American technology company
POPULARITY
Categories
What separates organizations that pass audits from those that survive real incidents? In this episode of The Segment, host Raghu Nandakumara sits down with Phil Park, global cybersecurity and risk leader at IBM. With more than 25 years advising financial institutions across the U.S., Europe, and Asia-Pacific, Phil brings a practical perspective on how supervision is rapidly evolving from compliance checklists to real-world operational readiness. Together, Raghu and Phil unpack the industry's biggest mindset shift: regulators no longer ask “Are you protected?” — they ask “Can you operate through disruption?” They explore why prevention alone is no longer enough, why containment and recovery now define security maturity, and how CISOs are moving from siloed operators to enterprise-wide risk leaders accountable to boards and regulators alike. The conversation also dives into: Why regulators evaluate response quality rather than technical perfection How organizations are turning tabletop exercises into realistic resilience testing The growing pressure created by third-party and supply-chain dependencies Why evidence and outcomes matter more than policies and frameworks How overlapping reporting requirements are reshaping incident response playbooks The double-edged role of AI in both defense and attack, including deepfake risks Why security fundamentals matter even more in the AI era This episode is a must-listen for security leaders and executives navigating a world where passing the audit is no longer the goal — proving you can withstand disruption is. Also, if you're attending FSISAC, join Illumio, IBM, and Palo Alto Networks for an exclusive dinner at Capital Grille! Save your seat here: https://lp.illumio.com/20260302-Steak-And-Security-Dinner.html?utm_medium=email&utm_source=marketo
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
AI momentum is accelerating, but real-world constraints are tightening. From hyperscaler infrastructure lock-ins and sovereign AI expansion to RAM shortages and enterprise AI pivots, Ep. 293 examines what truly determines leadership in the next phase of AI. The handpicked topics for this week are: Meta & NVIDIA's Long-Term AI Infrastructure Partnership: Meta confirmed a deep infrastructure expansion across NVIDIA Blackwell and Rubin GPUs, Grace CPUs, and advanced networking. Pat & Dan discuss hyperscaler AI factories, overflow capacity strategies, and long-term compute commitments. Microsoft's Global South and Sovereign AI Expansion: As Microsoft continues major investment across India and emerging markets, the hosts explore sovereign cloud strategy, geopolitical positioning, and how global AI infrastructure buildouts shape long-term competitiveness. California AI Oversight and Regulatory Fragmentation Risk: State-level AI oversight initiatives raise concerns about a patchwork regulatory environment that could slow U.S. innovation relative to centralized global competitors. The HBM Memory Crunch and Long-Term Supply Constraints: High-Bandwidth Memory shortages continue to shape AI deployment timelines. Relief may not arrive until late this decade, with downstream impacts on data centers, PCs, and consumer devices. Infosys & Anthropic GSI Pivot to Enterprise AI Agents: Infosys partners with Anthropic to accelerate enterprise AI agent deployment. Hosts examine whether global systems integrators can pivot fast enough in an agent-driven economy. The Flip – Models vs Infrastructure Leadership: Is AI dominance determined by model quality or infrastructure scale? Pat & Dan debate whether gigawatts or algorithmic efficiency define long-term advantage. Bulls & Bears – Cyber, Power, EDA, SaaS & AI Infrastructure Plays: Earnings and market signals across Palo Alto Networks, Analog Devices, Cadence, ServiceNow, Dell, and Marvell highlight how execution, supply chains, and capital discipline matter in this cycle. Be sure to subscribe to The Six Five Pod so you never miss an episode.
In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today's cyber landscape.They also explore the escalating AI arms race, including Meta's aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
Palo Alto Networks (PANW) is facing a volatile market, leading many to ask: is the "SaaS Apocalypse" finally hitting cybersecurity? We break down why the market is hammering the stock despite a clear secular growth trend in the industry.Since Nikesh Aurora took over in 2018, Palo Alto has spent $31 billion on multiple acquisitions to pivot from a simple firewall provider to a cloud and AI security powerhouse. We analyze the recent CyberArk deal, the shift in free cash flow margins, and why the company's platformization strategy is creating a longer payoff cycle for investors.If you are a PANW shareholder or looking for a value entry in cybersecurity, this video covers the essential valuation metrics.Join us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipSupercharge your analysis with AI! Get 15% of your membership with our special link here: https://fiscal.ai/csi/Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-formIf you found this video useful, please make sure to like and subscribe!*********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.#PaloAltoNetworks #PANW #Cybersecurity #Investing #StockMarket #TechStocks #AI #SaaS #CloudSecurityNick and Kasey own shares of PANW
As AI agents begin to outnumber humans 80 to one, who's truly accountable when things go wrong? In this episode, Host Suraksha P talks to Palo Alto Networks CEO Nikesh Arora about the noise on what securing an agentic future actually demands from mandatory agent registries to real-time breach detection that must outpace an eight-minute attack window. He challenges India to pursue a hybrid sovereign AI strategy, warns that AI companies are racing ahead without reckoning with consequences, and offers entrepreneurs a sharp directive: stop building features, start solving problems. The cybersecurity frontier, Arora argues, belongs to those who own the data.You can follow Suraksha P on her social media: X and Linkedin Check out other interesting episodes like: AI Impact Summit: Amazon's Bet on India's AI Future, Anthropic’s India Play, India AI Impact Summit: Microsoft’s Brad Smith on Sovereignty, Scale and Skills, and much more. Catch the latest episode of ‘The Morning Brief’ on The Economic Times Online, Spotify, Apple Podcasts, JioSaavn, Amazon Music and Youtube.See omnystudio.com/listener for privacy information.
One legend exits, a streaming war reignites, and AI redraws the market map - where should investors focus now? In this episode, hosted by Michelle Martin with Ryan Huang, we unpack Warren Buffett’s last portfolio reshuffle at Berkshire Hathaway - trimming Apple, Amazon and Bank of America while adding some well-known names. Berkshire has now been a net seller for 13 straight quarters - is the Oracle signalling caution at peak valuations? In media, Warner Bros Discovery’s $70B content deal with Netflix faces a last-minute push from Paramount - can it outbid and reshape the streaming battlefield? Tech leads markets higher as Nvidia inks a multi-year AI infrastructure deal with Meta, potentially squeezing Broadcom’s edge. In UP or DOWN, we size up Palo Alto Networks’ profit miss, Moderna’s FDA review reversal, and Yangzijiang Maritime’s proposed buyback. Back home, the STI reopens with CapitaLand Investment up while OCBC, DFI Retail and Hongkong Land lag - is Singapore ready to gallop into the Year of the Horse? Hear about Berkshire Hathaway, Apple, Amazon, Bank of America, New York Times, Domino’s Pizza, Chevron, Warner Bros Discovery, Netflix, Paramount, Nvidia, Meta, Broadcom, Palo Alto Networks, Moderna, Yangzijiang Maritime, CapitaLand Investment, OCBC, DFI Retail, Hongkong Land.See omnystudio.com/listener for privacy information.
On this week's show, Patrick Gray, Adam Boileau and James WIlson discuss the week's cybersecurity news. They cover: Palo Alto threat researchers want to attribute to China, but management says shush An increasing proportion of ransomware is data extortion. Is this good? Cambodia says it's going to dismantle scam compounds CISA sufferers through yet another shutdown Google Gemini's training secrets are being systematically harvested to improve other LLMs Academics assess SaaS password managers' resilience against a malicious server This episode is sponsored by SSO-firewall integration vendor Knocknoc. Chief exec Adam Pointon joins to talk about the latest in defences… which is to say Knocknoc for Solaris/Sparc and HPUX on PA-RISC?! Okay also that other little known OS… Windows. This episode is also available on Youtube. Show notes Data-only extortion grows as ransomware gangs seek better profits | Cybersecurity Dive Arctic Wolf Threat Report 2026 Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say Risky Bulletin: Cambodia promises to dismantle scam networks by April - Risky Business Media Age of the ‘scam state': how an illicit, multibillion-dollar industry has taken root in south-east Asia | Cybercrime | The Guardian Critical flaw in BeyondTrust Remote Support sees early signs of exploitation | Cybersecurity Dive CISA Navigates DHS Shutdown With Reduced Staff - SecurityWeek Kimwolf Botnet Swamps Anonymity Network I2P – Krebs on Security BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign — Elastic Security Labs Over 500,000 VKontakte accounts hijacked through malicious Chrome extensions | The Record from Recorded Future News Password managers' promise that they can't see your vaults isn't always true - Ars Technica Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers Google finds state-sponsored hackers use AI at 'all stages' of attack cycle | CyberScoop Google: Gemini hit with 100,000+ prompts in cloning attempt Proofpoint acquires Acuvity to tackle the security risks of agentic AI | CyberScoop Cisco Redefines Security for the Agentic Era with AI Defense Expansion and AI-Aware SASE Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organization Dave Kennedy on X: "Regarding this, there was a couple questions on does the pacemaker continue to advertise - most BLE implantable devices go into a sleep type mode. In this case, we are lucky - it does not. We know based on law enforcement answers that she is using a more modern pacemaker with" / X Clash Report on X: "BIG: Dutch Defence Minister Gijs Tuinman hints that software independence is possible for F-35 jets. He literally said you can “jailbreak” an F-35. When asked if Europe can modify it without US approval: “That's not the point… we'll see whether the Americans will show https://t.co/f11cGvtYsO" / X Dutch police arrest man who refused to delete confidential files shared by mistake | The Record from Recorded Future News
Carl Quintanilla, Jim Cramer and David Faber explored Wednesday's gains in the tech sector, one day after the Nasdaq snapped a four-session losing streak and Amazon ended nine consecutive days of losses. Meta expands its deal with Nvidia to purchase millions of chips from the world's most valuable company. The anchors also discussed the latest on Anthropic and the most dominant AI titans. Also in focus: Microsoft as this year's worst performer among the Magnificent 7, Palo Alto Networks slides, what Netflix Co-CEO Ted Sarandos told CNBC about regulatory issues and the company's offer to buy Warner assets, Oil rises on U.S.-Iran tensions, "Faber Report" on MSG Sports exploring a split of its New York Knicks and Rangers businesses. Squawk on the Street Disclaimer Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition's close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.Udi discusses what the combined companies' scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk's long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.Note: This episode was recorded in January, prior to the acquisition's close.
Fed minutes might provide insight on rate policy after Palo Alto Networks' results Tuesday failed to cheer tech traders. Caution remains elevated as rallies can't find traction.Important DisclosuresThis material is intended for general informational purposes only. This should not be considered an individualized recommendation or personalized investment advice. The investment strategies mentioned may not be suitable for everyone. Each investor needs to review an investment strategy for his or her own particular situation before making any investment decisions.The Schwab Center for Financial Research is a division of Charles Schwab & Co., Inc.All names and market data shown above are for illustrative purposes only and are not a recommendation, offer to sell, or a solicitation of an offer to buy any security. Supporting documentation for any claims or statistical information is available upon request.Past performance is no guarantee of future results.Diversification and rebalancing strategies do not ensure a profit and do not protect against losses in declining markets.Indexes are unmanaged, do not incur management fees, costs, and expenses and cannot be invested in directly. For more information on indexes, please see schwab.com/indexdefinitions.The policy analysis provided by the Charles Schwab & Co., Inc., does not constitute and should not be interpreted as an endorsement of any political party.Fixed income securities are subject to increased loss of principal during periods of rising interest rates. Fixed income investments are subject to various other risks including changes in credit quality, market valuations, liquidity, prepayments, early redemption, corporate events, tax ramifications, and other factors.All expressions of opinion are subject to change without notice in reaction to shifting market, economic or political conditions. Data contained herein from third party providers is obtained from what are considered reliable sources. However, its accuracy, completeness or reliability cannot be guaranteed.Investing involves risk, including loss of principal, and for some products and strategies, loss of more than your initial investment.Digital currencies [such as bitcoin] are highly volatile and not backed by any central bank or government. Digital currencies lack many of the regulations and consumer protections that legal-tender currencies and regulated securities have. Due to the high level of risk, investors should view digital currencies as a purely speculative instrument.Cryptocurrency-related products carry a substantial level of risk and are not suitable for all investors. Investments in cryptocurrencies are relatively new, highly speculative, and may be subject to extreme price volatility, illiquidity, and increased risk of loss, including your entire investment in the fund. Spot markets on which cryptocurrencies trade are relatively new and largely unregulated, and therefore, may be more exposed to fraud and security breaches than established, regulated exchanges for other financial assets or instruments. Some cryptocurrency-related products use futures contracts to attempt to duplicate the performance of an investment in cryptocurrency, which may result in unpredictable pricing, higher transaction costs, and performance that fails to track the price of the reference cryptocurrency as intended. Please read more about risks of trading cryptocurrency futures here.The Schwab Center for Financial Research is a division of Charles Schwab & Co., Inc.Apple Podcasts and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries.Google Podcasts and the Google Podcasts logo are trademarks of Google LLC.Spotify and the Spotify logo are registered trademarks of Spotify AB.(0128-0226) Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Nathaniel Bradley spotlights Palo Alto Networks (PANW) after earnings. The stock is trading down in Wednesday's session, which Bradley ascribes to its acquisition spree and integration pressures as a cybersecurity company especially needs to move slowly on its offerings. However, he believes “few can rival” PANW and highlights their annual recurring revenue. He sees the drop as a buying opportunity and thinks the company makes a “great, unabashed contribution” to cybersecurity.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Palo Alto Networks (PANW) posted a strong quarter in earnings but couldn't match that strength in its outlook. As Marley Kayden explains, recent acquisitions by the cybersecurity company cut into full year EPS and spooked investors. Analysts weren't as shaken, with some pointing to upsides thanks to AI tailwinds. Prosper Trading Academy's Charles Moon offers an example options trade for Palo Alto Networks. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Palo Alto Networks CEO Nikesh Arora discusses the company's revised forecast for 2026 and the impact of Palo Alto's recent acquisition of software company CyberArk. Arora spoke with Bloomberg's Ed Ludlow.See omnystudio.com/listener for privacy information.
En este episodio de VG Daily, Valentina Orduz y Andre Dos Santos revisan una sesión bursátil con índices casi planos, pero con tono claramente defensivo, tecnología y software bajo presión, utilities y real estate al alza, y tasas largas cerca de 4%.Luego analizan el reporte de Palo Alto Networks, donde el crecimiento de ingresos y utilidades contrasta con una guía de utilidades más débil por los costos de integrar varias adquisiciones en ciberseguridad e IA, en un contexto en el que el mercado castiga cualquier señal de presión en márgenes, mientras Meta firma un acuerdo multianual para comprar millones de chips de Nvidia y rediseñar sus data centers alrededor de su plataforma de cómputo de IA.Finalmente, conectan este entorno con la economía real a partir del recorte de guía de General Mills, que habla de la debilidad del consumidor y ve caídas en volúmenes en categorías básicas, y lo enmarcan dentro del patrón histórico del segundo año de un primer mandato republicano, típicamente más flojo para el S&P 500 en la primera parte del año.
In der heutigen Folge sprechen die Finanzjournalisten Lea Oetjen und Nando Sommerfeldt über einen Dämpfer für Qiagen, die 200-Milliarden-Dollar-Investitionen von Micron und ein weiteres Kapitel im Kampf um Warner Bros Discovery. Außerdem geht es um Vonovia, Aroundtown, Nvidia, Meta, Paramount Skydance, Netflix, Norwegian Cruise Line, Danaher, Masimo, Südzucker, Palo Alto Networks, Deutsche Telekom, Orange, Swisscom, AT&T, SAP, Alphabet, Amazon, Vodafone, Nokia, Ericsson und iShares STOXX Europe 600 Telecommunications (WKN: A0H08R). Wir freuen uns an Feedback über aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
Verden har fått helt nye trusler. Innen kunstig intelligens pågår et kappløp mellom land, selskap og ondsinnende angripere. Vinner eller taper vi? Hva er trusselbildet fremover? Sikkerhetsdirektøren i verdens største cybersikkerhetsselskap er dagens gjest i E24-podden. Med Wendi Whitmore, Chief Security Intelligence Officer, Palo Alto Networks. Programleder Sindre Heyerdahl og produsent Erik Holm-Nyvold. Ansvarlig redaktør Lars Håkon Grønning. Hør E24-podden der du hører podkast. Analyser, nyheter og innsikt i business og næringsliv. E24-podden ble i mai 2025 kåret til årets aktualitetspodkast under Medieprisene i Bergen.
I detta avsnitt av Palo Alto Networks podcast För Säkerhets Skull gästas podden av John Billow, chef för Nationellt Cybersäkerhetscenter (NCSC) som berättar om hur de suddiga gränserna mellan fred och geopolitisk konflikt har gjort en robust cybersäkerhet till själva hörnstenen i Sveriges totalförsvar. Han diskuterar cybersäkerhetens roll i det moderna svenska försvaret och hur tekniken förändrar spelplanen." Läs mer om hur du skyddar verksamheten mot moderna cyberhot: https://www.paloaltonetworks.com/engage/for-sakerhets-skull/ta-nk-om-sverig Detta är ett kommersiellt samarbete och inte en del av Di:s redaktionella innehåll.
With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It's also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today's sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »
With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It's also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today's sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »
How to Trade Stocks and Options Podcast by 10minutestocktrader.com
Are you looking to save time, make money, and start winning with less risk? Then head to https://www.ovtlyr.com.Everyone loves the idea of “insanely cheap stocks.” But what if that mindset is exactly what's wrecking portfolios?In this breakdown, we react to a popular video claiming five beaten-down stocks are screaming buys right now. The pitch sounds tempting. Big names like Microsoft, Shopify, Salesforce, SoFi, Palo Alto Networks, and Walmart trading at steep discounts. AI fears. Market panic. Fear and Greed Index swinging wildly. It all feels dramatic.But here's the hard truth: price direction is everything.This episode dives deep into market cycles, stage four downtrends, moving averages, and why buying the dip can quietly drain your account for months. A 44 percent drop does not mean easy upside. It means a massive climb just to break even. That math matters.You'll see real chart examples and powerful comparisons that flip the narrative:✅ Why most investors buy near euphoria and sell near capitulation✅ The brutal math behind recovering from deep drawdowns✅ The difference between assets and consumables✅ Why trends, not opinions, determine profits✅ How OVTLYR helps identify direction, sentiment, and potential reversalsThere's also a live walkthrough of new OVTLYR features, including sentiment tracking, unusual news activity, and trend templates that highlight when momentum actually shifts.This isn't about mocking stock picks. It's about protecting capital. It's about understanding that profits follow price, not projections. Fundamentals can sound impressive, but if the chart is screaming downtrend, ignoring it can be costly.If you've ever felt tempted to “load the boat” on a crashing stock because it looks cheap, this conversation will challenge your thinking in a powerful way.Watch closely. Think critically. And remember, the market rewards discipline, not hope.Subscribe to OVTLYR for disciplined trading strategies that actually make sense.
Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China. Show notes Risky Bulletin: Cambodia promises to dismantle scam networks by April
Our episode takes us from dormitories in Dubai to data centres in Seattle as investors navigate a market that feels both ambitious and anxious. Centurion Corp eyes Middle East expansion as Amazon stumbles, AMD faces scepticism, and Anthropic rides a post-Super Bowl surge - all while the STI flirts with the 5,000 mark. In this episode, hosted by Michelle Martin with Ryan Huang, we unpack Centurion’s “baby steps” into migrant housing demand across the Gulf. US markets pause but remain jittery, with AI reshaping sentiment around Amazon, AMD and Palo Alto Networks. Corporate earnings from Walmart and DoorDash add to the week’s catalysts as India hosts the AI Impact Summit featuring Microsoft and Anthropic. Back home, Yangzijiang Shipbuilding and Keppel Corp outperform while DBS lags the STI.Plus, in UP or DOWN, we size up GuocoLand’s movies and whether Anthropic’s marketing momentum signals something bigger. Hear about:Centurion Corporation, Amazon, AMD, Anthropic, Microsoft, Palo Alto Networks, DoorDash, Walmart, GuocoLand, Yangzijiang Shipbuilding, Keppel Corp, DBS.See omnystudio.com/listener for privacy information.
Today is Monday, February 16, 2026. Welcome to In Case You Missed It, our weekly five-minute rundown of important channel news stories that might have flown under the radar last week. In this edition: Cisco CEO Chuck Robbins says we're in the early stage of a multi-year, multi-billion dollar campus refresh opportunity as customers look to redesign their networks for growing AI tasks. Palo Alto Networks completes its deal to purchase CyberArk for $25 billion, adding crucial identity management capabilities to its security stack. Global sovereign cloud technology spend will jump by more than 30% this year according to Gartner as geopolitical tensions stoke a desire for companies and regulators to insist that data stays close to home. Emerging networking service vendor Meter introduces former Meraki channel leader Pete Atkins as its global partner leader.
Innovations in drone technology have expanded their usefulness and made drones increasingly present in everyday life. Despite this progress, key limitations such as short battery life and limited payload capacity have hindered their full potential in critical infrastructure. That reality is beginning to shift. Recent breakthroughs in long-endurance flight are pushing drones beyond these limits and into entirely new possibilities. As these advances reshape what drones can do, we must ask: What new possibilities do these breakthroughs unlock? And what might these possibilities mean for our everyday lives?In this episode, Shane is joined by Brian Hinman, the founder and CEO of SiFly, and John Donovan, the CEO of Qudit Investments and a board member at Palo Alto Networks and Lockheed Martin. As leaders of these innovations in drone technology, they draw on their extensive experience in aviation, defense, and technology to help us explore how this next phase of drone development could change the way we think about infrastructure, emergency response, and the future of aviation itself.
Hiring managers don't remember resumes - they remember storiesIn this episode of Top of the Pile, Karen sits down with storytelling expert and narrative strategist Aaron Calafato to talk about why storytelling isn't just a “nice to have” skill - it's essential to standing out in today's job market.Aaron has helped brands like Indeed, Glassdoor, and Palo Alto Networks build trust through story-driven content, and he brings those same principles into the job search and interview process. Aaron is the creator and host of the award-winning 7 Minute Stories podcast, which has reached over 30 million listeners, and the co-creator and co-host of Glassdoor's The Lonely Office. He also serves as an audio growth strategist for State of Mind, one of Apple's leading mental health podcasts.Together, we break down the difference between simply having conversations versus telling intentional stories, and why most job seekers struggle to clearly communicate their value.We dive into the idea of storycatching — paying attention to your own experiences as they happen — and how self-reflection and self-awareness can help you build short, compelling stories that resonate in interviews and networking conversations. Aaron also explains what a throughline is, why it matters, and how understanding both your own story and a company's mission can dramatically improve how you show up in interviews.If you're a college student, recent grad, or early-career professional trying to articulate your strengths, pivot careers, or feel more confident talking about your experience, this episode will give you practical tools to tell better stories — and get remembered for them.LAUNCH Career Strategies was founded by Karen Elders and Elyse Spalding. We help young professionals launch a successful career path with expert coaching services. Reach out today for an initial FREE coaching session.LinkedIn | Instagram | Facebook
In der heutigen Folge sprechen die Finanzjournalisten Philipp Vetter und Holger Zschäpitz über gute Laune dank OpenAI, einen krassen Einbruch bei Hims & Hers und einen schwachen Tag für deutsche Immobilienwerte. Nvidia, Oracle, Microsoft, SAP, Siemens, Novo Nordisk, Samsung Electronics, Micron, Vonovia, TAG Immobilien, Kyndryl, Monday.com, Workday, AppLovin, On Semi, Amazon, Meta, J.C. Penney, Salesforce, ServiceNow, Crowdstrike, Palo Alto Networks, Asana, Atlassian, Cognizant, den Expanded Tech-Software Sector ETF (WKN: A0B6MN) und die Anleihen von Nvidia Dollar bis 2050 (WKN: A28VHH), Alphabet bis 2050 (WKN: A2802E), Alphabet Dollar 2027 (WKN: A2802B), Oracle Dollar bis 2064 (WKN: A3L339). Wir freuen uns an Feedback über aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
Líderes de Keyfactor, SailPoint, Palo Alto Networks y Deloitte analizan la gestión de certificados, inteligencia artificial y protección de identidades en el evento referente del sector.
French police raid X's Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishing campaign targeting Dropbox credentials. A new GlassWorn campaign targets macOS developers. Critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation. Researchers disclose a major data exposure on Moltbook, a social network built for AI agents. States bridge the gaps in election security. Nitrogen ransomware has a fatal flaw that permanently destroys data. Supersize your passwords — you want fries with that? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity while overseeing Cortex Xpanse's teams automating attack surface management across some of the world's largest networks. In this episode of Threat Vector, host David Moulton sits down with Dr. Aaron Isaksen to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments. Selected Reading French cops raid X's Paris office in algorithmic bias probe (The Register) US seizes over $400 million in assets from dark web money laundering operation Helix (SC Media) NSA Tells Feds: Zero Trust Must Go Beyond Login (GovInfo Security) New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials (Infosecurity Magazine) New GlassWorm attack targets macOS via compromised OpenVSX extensions (Bleeping Computer) Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack (Hackread) Vibe-Coded Moltbook Exposes User Data, API Keys and More (Infosecurity Magazine) As feds pull back, states look inward for election security support (CyberScoop) Nitrogen Ransomware: ESXi malware has a bug! (Coveware) McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Can AI agents be deployed for enhanced protection? What is a “triple extortion”? How is ransomware evolving? Is there hope for SMEs?Sam Kaplan is a policy, legal, and national security professional with over eighteen years of experience across the public and private sectors. He is currently the Assistant General Counsel for Public Policy & Government Affairs at Palo Alto Networks, providing legal guidance on domestic and international legislative, regulatory, and policy matters, with a focus on cybersecurity, AI governance, privacy, data security, international data flows, and public-private capacity building.Before Palo Alto Networks, Sam led the global product policy team for Facebook's News Feed and News Tab at Meta Platforms, addressing issues like AI/ML fairness, algorithmic transparency, platform integrity, election security, misinformation, and harmful content.Prior to his private sector roles, Sam spent over thirteen years in the Federal Government. He held senior leadership positions at the U.S. Department of Homeland Security, including Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy and Chief Privacy Officer. Earlier government roles included work at the U.S. Department of Justice (Office of Legal Policy, Bureau of Alcohol, Tobacco, Firearms and Explosives, and U.S. Attorney's Office for the Eastern District of Virginia) and as Counselor to a member of the Privacy and Civil Liberties Oversight Board, focusing on the U.S. Intelligence Community.References:* Sam Kaplan on LinkedIn* Palo Alto Networks* Unit 42 Research (Palo Alto Networks)* Cyber Information Sharing and Collaboration Program (CISCP) at CISA (Cybersecurity and Infrastructure Security Agency) This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.mastersofprivacy.com/subscribe
This week, we discuss the end of Cloud 1.0, AI agents fixing old apps, and Chainguard vs. Docker images. Plus, the mystery of Dutch broth is finally solved. Watch the YouTube Live Recording of Episode 556 Runner-up Titles His overall deal Been there and done that been ignoring that shift key for years Cloud is just fine I'll be back in Bartertown The “F” Word Hardened-washing We'll never do this, but we should check back in in 3 months Libraries are the best Elves don't belong in space Rundown Are we at the end of cloud or cloud 1.0 It's the beginning of Cloud 2.0 Spec-driven development system for Claude Code Anthropic and App Modernization A meta-prompting, context engineering and spec-driven development What comes next, if Claude Code is as good as people say. Microsoft Spending on Anthropic Approaches $500 Million a Year Claude Code Won't Fix Your Life Coté and Tony contemplate day two AI-generated apps, and an excerpt. Why We've Tried to Replace Developers Every Decade Since 1969 Well, that escalated quickly: Zero CVEs, lots of vendors Relevant to your Interests Beijing tells Chinese firms to stop using US and Israeli cybersecurity software China blacklists VMware, Palo Alto Networks software over national security fears Kroger taps Google Gemini, announces more key AI moves Texas judge throws out second lawsuit over CrowdStrike outage Apple will pay billions for Gemini after OpenAI declined Dell wants £10m+ from VMware if Tesco case goes against it Tailscale: The Best Free App Most Mac Power Users Aren't Using How WhatsApp Took Over the Global Conversation Our approach to advertising and expanding access to ChatGPT OpenAI's ARR reached over $20 billion in 2025, CFO says Simon Willison's take on Our approach to advertising and ChatGPT The AI lab revolving door spins ever faster | TechCrunch How Markdown took over the world An Interview with United CEO Scott Kirby About Tech Transformation Conferences cfgmgmtcamp 2026, February 2nd to 4th, Ghent, BE. Coté speaking - anyone interested in being an SDI guest? DevOpsDayLA at SCALE23x, March 6th, Pasadena, CA Use code: DEVOP for 50% off. Devnexus 2026, March 4th to 6th, Atlanta, GA. Use this 30% off discount code from your pals at Tanzu: DN26VMWARE30. KubeCon EU, March 23rd to 26th, 2026 - Coté will be there on a media pass. VMware User Groups (VMUGs): Amsterdam (March 17-19, 2026) Minneapolis (April 7-9, 2026) Toronto (May 12-14, 2026) Dallas (June 9-11, 2026) Orlando (October 20-22, 2026) SDT News & Community Join our Slack community Email the show: questions@softwaredefinedtalk.com Free stickers: Email your address to stickers@softwaredefinedtalk.com Follow us on social media: Twitter, Threads, Mastodon, LinkedIn, BlueSky Watch us on: Twitch, YouTube, Instagram, TikTok Book offer: Use code SDT for $20 off "Digital WTF" by Coté Sponsor the show Recommendations Brandon: The Library will loan you a 5G hotspot Matt: Deep Rock Galactic: Survivor (rogue-like Vampire Hunters-type game) Coté: Streamyard shorts generation. Salesforce was inspired by dolphins.
Verizon hit by a major wireless outage. Poland blocks an attack on its power grid. A massive database of French citizens exposed. Microsoft shuts down a cybercrime-as-a-service operation. The UK backs away from digital ID plans. California probes Grok deepfakes. The FTC settles with GM over location data. Palo Alto Networks patches a serious firewall flaw. Plus, John Serafini of HawkEye on modern signals intelligence, and federal agents seize devices from a Washington Post reporter. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today Maria Varmazis sits down with John Serafini, Founder and CEO of Hawkeye 360, on T-Minus to discuss commercial signals intelligence, advanced RF signal processing, and Hawkeye 360's recent acquisition of Innovative Signal Analysis alongside its Series E funding. To hear the full conversation, check out the episode on T-Minus. Selected Reading Verizon Says Service Restored After Thousands Affected by Outage (Bloomberg) Poland says it repelled major cyberattack on power grid, blames Russia (The Record) Massive breach leaks 45 million French records: demographic, healthcare, and financial data all leaked, here's what we know (TechRadar) Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft (Infosecurity Magazine) Government drops plans for mandatory digital ID to work in UK (BBC News) Attorney General Bonta Launches Investigation into xAI, Grok Over Undressed, Sexual AI Images of Women and Children | State of California (Department of Justice) FTC bans GM from selling drivers' location data for five years (Bleeping Computer) Palo Alto Networks warns of DoS bug letting hackers disable firewalls (Bleeping Computer) FBI executes search warrant at Washington Post reporter's home (Washington Post) US cargo tech company publicly exposed its shipping systems and customer data to the web (TechCrunch) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment AI security is no longer optional, it's urgent. In this segment of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation here and listen to new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading Patch Tuesday, January 2026 Edition (Krebs on Security) Adobe Patches Critical Apache Tika Bug in ColdFusion (SecurityWeek) Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities (SecurityWeek) Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM (SecurityWeek) Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (Reuters) Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover (Beyond Machines) Cyberattack forces Belgian hospital to transfer critical care patients (The Record) Betterment confirms data breach after wave of crypto scam emails (Bleeping Computer) Passports, bank details compromised in Eurail data breach (The Register) Lawmakers Urged to Let US Take on 'Offensive' Cyber Role (Bank InfoSecurity) Sean Plankey re-nominated to lead CISA (CyberScoop) Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this special year-end episode of Inside the Network, we're joined by two of the most trusted strategic advisors in cybersecurity - Dino Boukouris, Managing Partner at Altitude Cyber, and Sam Bronstein, Partner at AXOM Partners. Between them, they've worked on billions of dollars in cybersecurity M&A, helped founders navigate exits to the world's largest tech companies, and advised the CEOs behind some of the biggest public and private deals in the industry. In this episode, which also happens to be the 20th episode of Inside the Network, we break down what really happened across the cybersecurity landscape in 2025, from customer buying patterns and budget constraints to the $96B in M&A deal volume. Dino and Sam share insights on what's driving consolidation, how buyers think about valuation and timing, and what defines a hot company in 2026 (hint: it's not just growth). We talk about how mega-deals like Wiz and CyberArk are reshaping competitive dynamics in the industry, why SASE, identity, and security for AI have been the most active M&A themes, and what founders need to understand about building relationships with buyers long before they're ready to exit. Sam and Dino explain that founders who achieve the best outcomes usually build relationships with potential acquirers over many years, and break down why many late-stage founders are likely to choose acquisition over IPO in the coming cycle.We close with tactical advice for founders heading into 2026: how to think about your board and investors, what metrics you'll be judged on, and how to align your capital strategy with your long-term goals. And yes, we also talk about race cars, zero interest rates, outcome-based pricing, and what Palo Alto Networks might buy next.
“A large part of what you bring to work affects everybody else around you, so if you bring joy that becomes infectious, that infection makes the whole place more joyful.”Dipak Golechha is Chief Financial Officer of Palo Alto Networks, the world's leading enterprise cybersecurity company, where Dipak leads global finance and operations. A seasoned finance leader, prior to Palo Alto Networks, Golechha held a variety of global leadership and executive roles around the globe. Prior to joining Palo Alto Networks, Dipak served as CEO of Excelligence Learning Corporation, a childhood education company backed by private equity. Before that, Dipak was CFO at The Nature's Bounty Company, a $3+ billion health and wellness consumer products company with brands including Holland & Barrett. Dipak also spent seven transformative months as CFO of Chobani, helping structure the rapidly growing company through capital raising and private equity partnerships. Dipak spent 18 years at Procter & Gamble in finance and operations leadership roles across multiple geographies. His P&G career began in London before an early expatriate assignment to Caracas, Venezuela. He held finance leadership positions in the Clairol acquisition, corporate treasury, global M&A, and became Global Divisional CFO and COO for Pringles—one of P&G's youngest executives in this role. His final position was leading finance for the global feminine care division. Dipak serves on the board of Spring Health, and holds a B.A. and M.A. in Economics from St. John's College, Cambridge University, This conversation is hosted by P&G Alum Sudha Ranganathan, who's spent over 19 years in diverse Marketing leadership roles at companies like P&G, PayPal, and LinkedIn where she's honed her passion for customer-centric marketing and talent development.This is a sponsored episode with our partners at Palo Alto Networks, a proud global presenting sponsor of the P&G Alumni Network. Interested to feature your company and executives on the P&G Alumni Podcast? Reach out to jswuest@pgalums.com
Idei menü:KvízPasskeyItt a kulcs, hol a kulcs?Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security DealBad Apple - DÁP edition Elérhetőségeink:TelegramTwitterInstagramFacebookMail: info@hackeslangos.show
Nation-states are already harvesting your encrypted data, betting they'll crack it when quantum computers mature. It's happening now. In CXOTalk episode 904, Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, explains what business leaders need to understand about quantum security and how to address it. The impact of quantum computing on cybersecurity will be huge.Key timelines discussed:-- Cryptographically relevant quantum computers expected by end of this decade-- RSA and ECC algorithms deprecated by 2030, disallowed by 2035-- Enterprise cryptographic migrations typically take 5-10 years
Palo Alto Networks boss calls AI agents biggest insider threat Hackers claim Resecurity hack, firm says it was a honeypot Thousands of ColdFusion exploit attempts spotted during Christmas holiday Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm Find the stories behind the headlines at CISOseries.com.
While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen. From the show: ASEAN Entities in the Spotlight: Chinese APT Group Targeting Preparing for a Secure Paris 2024 Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025 FBI talks about how China is testing AI in cyberattacks Hear more from Wendi Whitmore on Threat Vector: Episode 5: From Nation States to Cybercriminals Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textIn this episode, Joey Pinz sits down with world traveler, podcast host, and former tech executive Jim Hauck — a man who walked away from the corporate grind at Salesforce and Palo Alto Networks to build a life fueled by adventure, purpose, and people.Jim shares how a layoff became the spark for JPHauck Adventures and Life in the Baggage Claim, where he helps others travel smarter, deeper, and more meaningfully. Together, they explore what separates a tourist from a traveler, the return of human-centered travel advisors in the age of AI, and how exploring the world can heal fear, expand empathy, and reshape purpose.He also opens up about his personal 400-pound weight-loss transformation, his calling to serve the homeless community in Dallas, and the power of gratitude to turn anger into growth.
This is part 1 of a 4-part series. Randy and I were recently invited to podcast on the floor of the 2025 Cyber Winter Wonderland at the beautiful Madison Loft. My guest host of the day was host of the Great Security Debate, Brian Schneble. Enjoy the listen, and THANK YOU to CXO Forum for partnering with us to podcast at your event! Part 1 Steve Monato and Ken Sowinski of UWM Part 1’s discussion focuses on the evolving role of AI within organizations, touching on AI use cases, data security, and the necessity for clean, organized data for effective AI modeling. The panelists emphasize the shift from understanding AI to implementing and deriving business value from it. They also discuss the importance of communication between IT and business units to promote effective AI adoption, the impact of automation on employee tasks, and the future role of AI in sectors like mortgage processing. The conversation explores the balance between AI-driven automation and human oversight to ensure efficiency and address challenges associated with new AI tools. Part 2 Eric Olmstead Palo Alto Networks and Jonathan Gough of Pellera Part 2 is a discussion of the evolution and current trends in IT security and technology integration. Pellera Technologies provides a detailed overview of their global operations, focusing on AI, data cloud, and cybersecurity solutions. The discussion covers Palo Alto Networks’ advancements in security, including the integration of AI in their security platforms and the concept of Zero Trust, emphasizing its continued relevance. The conversation also explores the complexities of AI implementation, the challenges of non-human identities (NHIs), and the importance of robust security measures in a rapidly evolving tech landscape. Both companies highlight the need for innovation and vigilance in managing current and emerging security threats. Part 3 Brandon Allen and Pete Sheldon of Prophet Security Part 3 focuses on the challenges faced by Security Operations Centers (SOCs) amid a growing volume of alerts and the role of AI and machine learning in addressing these challenges. Profit Security is utilizing AI-driven platforms to enhance alert investigation and reduce false positives, allowing analysts to focus on more critical issues. The conversation delves into topics like the evolution from traditional machine learning to modern AI, the importance of context and reasoning in alert processing, and the continuous need for human oversight and expert feedback in AI systems. Additionally, the discussion touches on industry-specific issues such as the energy costs associated with running AI and compute centers, the adaptability of AI to new threat vectors, and the potential for AI to improve operational efficiency within organizations. Part 4 Björn Olson of Pellera and Henry Samson of Palo Alto Networks. Part 4 covers the evolving landscape of technology and security. The discussion covers the prevalent issues in the automotive and manufacturing industries, including underutilization of tools, data protection challenges, and the impact of technological advancements on security practices. The conversation also touches on the importance of understanding customer needs, the necessity of solving real problems, and the need to plan for future challenges like quantum computing. The roundtable aims to provide insights into balancing sales with genuine problem-solving and advancing security measures while managing financial constraints.
This is part 2 of a 4-part series. Randy and I were recently invited to podcast on the floor of the 2025 Cyber Winter Wonderland at the beautiful Madison Loft. My guest host of the day was host of the Great Security Debate, Brian Schneble. Enjoy the listen, and THANK YOU to CXO Forum for partnering with us to podcast at your event! Part 1 Steve Monato and Ken Sowinski of UWM Part 1’s discussion focuses on the evolving role of AI within organizations, touching on AI use cases, data security, and the necessity for clean, organized data for effective AI modeling. The panelists emphasize the shift from understanding AI to implementing and deriving business value from it. They also discuss the importance of communication between IT and business units to promote effective AI adoption, the impact of automation on employee tasks, and the future role of AI in sectors like mortgage processing. The conversation explores the balance between AI-driven automation and human oversight to ensure efficiency and address challenges associated with new AI tools. Part 2 Eric Olmstead Palo Alto Networks and Jonathan Gough of Pellera Part 2 is a discussion of the evolution and current trends in IT security and technology integration. Pellera Technologies provides a detailed overview of their global operations, focusing on AI, data cloud, and cybersecurity solutions. The discussion covers Palo Alto Networks’ advancements in security, including the integration of AI in their security platforms and the concept of Zero Trust, emphasizing its continued relevance. The conversation also explores the complexities of AI implementation, the challenges of non-human identities (NHIs), and the importance of robust security measures in a rapidly evolving tech landscape. Both companies highlight the need for innovation and vigilance in managing current and emerging security threats. Part 3 Brandon Allen and Pete Sheldon of Prophet Security Part 3 focuses on the challenges faced by Security Operations Centers (SOCs) amid a growing volume of alerts and the role of AI and machine learning in addressing these challenges. Profit Security is utilizing AI-driven platforms to enhance alert investigation and reduce false positives, allowing analysts to focus on more critical issues. The conversation delves into topics like the evolution from traditional machine learning to modern AI, the importance of context and reasoning in alert processing, and the continuous need for human oversight and expert feedback in AI systems. Additionally, the discussion touches on industry-specific issues such as the energy costs associated with running AI and compute centers, the adaptability of AI to new threat vectors, and the potential for AI to improve operational efficiency within organizations. Part 4 Björn Olson of Pellera and Henry Samson of Palo Alto Networks. Part 4 covers the evolving landscape of technology and security. The discussion covers the prevalent issues in the automotive and manufacturing industries, including underutilization of tools, data protection challenges, and the impact of technological advancements on security practices. The conversation also touches on the importance of understanding customer needs, the necessity of solving real problems, and the need to plan for future challenges like quantum computing. The roundtable aims to provide insights into balancing sales with genuine problem-solving and advancing security measures while managing financial constraints.
This is part 3 of a 4-part series. Randy and I were recently invited to podcast on the floor of the 2025 Cyber Winter Wonderland at the beautiful Madison Loft. My guest host of the day was host of the Great Security Debate, Brian Schneble. Enjoy the listen, and THANK YOU to CXO Forum for partnering with us to podcast at your event! Part 1 Steve Monato and Ken Sowinski of UWM Part 1’s discussion focuses on the evolving role of AI within organizations, touching on AI use cases, data security, and the necessity for clean, organized data for effective AI modeling. The panelists emphasize the shift from understanding AI to implementing and deriving business value from it. They also discuss the importance of communication between IT and business units to promote effective AI adoption, the impact of automation on employee tasks, and the future role of AI in sectors like mortgage processing. The conversation explores the balance between AI-driven automation and human oversight to ensure efficiency and address challenges associated with new AI tools. Part 2 Eric Olmstead Palo Alto Networks and Jonathan Gough of Pellera Part 2 is a discussion of the evolution and current trends in IT security and technology integration. Pellera Technologies provides a detailed overview of their global operations, focusing on AI, data cloud, and cybersecurity solutions. The discussion covers Palo Alto Networks’ advancements in security, including the integration of AI in their security platforms and the concept of Zero Trust, emphasizing its continued relevance. The conversation also explores the complexities of AI implementation, the challenges of non-human identities (NHIs), and the importance of robust security measures in a rapidly evolving tech landscape. Both companies highlight the need for innovation and vigilance in managing current and emerging security threats. Part 3 Brandon Allen and Pete Sheldon of Prophet Security Part 3 focuses on the challenges faced by Security Operations Centers (SOCs) amid a growing volume of alerts and the role of AI and machine learning in addressing these challenges. Profit Security is utilizing AI-driven platforms to enhance alert investigation and reduce false positives, allowing analysts to focus on more critical issues. The conversation delves into topics like the evolution from traditional machine learning to modern AI, the importance of context and reasoning in alert processing, and the continuous need for human oversight and expert feedback in AI systems. Additionally, the discussion touches on industry-specific issues such as the energy costs associated with running AI and compute centers, the adaptability of AI to new threat vectors, and the potential for AI to improve operational efficiency within organizations. Part 4 Björn Olson of Pellera and Henry Samson of Palo Alto Networks. Part 4 covers the evolving landscape of technology and security. The discussion covers the prevalent issues in the automotive and manufacturing industries, including underutilization of tools, data protection challenges, and the impact of technological advancements on security practices. The conversation also touches on the importance of understanding customer needs, the necessity of solving real problems, and the need to plan for future challenges like quantum computing. The roundtable aims to provide insights into balancing sales with genuine problem-solving and advancing security measures while managing financial constraints.
This is part 4 of a 4-part series. Randy and I were recently invited to podcast on the floor of the 2025 Cyber Winter Wonderland at the beautiful Madison Loft. My guest host of the day was host of the Great Security Debate, Brian Schneble. Enjoy the listen, and THANK YOU to CXO Forum for partnering with us to podcast at your event! Part 1 Steve Monato and Ken Sowinski of UWM Part 1’s discussion focuses on the evolving role of AI within organizations, touching on AI use cases, data security, and the necessity for clean, organized data for effective AI modeling. The panelists emphasize the shift from understanding AI to implementing and deriving business value from it. They also discuss the importance of communication between IT and business units to promote effective AI adoption, the impact of automation on employee tasks, and the future role of AI in sectors like mortgage processing. The conversation explores the balance between AI-driven automation and human oversight to ensure efficiency and address challenges associated with new AI tools. Part 2 Eric Olmstead Palo Alto Networks and Jonathan Gough of Pellera Part 2 is a discussion of the evolution and current trends in IT security and technology integration. Pellera Technologies provides a detailed overview of their global operations, focusing on AI, data cloud, and cybersecurity solutions. The discussion covers Palo Alto Networks’ advancements in security, including the integration of AI in their security platforms and the concept of Zero Trust, emphasizing its continued relevance. The conversation also explores the complexities of AI implementation, the challenges of non-human identities (NHIs), and the importance of robust security measures in a rapidly evolving tech landscape. Both companies highlight the need for innovation and vigilance in managing current and emerging security threats. Part 3 Brandon Allen and Pete Sheldon of Prophet Security Part 3 focuses on the challenges faced by Security Operations Centers (SOCs) amid a growing volume of alerts and the role of AI and machine learning in addressing these challenges. Profit Security is utilizing AI-driven platforms to enhance alert investigation and reduce false positives, allowing analysts to focus on more critical issues. The conversation delves into topics like the evolution from traditional machine learning to modern AI, the importance of context and reasoning in alert processing, and the continuous need for human oversight and expert feedback in AI systems. Additionally, the discussion touches on industry-specific issues such as the energy costs associated with running AI and compute centers, the adaptability of AI to new threat vectors, and the potential for AI to improve operational efficiency within organizations. Part 4 Björn Olson of Pellera and Henry Samson of Palo Alto Networks. Part 4 covers the evolving landscape of technology and security. The discussion covers the prevalent issues in the automotive and manufacturing industries, including underutilization of tools, data protection challenges, and the impact of technological advancements on security practices. The conversation also touches on the importance of understanding customer needs, the necessity of solving real problems, and the need to plan for future challenges like quantum computing. The roundtable aims to provide insights into balancing sales with genuine problem-solving and advancing security measures while managing financial constraints.
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France's Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Researchers uncovered a massive exposed database with nearly 4.3 billion professional records openly accessible online. Britain's new MI6 chief warns of an “aggressive, expansionist, and revisionist” Russia. Monday Business Brief. On today's Threat Vector, Michael Heller from Unit 42 chats with security leaders Greg Conti and Tom Cross to unpack the hacker mindset and the idea of “dark capabilities”. A cyber holiday gift guide for the rest of us. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this segment of Threat Vector, host Michael Heller, Managing Editor for Cortex and Unit 42 and Executive Producer of the podcast, sits down with long-time security leaders Greg Conti and Tom Cross to unpack the hacker mindset and the idea of “dark capabilities” inside modern technology companies. You can listen to their full discussion here. Be sure to catch new episodes of Threat Vector by Palo Alto Networks every Thursday on your favorite podcast app. Selected Reading Apple, Google forced to issue emergency 0-day patches (The Register) Google links more Chinese hacking groups to React2Shell attacks (Bleeping Computer) French Interior Ministry confirms cyberattack on email servers (Bleeping Computer) Atlassian Patches Critical Apache Tika Flaw (SecurityWeek) Microsoft: December security updates cause Message Queuing failures (Bleeping Computer) 16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records (Hackread) MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin (The Record) Saviynt raises $700 million in Series B growth equity financing. (The CyberWire Business Brief) Last-minute cybersecurity and privacy gifts your friends and family won't hate (This Week In Security) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
We will analyze how the AI arms race is triggering massive Big Tech debt issuance to fund data center construction, and what this "mega-issuance" means for the stability and "spreads" of the investment-grade credit market.Today's Stocks & Topics: Upwork Inc. (UPWK), Market Wrap, Vanguard Total Stock Market Index Fund ETF Shares (VTI), “AI's Credit Market Footprint: Financing the Data Center Boom”, Costco Wholesale Corporation (COST), Key Benchmark Numbers: Treasury Yields, Gold, Silver, Oil and Gasoline, Target Date Funds (TDFs), Onto Innovation Inc. (ONTO), Palo Alto Networks, Inc. (PANW), Mega Mergers.Our Sponsors:* Check out Incogni: https://incogni.com/investtalk* Check out Invest529: https://www.invest529.com* Check out NordProtect: https://nordprotect.com/investalk* Check out Progressive: https://www.progressive.com* Check out Quince: https://quince.com/INVEST* Check out TruDiagnostic and use my code INVEST for a great deal: https://www.trudiagnostic.comAdvertising Inquiries: https://redcircle.com/brands
ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator system. Switzerland questions the security of hyperscale clouds and SaaS services. One of the world's largest cyber insurers pulls back from the market. On our Threat Vector segment, David Moulton sits down with Stav Setty to unpack the Jingle Thief campaign. In Russia, Porsches take a holiday. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector segment In today's Threat Vector segment, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco-based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more. To listen to the full conversation on Threat Vector, listen here. You can catch new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading Browser extensions pushed malware to 4.3M Chrome, Edge users (The Register) India plans to verify and record every smartphone in circulation (TechCrunch) Apple to Resist India's Order to Preload Government App on iPhones (MacRumors) President orders probe into Coupang breach (The Korea Herald) Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process (GB Hackers) Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers (SecurityWeek) Google Releases Patches for Android Zero-Day Flaws Exploited in the Wild (Infosecurity Magazine) 'Cyber Issue' Leads to FDA Recall of Baxter Respiratory Gear (GovInfoSecurity) Swiss government bans SaaS and cloud for sensitive info (The Register) Publication: Resolution on outsourcing data processing to the cloud (Privatim) Insurer Beazley Steps Back From Cyber Market as Attacks Surge (PYMNTS.com) Hundreds of Porsche Owners in Russia Unable to Start Cars After System Failure (The Moscow Times) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices