American technology company
POPULARITY
Categories
The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on scams. Teens sue xAI over alleged AI-generated abuse. On today's Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape. Cyber crooks cause a complimentary curbside convenience. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector What if the choices we make about AI security today determine who holds power tomorrow? On this Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape, from compressed decision-making timelines and asymmetric threat capabilities to the erosion of trust that creates strategic vulnerabilities. You can listen to David and Erica's full conversation here and catch new episodes of Threat Vector from Palo Alto Networks each Thursday on your favorite podcast app. Selected Reading EU Sanctions Iranian and Chinese Firms for Cyberattacks Against European Networks (TechNadu) DHS-built surveillance apparatus to surge in year ahead, documents show (FedScoop) AI firm Anthropic seeks weapons expert to stop users from 'misuse' (BBC) Stryker attack wiped tens of thousands of devices, no malware needed (Bleeping Computer) LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks (Bleeping Computer) Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web (WIRED) China's biggest cybersecurity firm accidentally leaked an SSL key in a public installer (Neowin) Google has signed the Industry Accord Against Online Scams and Fraud. (Google) Teenage girls sue Musk's xAI, accusing Grok tool of creating child sexual abuse material (The Guardian) Free parking in Russia after Distributed Denial-of-Service attack knocks city's parking system offline (Bitdefender) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Parce que… c'est l'épisode 0x723! Préambule Nous sommes à la Cage durant un match des Canadiens. Le bruit ambiant a fait que nous parlons en “criant”, pour nous entendre. Le lendemain, je n'avais plus de voix. Shameless plug 31 mars au 2 avril 2026 - Forum INCYBER - Europe 2026 14 au 17 avril 2026 - Botconf 2026 20 au 22 avril 2026 - ITSec Code rabais de 15%: Seqcure15 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2026 - SSTIC 2026 19 septembre 2026 - Bsides Montréal 1 au 3 décembre 2026 - Forum INCYBER - Canada 2026 24 et 25 février 2027 - SéQCure 2027 Description Un retour après une longue absence C'est avec une certaine nostalgie que j'accueille Nicolas Bédard, un invité régulier qui avait mystérieusement disparu des ondes pendant plusieurs mois. La raison de cette absence ? Un changement de carrière majeur qui a bousculé son quotidien et rendu toute planification d'enregistrement pratiquement impossible. Entre les décalages de calendrier, les voyages et les nouvelles responsabilités à apprivoiser, les deux complices n'avaient tout simplement pas réussi à se retrouver devant un micro. Mais Nicolas est de retour, et il a beaucoup à raconter. Cinq ans chez Google : de l'imposter syndrome aux 20 % Tout commence en août 2020, quand Nicolas rejoint Google en pleine pandémie, parmi une cohorte de 10 000 nouvelles recrues embauchées simultanément. L'imposter syndrome le frappe de plein fouet. Comment se démarquer dans une entreprise peuplée de talents exceptionnels ? Sa réponse : trouver une niche où son expérience passée peut faire une différence. Connaissant bien Palo Alto Networks de ses vies professionnelles antérieures, Nicolas remarque un courriel interne annonçant le lancement d'un nouveau produit, Cloud IDS. Il contacte directement le gestionnaire de produit pour offrir son aide. C'est ainsi que naît son premier projet à 20 %. La règle des 20 % est une particularité culturelle bien connue de Google : chaque employé a le droit de consacrer 20 % de son temps de travail à un projet annexe, à condition que celui-ci apporte de la valeur à la compagnie ou à la société. C'est d'ailleurs ce principe qui aurait mené à la création de Gmail. Pour Nicolas, cette liberté devient un levier de croissance personnelle et professionnelle remarquable. Pendant quatre ans, il consacre ce temps à renforcer l'alliance stratégique entre Google et Palo Alto Networks, deux géants dont le partenariat commercial est l'un des plus importants dans l'industrie de la cybersécurité. Il co-présente des produits lors de conférences comme Google Next, développe une expertise pointue sur les intégrations conjointes, et gagne en visibilité des deux côtés de l'alliance. Son 20 % devient, en quelque sorte, son véritable terrain de passion. Le moment décisif : convertir le 20 % en 100 % Après avoir tenté sans succès d'obtenir un poste dédié à cette alliance à l'intérieur même de Google, Nicolas pivote vers l'équipe Google Cloud Security (GCS) pour ses six derniers mois dans l'entreprise. C'est alors qu'il reçoit un texto inattendu de la personne responsable de l'alliance Google-Palo : un poste s'ouvre chez Palo Alto Networks pour prendre en charge tout l'enablement technique lié aux fournisseurs infonuagiques. Son nom a été mentionné. L'offre ? Transformer son ancien 20 % en 100 % de son travail. La décision n'est pas difficile à prendre. Bien que les produits de Google soient de grande qualité, Nicolas constate lors de ses discussions avec des clients que des angles morts existent dans l'offre de sécurité. Les entreprises ne vivent pas exclusivement dans un seul environnement infonuagique : elles jonglent entre des charges de travail on-premises, AWS, Azure, Google Cloud et Oracle Cloud. Palo Alto Networks, en tant que pure player de la cybersécurité, possède cet avantage de la spécialisation que ne peut pas toujours offrir un généraliste comme Google, si bon soit-il. Un nouveau rôle centré sur la valeur, sans pression de vente Ce qui enthousiasme particulièrement Nicolas dans son nouveau poste, c'est l'abandon du quota de vente. Fini la pression commerciale mensuelle : il peut désormais enfiler son chapeau de formateur et se concentrer sur la transmission de la connaissance. Son équipe de quatre personnes se structure autour de quatre missions principales : L'intégration de produits, pour s'assurer que les solutions conjointes Palo-Google fonctionnent de façon fluide et cohérente ; La création de sales plays, des guides qui permettent aux équipes de vente de bien articuler la valeur des produits devant les clients ; L'enablement, qui passe par des conférences, des webinaires, des architectures de référence et des démonstrations techniques ; Le soutien aux équipes commerciales, qui garde Nicolas connecté à la réalité du terrain sans qu'il soit lui-même sous pression de résultats. L'alliance Google-Palo Alto : une symbiose technique profonde L'intégration entre les deux entreprises va bien plus loin qu'un simple partenariat commercial. La quasi-totalité des produits de Palo Alto Networks tourne aujourd'hui sur l'infrastructure de Google Cloud. Certains produits Google, comme Cloud IDS ou Cloud NGFW Enterprise, sont en réalité propulsés par la technologie de Palo Alto en dessous. Des utilisateurs de Prisma Access, l'outil SASE de Palo, traversent l'infrastructure de Google à chaque connexion VPN sans nécessairement le savoir. L'alliance permet également des optimisations réseau avancées, comme l'appairage natif entre Prisma Access et Google Cloud via le Network Connectivity Center. L'intelligence artificielle : le prochain grand terrain de jeu La conversation s'oriente naturellement vers l'IA, sujet incontournable du moment. Nicolas identifie deux enjeux majeurs pour les entreprises qui adoptent ces technologies : la consistance des résultats (les modèles d'IA ne sont pas déterministiques comme un formulaire web) et, en second lieu, la sécurité. Les grands fournisseurs infonuagiques développent des modèles de pointe, mais ils sont moins bien équipés pour gérer des problématiques comme la prévention des fuites de données (DLP), la protection contre le prompt injection ou la sécurisation des pipelines IA. C'est exactement là que Palo Alto Networks intervient en complémentarité, comme en témoigne l'annonce récente d'une intégration de Prisma AIRS directement dans Microsoft Copilot. Un virage vers la souveraineté numérique En guise de conclusion, Nicolas évoque brièvement le thème de la souveraineté numérique, sujet d'autant plus brûlant dans le contexte géopolitique actuel. Les organisations cherchent à reprendre le contrôle de leurs données, à réduire leur dépendance envers des infrastructures étrangères et à explorer les options de nuage souverain. Un vaste sujet que les deux complices promettent d'explorer en profondeur lors d'un prochain épisode, avec Nicolas qui se retrouve, cette fois-ci, aux premières loges de cette transformation. Collaborateurs Nicolas-Loïc Fortin Nicolas Bédard Crédits Montage par Intrasecure inc Locaux réels par La Cage - Complexe Desjardins
Unit 42 is tracking more than 60 active hacktivist groups and Iran-linked threat actors right now. What are they actually doing, what should you believe, and what should you do about it? In this episode of Threat Vector, David Moulton sits down with Justin Moore, Senior Manager of Threat Intelligence Research at Unit 42, and Andy Piazza, Senior Director of Threat Intelligence at Unit 42, to walk through the Unit 42 Iran Threat Brief and what the observed activity means for defenders. You'll learn: - What Unit 42 is actually observing from groups like Handala Hack, FAD Team, and Dark Storm, and what claims remain unverified - Why Iran's reduced internet connectivity changes the threat picture in ways that aren't obvious - What dispersed operators and proxy groups mean for organizations far outside the Middle East - Which defensive actions matter most against the TTPs and IOCs Unit 42 has documented - How to handle hacktivist claims that may be exaggerated or false Justin Moore brings nine years of intelligence officer experience plus senior threat intel roles at Mandiant, Google, and TikTok before joining Unit 42. Andy Piazza has more than 20 years in security operations and threat intelligence, including leading IBM X-Force's global threat intel team. Read the threat brief from Unit 42: - Escalation of Cyber Risk Related to Iran (March 2026) - Escalation of Cyber Risk Related to Iran (June 2025) This episode is essential listening if you're: a CISO assessing current exposure, a threat analyst tracking Iran-linked groups, or a security leader who needs to explain the actual observed risk to your board. Related Episodes: - Inside the Mind of State-Sponsored Cyberattackers - Frenemies With Benefits - From Policy to Cyber Interference #Cybersecurity #ThreatIntelligence About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. Learn more about your ad choices. Visit megaphone.fm/adchoices
Mardi 3 mars, Frédéric Simottel a reçu Helmut Reisinger, président Europe de Palo Alto Networks, dans l'émission Tech&Co Business sur BFM Business. Retrouvez l'émission le samedi et réécoutez la en podcast.
Mardi 3 mars, Frédéric Simottel a reçu Hugues Foulon, CEO d'Orange Cyberdefense et membre du comité exécutif d'Orange, Helmut Reisinger, président Europe de Palo Alto Networks, Florence Verzelen, directrice générale adjointe Europe, Moyen-Orient, Afrique de Dassault Systèmes, Kevin Polizzi, président d'Unitel Group et présiden de The Camp, et Cédric Dufour, président de Rakuten TV, dans l'émission Tech&Co Business sur BFM Business. Retrouvez l'émission le samedi et réécoutez la en podcast.
OT networks used to be air-gapped. These days, more and more OT networks are being bridged by IT networks, which exposes critical industrial controls and other systems to serious risk. On today's Tech Bytes, sponsored by Palo Alto Networks, we dig into how organizations can detect “precursor signals” that may indicate a broader attack chain,... Read more »
OT networks used to be air-gapped. These days, more and more OT networks are being bridged by IT networks, which exposes critical industrial controls and other systems to serious risk. On today's Tech Bytes, sponsored by Palo Alto Networks, we dig into how organizations can detect “precursor signals” that may indicate a broader attack chain,... Read more »
In der heutigen Folge sprechen die Finanzjournalisten Daniel Eckert und Lea Oetjen über das Nadelöhr der Weltwirtschaft, den Gewinneinbruch bei Berkshire Hathaway und die neuen Premium-Pläne von Xiaomi. Außerdem geht es um Rheinmetall, Hensoldt, Lockheed Martin, RTX Corporation, iShares Global Aerospace & Defence UCITS ETF (WKN: A3E1JS), VanEck Defense UCITS ETF (WKN: A3D9M1), BP, Shell, ExxonMobil, ConocoPhillips, Fortinet, Palo Alto Networks, Cloudflare, L&G Cyber Security ETF (WKN: A14WU5), BASF, Lufthansa, Microsoft, ASML, Google, Kasikornbank, SCB-X, Airports of Thailand, PTT, PTT Exploration & Production, Delta Electronics und Xtrackers MSCI Thailand (WKN: DBX0GY). Mit dem Code „EARLYBIRD2026“ spart ihr 40 Prozent beim Kauf eines Tickets für den „New Work“-Summit von Business Insider unter diesem Link: https://www.businessinsider.de/new-work-summit Wir freuen uns an Feedback über aaa@welt.de. Anzeige: Diese Folge enthält Werbung für Smartbroker+. Depot eröffnen & 60 € ETF sichern! Riesige ETF-Auswahl, flexible Trades & persönlicher Support bei Smartbroker+. Alle Informationen gibt es unter: https://get.smartbrokerplus.de/triple-aaa-podcast/ Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
Podcast: Digitalization Tech TalksEpisode: Episode 62: The hidden phase of industrial cyberattacks and how to spot it earlyPub date: 2026-02-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what's really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it's a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)The podcast and artwork embedded on this page are from Siemens, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what's really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it's a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)
What separates organizations that pass audits from those that survive real incidents? In this episode of The Segment, host Raghu Nandakumara sits down with Phil Park, global cybersecurity and risk leader at IBM. With more than 25 years advising financial institutions across the U.S., Europe, and Asia-Pacific, Phil brings a practical perspective on how supervision is rapidly evolving from compliance checklists to real-world operational readiness. Together, Raghu and Phil unpack the industry's biggest mindset shift: regulators no longer ask “Are you protected?” — they ask “Can you operate through disruption?” They explore why prevention alone is no longer enough, why containment and recovery now define security maturity, and how CISOs are moving from siloed operators to enterprise-wide risk leaders accountable to boards and regulators alike. The conversation also dives into: Why regulators evaluate response quality rather than technical perfection How organizations are turning tabletop exercises into realistic resilience testing The growing pressure created by third-party and supply-chain dependencies Why evidence and outcomes matter more than policies and frameworks How overlapping reporting requirements are reshaping incident response playbooks The double-edged role of AI in both defense and attack, including deepfake risks Why security fundamentals matter even more in the AI era This episode is a must-listen for security leaders and executives navigating a world where passing the audit is no longer the goal — proving you can withstand disruption is. Also, if you're attending FSISAC, join Illumio, IBM, and Palo Alto Networks for an exclusive dinner at Capital Grille! Save your seat here: https://lp.illumio.com/20260302-Steak-And-Security-Dinner.html?utm_medium=email&utm_source=marketo
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
AI momentum is accelerating, but real-world constraints are tightening. From hyperscaler infrastructure lock-ins and sovereign AI expansion to RAM shortages and enterprise AI pivots, Ep. 293 examines what truly determines leadership in the next phase of AI. The handpicked topics for this week are: Meta & NVIDIA's Long-Term AI Infrastructure Partnership: Meta confirmed a deep infrastructure expansion across NVIDIA Blackwell and Rubin GPUs, Grace CPUs, and advanced networking. Pat & Dan discuss hyperscaler AI factories, overflow capacity strategies, and long-term compute commitments. Microsoft's Global South and Sovereign AI Expansion: As Microsoft continues major investment across India and emerging markets, the hosts explore sovereign cloud strategy, geopolitical positioning, and how global AI infrastructure buildouts shape long-term competitiveness. California AI Oversight and Regulatory Fragmentation Risk: State-level AI oversight initiatives raise concerns about a patchwork regulatory environment that could slow U.S. innovation relative to centralized global competitors. The HBM Memory Crunch and Long-Term Supply Constraints: High-Bandwidth Memory shortages continue to shape AI deployment timelines. Relief may not arrive until late this decade, with downstream impacts on data centers, PCs, and consumer devices. Infosys & Anthropic GSI Pivot to Enterprise AI Agents: Infosys partners with Anthropic to accelerate enterprise AI agent deployment. Hosts examine whether global systems integrators can pivot fast enough in an agent-driven economy. The Flip – Models vs Infrastructure Leadership: Is AI dominance determined by model quality or infrastructure scale? Pat & Dan debate whether gigawatts or algorithmic efficiency define long-term advantage. Bulls & Bears – Cyber, Power, EDA, SaaS & AI Infrastructure Plays: Earnings and market signals across Palo Alto Networks, Analog Devices, Cadence, ServiceNow, Dell, and Marvell highlight how execution, supply chains, and capital discipline matter in this cycle. Be sure to subscribe to The Six Five Pod so you never miss an episode.
In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today's cyber landscape.They also explore the escalating AI arms race, including Meta's aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
Palo Alto Networks (PANW) is facing a volatile market, leading many to ask: is the "SaaS Apocalypse" finally hitting cybersecurity? We break down why the market is hammering the stock despite a clear secular growth trend in the industry.Since Nikesh Aurora took over in 2018, Palo Alto has spent $31 billion on multiple acquisitions to pivot from a simple firewall provider to a cloud and AI security powerhouse. We analyze the recent CyberArk deal, the shift in free cash flow margins, and why the company's platformization strategy is creating a longer payoff cycle for investors.If you are a PANW shareholder or looking for a value entry in cybersecurity, this video covers the essential valuation metrics.Join us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipSupercharge your analysis with AI! Get 15% of your membership with our special link here: https://fiscal.ai/csi/Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-formIf you found this video useful, please make sure to like and subscribe!*********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.#PaloAltoNetworks #PANW #Cybersecurity #Investing #StockMarket #TechStocks #AI #SaaS #CloudSecurityNick and Kasey own shares of PANW
One legend exits, a streaming war reignites, and AI redraws the market map - where should investors focus now? In this episode, hosted by Michelle Martin with Ryan Huang, we unpack Warren Buffett’s last portfolio reshuffle at Berkshire Hathaway - trimming Apple, Amazon and Bank of America while adding some well-known names. Berkshire has now been a net seller for 13 straight quarters - is the Oracle signalling caution at peak valuations? In media, Warner Bros Discovery’s $70B content deal with Netflix faces a last-minute push from Paramount - can it outbid and reshape the streaming battlefield? Tech leads markets higher as Nvidia inks a multi-year AI infrastructure deal with Meta, potentially squeezing Broadcom’s edge. In UP or DOWN, we size up Palo Alto Networks’ profit miss, Moderna’s FDA review reversal, and Yangzijiang Maritime’s proposed buyback. Back home, the STI reopens with CapitaLand Investment up while OCBC, DFI Retail and Hongkong Land lag - is Singapore ready to gallop into the Year of the Horse? Hear about Berkshire Hathaway, Apple, Amazon, Bank of America, New York Times, Domino’s Pizza, Chevron, Warner Bros Discovery, Netflix, Paramount, Nvidia, Meta, Broadcom, Palo Alto Networks, Moderna, Yangzijiang Maritime, CapitaLand Investment, OCBC, DFI Retail, Hongkong Land.See omnystudio.com/listener for privacy information.
On this week's show, Patrick Gray, Adam Boileau and James WIlson discuss the week's cybersecurity news. They cover: Palo Alto threat researchers want to attribute to China, but management says shush An increasing proportion of ransomware is data extortion. Is this good? Cambodia says it's going to dismantle scam compounds CISA sufferers through yet another shutdown Google Gemini's training secrets are being systematically harvested to improve other LLMs Academics assess SaaS password managers' resilience against a malicious server This episode is sponsored by SSO-firewall integration vendor Knocknoc. Chief exec Adam Pointon joins to talk about the latest in defences… which is to say Knocknoc for Solaris/Sparc and HPUX on PA-RISC?! Okay also that other little known OS… Windows. This episode is also available on Youtube. Show notes Data-only extortion grows as ransomware gangs seek better profits | Cybersecurity Dive Arctic Wolf Threat Report 2026 Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say Risky Bulletin: Cambodia promises to dismantle scam networks by April - Risky Business Media Age of the ‘scam state': how an illicit, multibillion-dollar industry has taken root in south-east Asia | Cybercrime | The Guardian Critical flaw in BeyondTrust Remote Support sees early signs of exploitation | Cybersecurity Dive CISA Navigates DHS Shutdown With Reduced Staff - SecurityWeek Kimwolf Botnet Swamps Anonymity Network I2P – Krebs on Security BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign — Elastic Security Labs Over 500,000 VKontakte accounts hijacked through malicious Chrome extensions | The Record from Recorded Future News Password managers' promise that they can't see your vaults isn't always true - Ars Technica Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers Google finds state-sponsored hackers use AI at 'all stages' of attack cycle | CyberScoop Google: Gemini hit with 100,000+ prompts in cloning attempt Proofpoint acquires Acuvity to tackle the security risks of agentic AI | CyberScoop Cisco Redefines Security for the Agentic Era with AI Defense Expansion and AI-Aware SASE Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organization Dave Kennedy on X: "Regarding this, there was a couple questions on does the pacemaker continue to advertise - most BLE implantable devices go into a sleep type mode. In this case, we are lucky - it does not. We know based on law enforcement answers that she is using a more modern pacemaker with" / X Clash Report on X: "BIG: Dutch Defence Minister Gijs Tuinman hints that software independence is possible for F-35 jets. He literally said you can “jailbreak” an F-35. When asked if Europe can modify it without US approval: “That's not the point… we'll see whether the Americans will show https://t.co/f11cGvtYsO" / X Dutch police arrest man who refused to delete confidential files shared by mistake | The Record from Recorded Future News
Carl Quintanilla, Jim Cramer and David Faber explored Wednesday's gains in the tech sector, one day after the Nasdaq snapped a four-session losing streak and Amazon ended nine consecutive days of losses. Meta expands its deal with Nvidia to purchase millions of chips from the world's most valuable company. The anchors also discussed the latest on Anthropic and the most dominant AI titans. Also in focus: Microsoft as this year's worst performer among the Magnificent 7, Palo Alto Networks slides, what Netflix Co-CEO Ted Sarandos told CNBC about regulatory issues and the company's offer to buy Warner assets, Oil rises on U.S.-Iran tensions, "Faber Report" on MSG Sports exploring a split of its New York Knicks and Rangers businesses. Squawk on the Street Disclaimer Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition's close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.Udi discusses what the combined companies' scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk's long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.Note: This episode was recorded in January, prior to the acquisition's close.
Fed minutes might provide insight on rate policy after Palo Alto Networks' results Tuesday failed to cheer tech traders. Caution remains elevated as rallies can't find traction.Important DisclosuresThis material is intended for general informational purposes only. This should not be considered an individualized recommendation or personalized investment advice. The investment strategies mentioned may not be suitable for everyone. Each investor needs to review an investment strategy for his or her own particular situation before making any investment decisions.The Schwab Center for Financial Research is a division of Charles Schwab & Co., Inc.All names and market data shown above are for illustrative purposes only and are not a recommendation, offer to sell, or a solicitation of an offer to buy any security. Supporting documentation for any claims or statistical information is available upon request.Past performance is no guarantee of future results.Diversification and rebalancing strategies do not ensure a profit and do not protect against losses in declining markets.Indexes are unmanaged, do not incur management fees, costs, and expenses and cannot be invested in directly. For more information on indexes, please see schwab.com/indexdefinitions.The policy analysis provided by the Charles Schwab & Co., Inc., does not constitute and should not be interpreted as an endorsement of any political party.Fixed income securities are subject to increased loss of principal during periods of rising interest rates. Fixed income investments are subject to various other risks including changes in credit quality, market valuations, liquidity, prepayments, early redemption, corporate events, tax ramifications, and other factors.All expressions of opinion are subject to change without notice in reaction to shifting market, economic or political conditions. Data contained herein from third party providers is obtained from what are considered reliable sources. However, its accuracy, completeness or reliability cannot be guaranteed.Investing involves risk, including loss of principal, and for some products and strategies, loss of more than your initial investment.Digital currencies [such as bitcoin] are highly volatile and not backed by any central bank or government. Digital currencies lack many of the regulations and consumer protections that legal-tender currencies and regulated securities have. Due to the high level of risk, investors should view digital currencies as a purely speculative instrument.Cryptocurrency-related products carry a substantial level of risk and are not suitable for all investors. Investments in cryptocurrencies are relatively new, highly speculative, and may be subject to extreme price volatility, illiquidity, and increased risk of loss, including your entire investment in the fund. Spot markets on which cryptocurrencies trade are relatively new and largely unregulated, and therefore, may be more exposed to fraud and security breaches than established, regulated exchanges for other financial assets or instruments. Some cryptocurrency-related products use futures contracts to attempt to duplicate the performance of an investment in cryptocurrency, which may result in unpredictable pricing, higher transaction costs, and performance that fails to track the price of the reference cryptocurrency as intended. Please read more about risks of trading cryptocurrency futures here.The Schwab Center for Financial Research is a division of Charles Schwab & Co., Inc.Apple Podcasts and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries.Google Podcasts and the Google Podcasts logo are trademarks of Google LLC.Spotify and the Spotify logo are registered trademarks of Spotify AB.(0128-0226) Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Nathaniel Bradley spotlights Palo Alto Networks (PANW) after earnings. The stock is trading down in Wednesday's session, which Bradley ascribes to its acquisition spree and integration pressures as a cybersecurity company especially needs to move slowly on its offerings. However, he believes “few can rival” PANW and highlights their annual recurring revenue. He sees the drop as a buying opportunity and thinks the company makes a “great, unabashed contribution” to cybersecurity.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Palo Alto Networks (PANW) posted a strong quarter in earnings but couldn't match that strength in its outlook. As Marley Kayden explains, recent acquisitions by the cybersecurity company cut into full year EPS and spooked investors. Analysts weren't as shaken, with some pointing to upsides thanks to AI tailwinds. Prosper Trading Academy's Charles Moon offers an example options trade for Palo Alto Networks. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Palo Alto Networks CEO Nikesh Arora discusses the company's revised forecast for 2026 and the impact of Palo Alto's recent acquisition of software company CyberArk. Arora spoke with Bloomberg's Ed Ludlow.See omnystudio.com/listener for privacy information.
En este episodio de VG Daily, Valentina Orduz y Andre Dos Santos revisan una sesión bursátil con índices casi planos, pero con tono claramente defensivo, tecnología y software bajo presión, utilities y real estate al alza, y tasas largas cerca de 4%.Luego analizan el reporte de Palo Alto Networks, donde el crecimiento de ingresos y utilidades contrasta con una guía de utilidades más débil por los costos de integrar varias adquisiciones en ciberseguridad e IA, en un contexto en el que el mercado castiga cualquier señal de presión en márgenes, mientras Meta firma un acuerdo multianual para comprar millones de chips de Nvidia y rediseñar sus data centers alrededor de su plataforma de cómputo de IA.Finalmente, conectan este entorno con la economía real a partir del recorte de guía de General Mills, que habla de la debilidad del consumidor y ve caídas en volúmenes en categorías básicas, y lo enmarcan dentro del patrón histórico del segundo año de un primer mandato republicano, típicamente más flojo para el S&P 500 en la primera parte del año.
In der heutigen Folge sprechen die Finanzjournalisten Lea Oetjen und Nando Sommerfeldt über einen Dämpfer für Qiagen, die 200-Milliarden-Dollar-Investitionen von Micron und ein weiteres Kapitel im Kampf um Warner Bros Discovery. Außerdem geht es um Vonovia, Aroundtown, Nvidia, Meta, Paramount Skydance, Netflix, Norwegian Cruise Line, Danaher, Masimo, Südzucker, Palo Alto Networks, Deutsche Telekom, Orange, Swisscom, AT&T, SAP, Alphabet, Amazon, Vodafone, Nokia, Ericsson und iShares STOXX Europe 600 Telecommunications (WKN: A0H08R). Wir freuen uns an Feedback über aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
Verden har fått helt nye trusler. Innen kunstig intelligens pågår et kappløp mellom land, selskap og ondsinnende angripere. Vinner eller taper vi? Hva er trusselbildet fremover? Sikkerhetsdirektøren i verdens største cybersikkerhetsselskap er dagens gjest i E24-podden. Med Wendi Whitmore, Chief Security Intelligence Officer, Palo Alto Networks. Programleder Sindre Heyerdahl og produsent Erik Holm-Nyvold. Ansvarlig redaktør Lars Håkon Grønning. Hør E24-podden der du hører podkast. Analyser, nyheter og innsikt i business og næringsliv. E24-podden ble i mai 2025 kåret til årets aktualitetspodkast under Medieprisene i Bergen.
With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It's also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today's sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »
With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It's also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today's sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »
How to Trade Stocks and Options Podcast by 10minutestocktrader.com
Are you looking to save time, make money, and start winning with less risk? Then head to https://www.ovtlyr.com.Everyone loves the idea of “insanely cheap stocks.” But what if that mindset is exactly what's wrecking portfolios?In this breakdown, we react to a popular video claiming five beaten-down stocks are screaming buys right now. The pitch sounds tempting. Big names like Microsoft, Shopify, Salesforce, SoFi, Palo Alto Networks, and Walmart trading at steep discounts. AI fears. Market panic. Fear and Greed Index swinging wildly. It all feels dramatic.But here's the hard truth: price direction is everything.This episode dives deep into market cycles, stage four downtrends, moving averages, and why buying the dip can quietly drain your account for months. A 44 percent drop does not mean easy upside. It means a massive climb just to break even. That math matters.You'll see real chart examples and powerful comparisons that flip the narrative:✅ Why most investors buy near euphoria and sell near capitulation✅ The brutal math behind recovering from deep drawdowns✅ The difference between assets and consumables✅ Why trends, not opinions, determine profits✅ How OVTLYR helps identify direction, sentiment, and potential reversalsThere's also a live walkthrough of new OVTLYR features, including sentiment tracking, unusual news activity, and trend templates that highlight when momentum actually shifts.This isn't about mocking stock picks. It's about protecting capital. It's about understanding that profits follow price, not projections. Fundamentals can sound impressive, but if the chart is screaming downtrend, ignoring it can be costly.If you've ever felt tempted to “load the boat” on a crashing stock because it looks cheap, this conversation will challenge your thinking in a powerful way.Watch closely. Think critically. And remember, the market rewards discipline, not hope.Subscribe to OVTLYR for disciplined trading strategies that actually make sense.
Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China. Show notes Risky Bulletin: Cambodia promises to dismantle scam networks by April
Our episode takes us from dormitories in Dubai to data centres in Seattle as investors navigate a market that feels both ambitious and anxious. Centurion Corp eyes Middle East expansion as Amazon stumbles, AMD faces scepticism, and Anthropic rides a post-Super Bowl surge - all while the STI flirts with the 5,000 mark. In this episode, hosted by Michelle Martin with Ryan Huang, we unpack Centurion’s “baby steps” into migrant housing demand across the Gulf. US markets pause but remain jittery, with AI reshaping sentiment around Amazon, AMD and Palo Alto Networks. Corporate earnings from Walmart and DoorDash add to the week’s catalysts as India hosts the AI Impact Summit featuring Microsoft and Anthropic. Back home, Yangzijiang Shipbuilding and Keppel Corp outperform while DBS lags the STI.Plus, in UP or DOWN, we size up GuocoLand’s movies and whether Anthropic’s marketing momentum signals something bigger. Hear about:Centurion Corporation, Amazon, AMD, Anthropic, Microsoft, Palo Alto Networks, DoorDash, Walmart, GuocoLand, Yangzijiang Shipbuilding, Keppel Corp, DBS.See omnystudio.com/listener for privacy information.
Innovations in drone technology have expanded their usefulness and made drones increasingly present in everyday life. Despite this progress, key limitations such as short battery life and limited payload capacity have hindered their full potential in critical infrastructure. That reality is beginning to shift. Recent breakthroughs in long-endurance flight are pushing drones beyond these limits and into entirely new possibilities. As these advances reshape what drones can do, we must ask: What new possibilities do these breakthroughs unlock? And what might these possibilities mean for our everyday lives?In this episode, Shane is joined by Brian Hinman, the founder and CEO of SiFly, and John Donovan, the CEO of Qudit Investments and a board member at Palo Alto Networks and Lockheed Martin. As leaders of these innovations in drone technology, they draw on their extensive experience in aviation, defense, and technology to help us explore how this next phase of drone development could change the way we think about infrastructure, emergency response, and the future of aviation itself.
Hiring managers don't remember resumes - they remember storiesIn this episode of Top of the Pile, Karen sits down with storytelling expert and narrative strategist Aaron Calafato to talk about why storytelling isn't just a “nice to have” skill - it's essential to standing out in today's job market.Aaron has helped brands like Indeed, Glassdoor, and Palo Alto Networks build trust through story-driven content, and he brings those same principles into the job search and interview process. Aaron is the creator and host of the award-winning 7 Minute Stories podcast, which has reached over 30 million listeners, and the co-creator and co-host of Glassdoor's The Lonely Office. He also serves as an audio growth strategist for State of Mind, one of Apple's leading mental health podcasts.Together, we break down the difference between simply having conversations versus telling intentional stories, and why most job seekers struggle to clearly communicate their value.We dive into the idea of storycatching — paying attention to your own experiences as they happen — and how self-reflection and self-awareness can help you build short, compelling stories that resonate in interviews and networking conversations. Aaron also explains what a throughline is, why it matters, and how understanding both your own story and a company's mission can dramatically improve how you show up in interviews.If you're a college student, recent grad, or early-career professional trying to articulate your strengths, pivot careers, or feel more confident talking about your experience, this episode will give you practical tools to tell better stories — and get remembered for them.LAUNCH Career Strategies was founded by Karen Elders and Elyse Spalding. We help young professionals launch a successful career path with expert coaching services. Reach out today for an initial FREE coaching session.LinkedIn | Instagram | Facebook
In der heutigen Folge sprechen die Finanzjournalisten Philipp Vetter und Holger Zschäpitz über gute Laune dank OpenAI, einen krassen Einbruch bei Hims & Hers und einen schwachen Tag für deutsche Immobilienwerte. Nvidia, Oracle, Microsoft, SAP, Siemens, Novo Nordisk, Samsung Electronics, Micron, Vonovia, TAG Immobilien, Kyndryl, Monday.com, Workday, AppLovin, On Semi, Amazon, Meta, J.C. Penney, Salesforce, ServiceNow, Crowdstrike, Palo Alto Networks, Asana, Atlassian, Cognizant, den Expanded Tech-Software Sector ETF (WKN: A0B6MN) und die Anleihen von Nvidia Dollar bis 2050 (WKN: A28VHH), Alphabet bis 2050 (WKN: A2802E), Alphabet Dollar 2027 (WKN: A2802B), Oracle Dollar bis 2064 (WKN: A3L339). Wir freuen uns an Feedback über aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
French police raid X's Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishing campaign targeting Dropbox credentials. A new GlassWorn campaign targets macOS developers. Critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation. Researchers disclose a major data exposure on Moltbook, a social network built for AI agents. States bridge the gaps in election security. Nitrogen ransomware has a fatal flaw that permanently destroys data. Supersize your passwords — you want fries with that? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity while overseeing Cortex Xpanse's teams automating attack surface management across some of the world's largest networks. In this episode of Threat Vector, host David Moulton sits down with Dr. Aaron Isaksen to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments. Selected Reading French cops raid X's Paris office in algorithmic bias probe (The Register) US seizes over $400 million in assets from dark web money laundering operation Helix (SC Media) NSA Tells Feds: Zero Trust Must Go Beyond Login (GovInfo Security) New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials (Infosecurity Magazine) New GlassWorm attack targets macOS via compromised OpenVSX extensions (Bleeping Computer) Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack (Hackread) Vibe-Coded Moltbook Exposes User Data, API Keys and More (Infosecurity Magazine) As feds pull back, states look inward for election security support (CyberScoop) Nitrogen Ransomware: ESXi malware has a bug! (Coveware) McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Can AI agents be deployed for enhanced protection? What is a “triple extortion”? How is ransomware evolving? Is there hope for SMEs?Sam Kaplan is a policy, legal, and national security professional with over eighteen years of experience across the public and private sectors. He is currently the Assistant General Counsel for Public Policy & Government Affairs at Palo Alto Networks, providing legal guidance on domestic and international legislative, regulatory, and policy matters, with a focus on cybersecurity, AI governance, privacy, data security, international data flows, and public-private capacity building.Before Palo Alto Networks, Sam led the global product policy team for Facebook's News Feed and News Tab at Meta Platforms, addressing issues like AI/ML fairness, algorithmic transparency, platform integrity, election security, misinformation, and harmful content.Prior to his private sector roles, Sam spent over thirteen years in the Federal Government. He held senior leadership positions at the U.S. Department of Homeland Security, including Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy and Chief Privacy Officer. Earlier government roles included work at the U.S. Department of Justice (Office of Legal Policy, Bureau of Alcohol, Tobacco, Firearms and Explosives, and U.S. Attorney's Office for the Eastern District of Virginia) and as Counselor to a member of the Privacy and Civil Liberties Oversight Board, focusing on the U.S. Intelligence Community.References:* Sam Kaplan on LinkedIn* Palo Alto Networks* Unit 42 Research (Palo Alto Networks)* Cyber Information Sharing and Collaboration Program (CISCP) at CISA (Cybersecurity and Infrastructure Security Agency) This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.mastersofprivacy.com/subscribe
This week, we discuss the end of Cloud 1.0, AI agents fixing old apps, and Chainguard vs. Docker images. Plus, the mystery of Dutch broth is finally solved. Watch the YouTube Live Recording of Episode 556 Runner-up Titles His overall deal Been there and done that been ignoring that shift key for years Cloud is just fine I'll be back in Bartertown The “F” Word Hardened-washing We'll never do this, but we should check back in in 3 months Libraries are the best Elves don't belong in space Rundown Are we at the end of cloud or cloud 1.0 It's the beginning of Cloud 2.0 Spec-driven development system for Claude Code Anthropic and App Modernization A meta-prompting, context engineering and spec-driven development What comes next, if Claude Code is as good as people say. Microsoft Spending on Anthropic Approaches $500 Million a Year Claude Code Won't Fix Your Life Coté and Tony contemplate day two AI-generated apps, and an excerpt. Why We've Tried to Replace Developers Every Decade Since 1969 Well, that escalated quickly: Zero CVEs, lots of vendors Relevant to your Interests Beijing tells Chinese firms to stop using US and Israeli cybersecurity software China blacklists VMware, Palo Alto Networks software over national security fears Kroger taps Google Gemini, announces more key AI moves Texas judge throws out second lawsuit over CrowdStrike outage Apple will pay billions for Gemini after OpenAI declined Dell wants £10m+ from VMware if Tesco case goes against it Tailscale: The Best Free App Most Mac Power Users Aren't Using How WhatsApp Took Over the Global Conversation Our approach to advertising and expanding access to ChatGPT OpenAI's ARR reached over $20 billion in 2025, CFO says Simon Willison's take on Our approach to advertising and ChatGPT The AI lab revolving door spins ever faster | TechCrunch How Markdown took over the world An Interview with United CEO Scott Kirby About Tech Transformation Conferences cfgmgmtcamp 2026, February 2nd to 4th, Ghent, BE. Coté speaking - anyone interested in being an SDI guest? DevOpsDayLA at SCALE23x, March 6th, Pasadena, CA Use code: DEVOP for 50% off. Devnexus 2026, March 4th to 6th, Atlanta, GA. Use this 30% off discount code from your pals at Tanzu: DN26VMWARE30. KubeCon EU, March 23rd to 26th, 2026 - Coté will be there on a media pass. VMware User Groups (VMUGs): Amsterdam (March 17-19, 2026) Minneapolis (April 7-9, 2026) Toronto (May 12-14, 2026) Dallas (June 9-11, 2026) Orlando (October 20-22, 2026) SDT News & Community Join our Slack community Email the show: questions@softwaredefinedtalk.com Free stickers: Email your address to stickers@softwaredefinedtalk.com Follow us on social media: Twitter, Threads, Mastodon, LinkedIn, BlueSky Watch us on: Twitch, YouTube, Instagram, TikTok Book offer: Use code SDT for $20 off "Digital WTF" by Coté Sponsor the show Recommendations Brandon: The Library will loan you a 5G hotspot Matt: Deep Rock Galactic: Survivor (rogue-like Vampire Hunters-type game) Coté: Streamyard shorts generation. Salesforce was inspired by dolphins.
Verizon hit by a major wireless outage. Poland blocks an attack on its power grid. A massive database of French citizens exposed. Microsoft shuts down a cybercrime-as-a-service operation. The UK backs away from digital ID plans. California probes Grok deepfakes. The FTC settles with GM over location data. Palo Alto Networks patches a serious firewall flaw. Plus, John Serafini of HawkEye on modern signals intelligence, and federal agents seize devices from a Washington Post reporter. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today Maria Varmazis sits down with John Serafini, Founder and CEO of Hawkeye 360, on T-Minus to discuss commercial signals intelligence, advanced RF signal processing, and Hawkeye 360's recent acquisition of Innovative Signal Analysis alongside its Series E funding. To hear the full conversation, check out the episode on T-Minus. Selected Reading Verizon Says Service Restored After Thousands Affected by Outage (Bloomberg) Poland says it repelled major cyberattack on power grid, blames Russia (The Record) Massive breach leaks 45 million French records: demographic, healthcare, and financial data all leaked, here's what we know (TechRadar) Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft (Infosecurity Magazine) Government drops plans for mandatory digital ID to work in UK (BBC News) Attorney General Bonta Launches Investigation into xAI, Grok Over Undressed, Sexual AI Images of Women and Children | State of California (Department of Justice) FTC bans GM from selling drivers' location data for five years (Bleeping Computer) Palo Alto Networks warns of DoS bug letting hackers disable firewalls (Bleeping Computer) FBI executes search warrant at Washington Post reporter's home (Washington Post) US cargo tech company publicly exposed its shipping systems and customer data to the web (TechCrunch) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment AI security is no longer optional, it's urgent. In this segment of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation here and listen to new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading Patch Tuesday, January 2026 Edition (Krebs on Security) Adobe Patches Critical Apache Tika Bug in ColdFusion (SecurityWeek) Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities (SecurityWeek) Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM (SecurityWeek) Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (Reuters) Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover (Beyond Machines) Cyberattack forces Belgian hospital to transfer critical care patients (The Record) Betterment confirms data breach after wave of crypto scam emails (Bleeping Computer) Passports, bank details compromised in Eurail data breach (The Register) Lawmakers Urged to Let US Take on 'Offensive' Cyber Role (Bank InfoSecurity) Sean Plankey re-nominated to lead CISA (CyberScoop) Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this special year-end episode of Inside the Network, we're joined by two of the most trusted strategic advisors in cybersecurity - Dino Boukouris, Managing Partner at Altitude Cyber, and Sam Bronstein, Partner at AXOM Partners. Between them, they've worked on billions of dollars in cybersecurity M&A, helped founders navigate exits to the world's largest tech companies, and advised the CEOs behind some of the biggest public and private deals in the industry. In this episode, which also happens to be the 20th episode of Inside the Network, we break down what really happened across the cybersecurity landscape in 2025, from customer buying patterns and budget constraints to the $96B in M&A deal volume. Dino and Sam share insights on what's driving consolidation, how buyers think about valuation and timing, and what defines a hot company in 2026 (hint: it's not just growth). We talk about how mega-deals like Wiz and CyberArk are reshaping competitive dynamics in the industry, why SASE, identity, and security for AI have been the most active M&A themes, and what founders need to understand about building relationships with buyers long before they're ready to exit. Sam and Dino explain that founders who achieve the best outcomes usually build relationships with potential acquirers over many years, and break down why many late-stage founders are likely to choose acquisition over IPO in the coming cycle.We close with tactical advice for founders heading into 2026: how to think about your board and investors, what metrics you'll be judged on, and how to align your capital strategy with your long-term goals. And yes, we also talk about race cars, zero interest rates, outcome-based pricing, and what Palo Alto Networks might buy next.
“A large part of what you bring to work affects everybody else around you, so if you bring joy that becomes infectious, that infection makes the whole place more joyful.”Dipak Golechha is Chief Financial Officer of Palo Alto Networks, the world's leading enterprise cybersecurity company, where Dipak leads global finance and operations. A seasoned finance leader, prior to Palo Alto Networks, Golechha held a variety of global leadership and executive roles around the globe. Prior to joining Palo Alto Networks, Dipak served as CEO of Excelligence Learning Corporation, a childhood education company backed by private equity. Before that, Dipak was CFO at The Nature's Bounty Company, a $3+ billion health and wellness consumer products company with brands including Holland & Barrett. Dipak also spent seven transformative months as CFO of Chobani, helping structure the rapidly growing company through capital raising and private equity partnerships. Dipak spent 18 years at Procter & Gamble in finance and operations leadership roles across multiple geographies. His P&G career began in London before an early expatriate assignment to Caracas, Venezuela. He held finance leadership positions in the Clairol acquisition, corporate treasury, global M&A, and became Global Divisional CFO and COO for Pringles—one of P&G's youngest executives in this role. His final position was leading finance for the global feminine care division. Dipak serves on the board of Spring Health, and holds a B.A. and M.A. in Economics from St. John's College, Cambridge University, This conversation is hosted by P&G Alum Sudha Ranganathan, who's spent over 19 years in diverse Marketing leadership roles at companies like P&G, PayPal, and LinkedIn where she's honed her passion for customer-centric marketing and talent development.This is a sponsored episode with our partners at Palo Alto Networks, a proud global presenting sponsor of the P&G Alumni Network. Interested to feature your company and executives on the P&G Alumni Podcast? Reach out to jswuest@pgalums.com
Idei menü:KvízPasskeyItt a kulcs, hol a kulcs?Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security DealBad Apple - DÁP edition Elérhetőségeink:TelegramTwitterInstagramFacebookMail: info@hackeslangos.show
Nation-states are already harvesting your encrypted data, betting they'll crack it when quantum computers mature. It's happening now. In CXOTalk episode 904, Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, explains what business leaders need to understand about quantum security and how to address it. The impact of quantum computing on cybersecurity will be huge.Key timelines discussed:-- Cryptographically relevant quantum computers expected by end of this decade-- RSA and ECC algorithms deprecated by 2030, disallowed by 2035-- Enterprise cryptographic migrations typically take 5-10 years
While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen. From the show: ASEAN Entities in the Spotlight: Chinese APT Group Targeting Preparing for a Secure Paris 2024 Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025 FBI talks about how China is testing AI in cyberattacks Hear more from Wendi Whitmore on Threat Vector: Episode 5: From Nation States to Cybercriminals Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textIn this episode, Joey Pinz sits down with world traveler, podcast host, and former tech executive Jim Hauck — a man who walked away from the corporate grind at Salesforce and Palo Alto Networks to build a life fueled by adventure, purpose, and people.Jim shares how a layoff became the spark for JPHauck Adventures and Life in the Baggage Claim, where he helps others travel smarter, deeper, and more meaningfully. Together, they explore what separates a tourist from a traveler, the return of human-centered travel advisors in the age of AI, and how exploring the world can heal fear, expand empathy, and reshape purpose.He also opens up about his personal 400-pound weight-loss transformation, his calling to serve the homeless community in Dallas, and the power of gratitude to turn anger into growth.
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France's Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Researchers uncovered a massive exposed database with nearly 4.3 billion professional records openly accessible online. Britain's new MI6 chief warns of an “aggressive, expansionist, and revisionist” Russia. Monday Business Brief. On today's Threat Vector, Michael Heller from Unit 42 chats with security leaders Greg Conti and Tom Cross to unpack the hacker mindset and the idea of “dark capabilities”. A cyber holiday gift guide for the rest of us. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this segment of Threat Vector, host Michael Heller, Managing Editor for Cortex and Unit 42 and Executive Producer of the podcast, sits down with long-time security leaders Greg Conti and Tom Cross to unpack the hacker mindset and the idea of “dark capabilities” inside modern technology companies. You can listen to their full discussion here. Be sure to catch new episodes of Threat Vector by Palo Alto Networks every Thursday on your favorite podcast app. Selected Reading Apple, Google forced to issue emergency 0-day patches (The Register) Google links more Chinese hacking groups to React2Shell attacks (Bleeping Computer) French Interior Ministry confirms cyberattack on email servers (Bleeping Computer) Atlassian Patches Critical Apache Tika Flaw (SecurityWeek) Microsoft: December security updates cause Message Queuing failures (Bleeping Computer) 16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records (Hackread) MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin (The Record) Saviynt raises $700 million in Series B growth equity financing. (The CyberWire Business Brief) Last-minute cybersecurity and privacy gifts your friends and family won't hate (This Week In Security) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
We will analyze how the AI arms race is triggering massive Big Tech debt issuance to fund data center construction, and what this "mega-issuance" means for the stability and "spreads" of the investment-grade credit market.Today's Stocks & Topics: Upwork Inc. (UPWK), Market Wrap, Vanguard Total Stock Market Index Fund ETF Shares (VTI), “AI's Credit Market Footprint: Financing the Data Center Boom”, Costco Wholesale Corporation (COST), Key Benchmark Numbers: Treasury Yields, Gold, Silver, Oil and Gasoline, Target Date Funds (TDFs), Onto Innovation Inc. (ONTO), Palo Alto Networks, Inc. (PANW), Mega Mergers.Our Sponsors:* Check out Incogni: https://incogni.com/investtalk* Check out Invest529: https://www.invest529.com* Check out NordProtect: https://nordprotect.com/investalk* Check out Progressive: https://www.progressive.com* Check out Quince: https://quince.com/INVEST* Check out TruDiagnostic and use my code INVEST for a great deal: https://www.trudiagnostic.comAdvertising Inquiries: https://redcircle.com/brands