Épisodes

  • Human in the Loop for AI Security
    Sep 18 2025
    Discover how to secure generative AI beyond the model itself in this episode of Threat Vector. Host David Moulton welcomes Bret Kinsella, GM of Fuel iX and founder of Voicebot.ai and Synthedia. Bret brings deep expertise in enterprise AI and synthetic media. He explores the hidden dangers of shadow AI, where employees use consumer AI tools with sensitive data, and explains the risks of data leakage, vectorized document stores, and hallucination. Bret recommends system-level testing, human in the loop governance, guardrails, and scalable frameworks to manage AI safely. Learn why it is not enough to test just the model, and how a holistic approach helps professionals stay resilient in an evolving threat landscape. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
    Voir plus Voir moins
    36 min
  • Inside AI Runtime Defense
    Sep 10 2025
    In this episode of Threat Vector, host David Moulton, Director of Thought Leadership for Unit 42, speaks with Spencer Thellmann, Principal Product Manager at Palo Alto Networks. Spencer brings a background in AI policy from the University of Cambridge and now leads development of real-time AI runtime security solutions. Together, they explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. Topics include prompt injection, model scanning, red teaming, agent posture control, and how AI changes cloud security architecture. Listeners will take away key mental models and practical guidance for building resilient, trustworthy AI systems. Explore More on AI Security and Strategy Defending in the AI Era: Learn how to protect your enterprise from the new threat landscape shaped by AI. Cybersecurity Perspectives Magazine: Stay ahead of the trends reshaping enterprise defense, including AI, cloud, and workforce security. Unit 42 Threat Frontier: Explore cutting-edge threat intelligence and research from Unit 42. Want more Threat Vector? Securing AI in the Enterprise with Tanya Shastri and Navneet Singh explores how to architect AI securely from the start. Enhancing Ethical Hacking with AI with Ryan Barger dives into offensive applications of AI in red teaming. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
    Voir plus Voir moins
    34 min
  • Securing the Future of AI Agents
    Sep 4 2025
    AI agents are no longer a distant future concept. They have arrived, and the pace of their deployment is accelerating rapidly. In this episode of Threat Vector, David Moulton speaks with Nicole Nichols, Distinguished Engineer for Machine Learning Security at Palo Alto Networks. Nicole breaks down her new paper, Achieving a Secure AI Agent Ecosystem, where she outlines three foundational pillars for defending emerging agent-based systems: protecting agents from third-party compromise, ensuring user alignment, and guarding against malicious agents. With deep expertise spanning academia and industry, Nicole brings clarity on why structured collaboration, component provenance, and rigorous evaluation are essential for deploying autonomous AI safely. For listeners looking to dive deeper into securing AI-driven environments, Palo Alto Networks offers a range of valuable resources: Secure AI by Design, part of the Precision AI portfolio, offering complete AI security coverage from model development to runtime protection AI Access Security, delivering visibility, access control, and data protection for generative AI applications Cyberpedia: AI Security, a guide to understanding AI security practices, challenges, and strategies Nicole also shares candid perspectives on what still needs to be built, from containment strategies to community-driven security protocols. If you are serious about securing the next era of autonomous systems, this episode is your primer. Mentioned by Nicole: “Can LLMs Separate Instructions From Data? And What Do We Even Mean By That?” Sahar Abdelnabi, et al. Join the conversation on our social media channels: Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠ Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠ ⁠⁠@paloaltonetworks⁠ Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠⁠
    Voir plus Voir moins
    37 min
  • From Policy to Cyber Interference
    Aug 28 2025
    In this episode of Threat Vector, guest-host Michael Sikorski speaks with Thomas P. Bossert, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense that “interferes with attackers mid-operation.” Tom shares insights on how companies can shift from chasing ephemeral indicators to engaging with threat actors in encrypted traffic using active threat interference. We dive deep into the disconnect between policy rhetoric and real-world tech, why defensive action matters now, and how commercial cyber deterrence can work. Cyber leaders can expect a practical discussion on reshaping defense for today’s threat landscape. Join the conversation on our social media channels: Website:⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠ Threat Research:⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠ ⁠⁠@paloaltonetworks Twitter:⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠ ⁠http://paloaltonetworks.com⁠⁠
    Voir plus Voir moins
    34 min
  • Communicating Cyber Risk Effectively to Your Board
    Aug 21 2025
    In this episode of Threat Vector, host David Moulton speaks with Abby Adlerman, CEO of Boardspan, about how boards approach cybersecurity oversight. Drawing on decades of experience advising Fortune 100 companies and non-profits, Abby shares the OARS framework—Oversight, Accountability, Risk, and Strategy—as a practical guide for engaging boards on cyber risk. She explains how CISOs can balance detail with clarity, meet board members where they are, and frame cybersecurity as a strategic business enabler rather than a cost center. Listeners will learn how to prepare for meaningful board discussions, avoid common pitfalls, and strengthen business resilience through governance, storytelling, and crisis preparedness. Join the conversation on our social media channels: Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠ Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠ Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠ LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠ YouTube:⁠ ⁠@paloaltonetworks Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠⁠
    Voir plus Voir moins
    39 min
  • Designing Human-Centered Security Operations
    Aug 14 2025
    Security analysts are drowning in tools, alerts, and tabs. In this episode of Threat Vector, David Moulton, Senior Director of Thought Leadership for Unit 42, talks with Patrick Bayle, SecOps Consulting Manager, and Liz Pinder, SecOps Consultant, both with deep experience in Security Operations Centers. They explore how constant context switching impacts analyst performance, response time, and mental load. Hear how SOC leaders can design workflows that reduce noise, improve focus, and restore purpose with automation and unified platforms. It’s a must-listen for anyone building or managing a modern SOC. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
    Voir plus Voir moins
    40 min
  • Securing the Unsecurable: Inside the Black Hat NOC and Zero-Hour Resilience
    Aug 7 2025
    In this episode of Threat Vector, host David Moulton speaks with Jason Reverri, Manager of Technical Product Engineering for Cortex at Palo Alto Networks, and James Holland, Distinguished Engineer for Technology Innovation at Palo Alto Networks, about the unique challenge of defending Black Hat—one of the world’s most complex cybersecurity events. Related Resources: Black Hat NOC: Protecting One of the World’s Most Dangerous Networks - Deep dive into defending Black Hat’s billion-threat environment Palo Alto Networks Secures Black Hat from Itself - Behind-the-scenes look at NOC operations and threat hunting 8 Tips for Surviving Black Hat and Other Hostile Networks - Practical security advice from NOC veterans Security Operations Blog - Latest insights on AI-driven security operations and automation Cortex XSIAM Solution Overview - Learn about the AI-driven security operations platform Join the conversation on our social media channels: Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠ Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠ Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠ LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠ YouTube:⁠ ⁠@paloaltonetworks Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠⁠
    Voir plus Voir moins
    40 min
  • Speaking Security in Board Language
    Jul 31 2025
    Speaking Security in Board Language: How CISOs Can Elevate Cybersecurity from IT to Business Priority In this episode of Threat Vector, host David Moulton speaks with Nigel Hedges, Executive General Manager of Cyber and Risk at Chemist Warehouse, about transforming cybersecurity conversations at the executive level. Key Discussion Points: Reframe cyber as business risk: Nigel describes cyber as "technology-enabled business risk" rather than just a technology issue Master storytelling with analogies: Learn how to explain identity access management using train stations vs. stadiums, making complex concepts accessible to boards Focus on materiality: Nigel limits board presentations to 20 metrics maximum and advocates for 5 minutes of content plus 5 minutes for questions Measure engagement beyond clicks: Track not just phishing click rates, but employee reporting rates when they identify suspicious emails Build business relationships first: Spend your first 100 days understanding both cyber risks and meeting business unit leaders with the question "How can I help you?" What You'll Learn: How to connect cybersecurity priorities directly to business strategy using frameworks like NIST and Australia's Essential Eight Why listening skills and active questioning are critical soft skills for boardroom success Practical approaches to getting cybersecurity spending prioritized in annual budgets The importance of humor and team culture in building resilient security teams How to use frameworks like SABSA (Sherwood Applied Business Security Architecture) to map security to business outcomes Nigel brings perspectives from leading cybersecurity across retail (Kmart), professional services (CPA Australia), healthcare, and higher education, while maintaining his creative pursuits as a DJ and gamer. Related Resource: How to Become a Board Member? 4 Pointers for CIOs and CISOs - Additional insights on transitioning to board-level cybersecurity leadership Perfect for CISOs, security leaders, and executives looking to improve board communication and strategic alignment.
    Voir plus Voir moins
    35 min