and advocates for rigorous testing before deploying AI tools in organizations to ensure data integrity and security.

Jan 30, 2025 • 28min
Inside the Mind of State-Sponsored Cyberattackers
In this captivating episode of Threat Vector, David Moulton, Director of Thought Leadership for Unit 42, sits down with Lior Rochberger, Principal Threat Researcher at Palo Alto Networks, to uncover the secrets of Operation Diplomatic Specter—a cutting-edge cyber espionage campaign targeting government entities in the Middle East, Africa, and Asia.Lior brings nearly a decade of experience in malware analysis, reverse engineering, and proactive threat hunting to the table. Together, they explore the advanced tactics employed by state-sponsored attackers, including rare, never-before-seen techniques designed to infiltrate and exploit critical networks.This episode digs into the geopolitical factors driving these attacks, the mistakes organizations make when defending against APTs, and actionable strategies to bolster cyber defenses. Lior also reveals her personal journey into threat research, sharing what it feels like to expose and dismantle these sophisticated campaigns.If you’re curious about how modern espionage campaigns are evolving—and what it takes to stop them—this episode is a must-listen.Join the conversation on our social media channels:
Website: http://www.paloaltonetworks.com
Threat Research: https://unit42.paloaltonetworks.com/
Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/
LinkedIn: https://www.linkedin.com/company/palo-alto-networks/
YouTube: @paloaltonetworks
Twitter: https://twitter.com/PaloAltoNtwks
About Threat VectorThreat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.Palo Alto NetworksPalo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com

Jan 23, 2025 • 49min
The ABCs of IOT Cybersecurity
Dr. Mei Wang, CTO of IoT Security at Palo Alto Networks, is a pioneer in AI-driven IoT security solutions. In their conversation, she discusses the staggering growth of IoT devices and the security challenges they present, especially in healthcare. Dr. Wang highlights how AI is pivotal in enhancing security frameworks and managing vulnerabilities across diverse industries. She also delves into the risks of deepfakes and the integration of 5G, urging organizations to adapt proactively to the evolving cybersecurity landscape.

Jan 16, 2025 • 27min
Crisis in the Kitchen: Unraveling a Malware Incident
Patrick Wright, Forensic and Incident Response Lead at BP, discusses a malware incident that infiltrated a kitchen management system at a coffee retailer. He details the surprising operational challenges faced when the team decided to disconnect the system to mitigate risks. The conversation also uncovers the complexities of conducting forensic investigations under pressure. Wright emphasizes the necessity of individual awareness and proactive measures in combating cyber threats, making a strong case for increased vigilance across all levels of an organization.

Jan 9, 2025 • 38min
Dangers of Cloud Misconfigurations
In this discussion, Margaret Kelley, a Senior Consultant at Palo Alto Networks’ Unit 42, dives deep into the world of cloud security. She highlights the critical dangers posed by cloud misconfigurations that often lead to breaches. Real-world examples illustrate how attackers exploit these vulnerabilities. Margaret also clarifies the shared responsibility model between organizations and cloud providers. Listeners gain practical strategies to tighten cloud defenses, manage permissions effectively, and stay ahead of emerging threats.


