Podcasts about Palo Alto Networks

American technology company

  • 595PODCASTS
  • 1,757EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 6, 2025LATEST
Palo Alto Networks

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Palo Alto Networks

Show all podcasts related to palo alto networks

Latest podcast episodes about Palo Alto Networks

The Stock Doctor
Episode 136 – Indian Automakers Back on Track Albeit Marginally and Why I am Bullish on This Cybersecurity Name

The Stock Doctor

Play Episode Listen Later Aug 6, 2025 33:24


On this week's episode of The Stock Doctor Podcast, I discuss:1. The July sales numbers of the Indian automakers and what they mean for auto investors, and2. Why I continue to remain bullish on cybersecurity giant, Palo Alto Networks (ticker: PANW) despite the short-term negativity around the stockThank you once again for listening. See you next week! Until then, stay safe and make some money!P.S: If you have a specific Indian or US stock suggestion for the doctor to diagnose, do tweet me @uthamvinay or email me on⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ thestockdoctorpodcast@gmail.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Packet Pushers - Full Podcast Feed
NB537: Palo Alto Networks IDs New Market With $25 Billion CyberArk Buy; Intel to Shed Networking Biz

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Aug 4, 2025 34:54


Take a Network Break! Guest opinionator Tom Hollingsworth joins Johna Johnson to opine on the latest tech news. On the vulnerability front, several versions of BentoML are open to a server side request forgery. Looking at tech news, Intel will spin out its networking and edge group as it continues cost-cutting, Palo Alto Networks makes... Read more »

Packet Pushers - Network Break
NB537: Palo Alto Networks IDs New Market With $25 Billion CyberArk Buy; Intel to Shed Networking Biz

Packet Pushers - Network Break

Play Episode Listen Later Aug 4, 2025 34:54


Take a Network Break! Guest opinionator Tom Hollingsworth joins Johna Johnson to opine on the latest tech news. On the vulnerability front, several versions of BentoML are open to a server side request forgery. Looking at tech news, Intel will spin out its networking and edge group as it continues cost-cutting, Palo Alto Networks makes... Read more »

Packet Pushers - Fat Pipe
NB537: Palo Alto Networks IDs New Market With $25 Billion CyberArk Buy; Intel to Shed Networking Biz

Packet Pushers - Fat Pipe

Play Episode Listen Later Aug 4, 2025 34:54


Take a Network Break! Guest opinionator Tom Hollingsworth joins Johna Johnson to opine on the latest tech news. On the vulnerability front, several versions of BentoML are open to a server side request forgery. Looking at tech news, Intel will spin out its networking and edge group as it continues cost-cutting, Palo Alto Networks makes... Read more »

Cyber Security Today
Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats

Cyber Security Today

Play Episode Listen Later Aug 4, 2025 9:46 Transcription Available


In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powered Code Editor 'Cursor', which could allow prompt injection attacks. Further topics include a new ransomware attack exploiting Microsoft SharePoint vulnerabilities investigated by Palo Alto Networks, and a campaign leveraging fake OAuth apps to compromise Microsoft 365 accounts. The episode underscores the importance of robust security measures, emphasizing MFA, OAuth hygiene, and prompt patching. 00:00 Introduction and Headlines 00:38 Hamilton's Ransomware Attack and Insurance Denial 02:52 AI-Powered Code Editor Vulnerability 04:57 Palo Alto Networks Investigates SharePoint Exploitation 06:51 Fake OAuth Apps and Microsoft 365 Breaches 08:48 Conclusion and Upcoming Events

Partnerships Unraveled
Anar Desai - Inside the Channel Evolution of Palo Alto Networks

Partnerships Unraveled

Play Episode Listen Later Aug 4, 2025 26:25 Transcription Available


This week on Partnerships Unraveled, we're joined by Anar Desai, VP of Ecosystems at Palo Alto Networks, a company that's grown from 5,600 to over 19,000 employees during his tenure. Anar shares a front-row perspective on leading channel strategy through explosive growth, shifting from single-product sales to platform-led transformation, and embedding AI into both partnerships and operations.In this episode, Anar unpacks:- Why in-person presence and improvisational skill matter more than ever in channel roles.- How platformization is redefining partner value, especially through long-term services.- The real AI opportunity in the channel, boosting enablement, collapsing sales cycles, and driving revenue.- Why integrity, intentionality, and transparent feedback loops are essential for trust and longevity in partnerships.Whether you're building a next-gen partner program or navigating the delicate balance of incentives and alignment, Anar's insights are a must-listen for anyone operating at the intersection of growth and ecosystems.Connect with Anar: https://www.linkedin.com/in/anard/_________________________Learn more about Channext

Techzine Talks
Palo Alto Networks koopt CyberArk voor 25 miljard: wat betekent dit?

Techzine Talks

Play Episode Listen Later Aug 4, 2025 22:49


In deze aflevering van Techzine Talks bespreken Coen en Sander de megaovername van CyberArk door Palo Alto Networks voor 25 miljard dollar. We duiken diep in wat deze consolidatie betekent voor de cybersecurity-industrie en waarom identity access management en ook privilege access management nu zo cruciaal wordt.De overname toont de strategische shift naar identity-first security, gedreven door AI en machine identities. We analyseren of dit goed uitpakt voor bestaande CyberArk-klanten en hoe dit past in de bredere trend van security-platformconsolidatie.Hoofdstukken:0:20 Welkom en technische updates1:03 De 25 miljard dollar overname2:13 Palo Alto's platformstrategie4:21 Wat is Identity en Privilege Access Management?6:18 Waarom nu? De AI en machine identity factor10:09 CyberArk als marktleider in PAM10:15 Is de overname definitief?15:52 Gevolgen voor klanten en innovatie19:21 Sentinel One geruchten en marktconsolidatie21:55 Samenvatting en toekomstperspectief

Software Defined Talk
Episode 531: YAYAML

Software Defined Talk

Play Episode Listen Later Aug 1, 2025 59:05


This week, we discuss the AI hype cycle, Astronomer's viral moment, and yet another YAML flavor — KYAML. Plus, private equity is coming for your donuts. Watch the YouTube Live Recording of Episode (https://www.youtube.com/live/Lul4dCCIT24?si=qeBAZXHmFBdRuuAx) 531 (https://www.youtube.com/live/Lul4dCCIT24?si=qeBAZXHmFBdRuuAx) Runner-up Titles Sometimes it's hard to make money I've given into Big Donut Maybe you can fake your way through life At some point you have to have some expertise AI has no taste Can you fix my PowerPoint? There is a chance we're all going to be naked soon Gobbling up the dark fiber WHYAML Waymo for Babies Rundown Beloved Texas doughnut chain sold to California equity firm (https://www.khou.com/article/news/local/shipley-do-nuts-sold-private-equity-houston-texas/285-259116a6-8819-4b32-8ca8-20359bb4f1e1) AI Mid-Year Hype-Cycle Check-in Gartner hype cycle (https://en.wikipedia.org/wiki/Gartner_hype_cycle) Betting on AI: The Delusion Driving Big Tech - Last Week in AWS Podcast (https://www.lastweekinaws.com/podcast/screaming-in-the-cloud/betting-on-ai-the-delusion-driving-big-tech/) Clouded Judgement 7.25.25 - TAMs Lie (https://cloudedjudgement.substack.com/p/clouded-judgement-72525-tams-lie?utm_source=post-email-title&publication_id=56878&post_id=169176822&utm_campaign=email-post-title&isFreemail=true&r=2l9&triedRedirect=true&utm_medium=email) Microsoft's AI CEO thinks Copilot will age and ‘have a room that it lives in' (https://www.theverge.com/news/713715/microsoft-copilot-appearance-feature-age-mustafa-suleyman-interview) Flaw in Gemini CLI coding tool could allow hackers to run nasty commands (https://arstechnica.com/security/2025/07/flaw-in-gemini-cli-coding-tool-allowed-hackers-to-run-nasty-commands-on-user-devices/) Claude Code is a slot machine (https://rgoldfinger.com/blog/2025-07-26-claude-code-is-a-slot-machine/) The Hater's Guide to the AI Bubble (https://www.wheresyoured.at/the-haters-gui/) 2025 Stack Overflow Developer Survey (https://survey.stackoverflow.co/2025/) 2025 Stack Overflow sentiment and usage section (https://survey.stackoverflow.co/2025/ai/#sentiment-and-usage) Astronomer Data Pipelines with Apache Airflow (https://www.thecloudcast.net/2025/07/data-pipelines-with-apache-airflow.html) Astronomer (@astronomerio) on X (https://x.com/astronomerio/status/1948890827566317712?s=46&t=EoCoteGkQEahPpAJ_HYRpg) Ryan Reynolds' ad agency, was behind the Gwyneth Paltrow Astronomer ad (https://www.businessinsider.com/ryan-reynolds-maximum-effort-gwyneth-paltrow-astronomer-ad-2025-7) Introducing KYAML, a safer, less ambiguous YAML subset / encoding (https://github.com/kubernetes/enhancements/blob/master/keps/sig-cli/5295-kyaml/README.md#summary) Palo Alto Networks to acquire CyberArk in $25 billion deal (https://www.cnbc.com/2025/07/30/palo-alto-networks-cyberark-deal.html) Relevant to your Interests Microsoft's Satya Nadella says job cuts have been 'weighing heavily' on him (https://www.cnbc.com/2025/07/24/microsoft-satya-nadella-memo-layoffs.html) IBM shares drop as software revenue misses (https://www.cnbc.com/2025/07/23/ibm-q2-earnings-report-2025.html) MSFT Teams in your car? (https://www.theverge.com/news/708481/microsoft-teams-mercedes-benz-integration-in-car-camera-support) Y2K38 bug? Debian switching to 64-bit time for everything (https://www.theregister.com/2025/07/25/y2k38_bug_debian/) A.I.-Driven Education: Founded in Texas and Coming to a School Near You (https://www.nytimes.com/2025/07/27/us/politics/ai-alpha-school-austin-texas.html) How Anthropic teams use Claude Code (https://www.anthropic.com/news/how-anthropic-teams-use-claude-code?utm_source=changelog-news) Anthropic unveils new rate limits to curb Claude Code power users (https://techcrunch.com/2025/07/28/anthropic-unveils-new-rate-limits-to-curb-claude-code-power-users/) Alphabet's Q2 revenue beats estimates as cloud computing surges (https://www.fastcompany.com/91373657/alphabet-google-earnings-q2-cloud-ai) Listener Feedback Steve recommends Lessons from Production (https://podcast.techwithkunal.com) Podcast (https://podcast.techwithkunal.com) Conferences Sydney Wizdom Meet-Up (https://www.wiz.io/events/sydney-wizdom-meet-up-aug-2025), Sydney, August 7. Matt will be there. SpringOne (https://www.vmware.com/explore/us/springone?utm_source=organic&utm_medium=social&utm_campaign=cote), Las Vegas, August 25th to 28th, 2025. See Coté's pitch (https://www.youtube.com/watch?v=f_xOudsmUmk). Explore 2025 US (https://www.vmware.com/explore/us?utm_source=organic&utm_medium=social&utm_campaign=cote), Las Vegas, August 25th to 28th, 2025. See Coté's pitch (https://www.youtube.com/shorts/-COoeIJcFN4). Wiz Capture the Flag (https://www.wiz.io/events/capture-the-flag-brisbane-august-2025), Brisbane, August 26. Matt will be there. SREDay London (https://sreday.com/2025-london-q3/), Coté speaking, September 18th and 19th. Civo Navigate London (https://www.civo.com/navigate/london/2025), Coté speaking, September 30th. Texas Linux Fest (https://2025.texaslinuxfest.org), Austin, October 3rd to 4th. CFP closes August 3rd (https://www.papercall.io/txlf2025). CF Day EU (https://events.linuxfoundation.org/cloud-foundry-day-europe/), Frankfurt, October 7th, 2025. AI for the Rest of Us (https://aifortherestofus.live/london-2025), Coté speaking, October 15th to 16th, London. SDT News & Community Join our Slack community (https://softwaredefinedtalk.slack.com/join/shared_invite/zt-1hn55iv5d-UTfN7mVX1D9D5ExRt3ZJYQ#/shared-invite/email) Email the show: questions@softwaredefinedtalk.com (mailto:questions@softwaredefinedtalk.com) Free stickers: Email your address to stickers@softwaredefinedtalk.com (mailto:stickers@softwaredefinedtalk.com) Follow us on social media: Twitter (https://twitter.com/softwaredeftalk), Threads (https://www.threads.net/@softwaredefinedtalk), Mastodon (https://hachyderm.io/@softwaredefinedtalk), LinkedIn (https://www.linkedin.com/company/software-defined-talk/), BlueSky (https://bsky.app/profile/softwaredefinedtalk.com) Watch us on: Twitch (https://www.twitch.tv/sdtpodcast), YouTube (https://www.youtube.com/channel/UCi3OJPV6h9tp-hbsGBLGsDQ/featured), Instagram (https://www.instagram.com/softwaredefinedtalk/), TikTok (https://www.tiktok.com/@softwaredefinedtalk) Book offer: Use code SDT for $20 off "Digital WTF" by Coté (https://leanpub.com/digitalwtf/c/sdt) Sponsor the show (https://www.softwaredefinedtalk.com/ads): ads@softwaredefinedtalk.com (mailto:ads@softwaredefinedtalk.com) Recommendations Brandon: Uber Teen (https://www.uber.com/us/en/ride/teens/) Matt: Software Defined Interviews - Chris Dancy (https://www.softwaredefinedinterviews.com/105) Photo Credits Header (https://unsplash.com/photos/white-and-black-floral-round-decor-qZ6uvJHLHFc)

Capital
Roberto Moro: “la tendencia sigue intacta”

Capital

Play Episode Listen Later Aug 1, 2025 20:07


Roberto Moro analiza el arranque de mes en el mercado y asegura que “la tendencia sigue intacta”. El IBEX 35 retrocede en esta primera sesión de agosto, tras cerrar julio en máximos de 2008 y advierte que hay que calificarlo como “un pasito para atrás que aún está por ver”. En Capital Intereconomía, el experto analizaba a partir de los índices cómo el escenario sigue -tal vez demasiado bien, decía- a pesar del discurso de Trump: “La tendencia sigue intacta. Alcista lateral en Europa; alcista o muy alcista en EE.UU. Para mi no hay cambios” El escenario siguen siendo el mismo A la hora de apoyarse en el gráfico, Moro señalaba que “el S&P 500 deja una vela negra semanal que no implica en principio, continuación de las caídas. A su juicio: “estamos lejos en cualquiera de los índices americanos de zonas de soporte siquiera de corto plazo. El escenario sigue siendo el mismo” Análisis de Palo Alto En el consultorio de Capital Intereconomía, se analizan valores protagonistas y entre ellos se colaba las cuestiones en torno a Palo Alto tras la compra de la israelí Cyberark Software, por un importe de 25.000 millones de dólares, en lo que se ha erigido como una de las grandes operaciones globales de los últimos días. Palo Alto Networks caía el jueves 5% y perdía un soporte muy relevante a corto plazo. En su análisis, Roberto Moro decía que lo importante va más allá, dado que en estas dos últimas sesiones ha perdido la media móvil de 200. “Parece más abocado a buscar correcciones proporcionales de fibonacci con respecto a la última subida que comenzó en 144, que a lo contrario”. Según su análisis, quizás sí haya llegado el momento de deshacer posiciones si lo tiene comprado. Cada día un máximo Entre los valores que más destacaba el experto apuntaba a Palantir: “me parece uno de los más alcistas desde que superó la zona de 125 y me parece uno de los más alcistas del mercado americano. Según el análisis de Roberto Moro, Palantir es una buena opción; “Consigue cada día un nuevo máximo histórico. Sin verticalidad pero sí recurrente”. Considera que es “perfecto” para entrar; y si se tienen en cartera es para celebrarlo.

Verdict with Ted Cruz
BONUS POD: Pelosi Under Fire as Trump Slams ‘Disgraceful' Stock Gains

Verdict with Ted Cruz

Play Episode Listen Later Jul 31, 2025 11:02 Transcription Available


Allegations by Donald Trump: Former President Donald Trump is quoted calling for an investigation into Nancy Pelosi, accusing her of using insider information to amass wealth through stock trading. He claims Pelosi has achieved returns “practically in the history of Wall Street” and suggests this is due to her access to non-public information. Financial Discrepancies Highlighted: Pelosi’s government salary is cited as $174,000/year, yet her net worth is reported to have grown from $114.7 million in 2018 to potentially $413 million by 2024. The file references sources like OpenSecrets, Investopedia, and The Times to support these figures. Paul Pelosi reportedly earned between $7.8 million and $42.5 million in 2024 from stock trades. Stock Performance: The Pelosi portfolio allegedly returned 54% in 2024, outperforming the S&P 500’s 25% gain. Notable trades included early investments in Nvidia and Palo Alto Networks, and timely sales of Microsoft and Visa. Pelosi’s Response: In a CNN interview with Jake Tapper, Pelosi deflects the insider trading question, emphasizing her focus on the 60th anniversary of Medicaid. She denies wrongdoing, stating: “I’m not into it. My husband is,” and accuses Trump of “projecting.” Please Hit Subscribe to this podcast Right Now. Also Please Subscribe to the Ben Ferguson Show Podcast and Verdict with Ted Cruz Wherever You get You're Podcasts. Thanks for Listening #seanhannity #hannity #marklevin #levin #charliekirk #megynkelly #tucker #tuckercarlson #glennbeck #benshapiro #shapiro #trump #sexton #bucksexton#rushlimbaugh #limbaugh #whitehouse #senate #congress #thehouse #democrats#republicans #conservative #senator #congressman #congressmen #congresswoman #capitol #president #vicepresident #POTUS #presidentoftheunitedstatesofamerica#SCOTUS #Supremecourt #DonaldTrump #PresidentDonaldTrump #DT #TedCruz #Benferguson #Verdict #maga #presidenttrump #47 #the47morningupdate #donaldtrump #trump #news #trumpnews #Benferguson #breaking #breakingnews #morningupdateYouTube: https://www.youtube.com/@VerdictwithTedCruzSee omnystudio.com/listener for privacy information.

The CyberWire
Open source, open target.

The CyberWire

Play Episode Listen Later Jul 31, 2025 28:41


A sweeping malware campaign by North Korea's Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo Alto Networks' Unit 42 proposes a new Attribution Framework. Honeywell patches six vulnerabilities in its Experion Process Knowledge System. Researchers track the rapid evolution of a sophisticated Android banking trojan. Scattered Spider goes quiet following recent arrests. Our guests are Jermaine Roebuck and Ann Galchutt from CISA, discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response." A Polish trainmaker sues hackers for fixing trains. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jermaine Roebuck, Associate Director for Threat Hunting at CISA and Ann Galchutt, Technical Lead at CISA, who will be discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response." Selected Reading Sonatype uncovers global espionage campaign in open source ecosystems (Sonatype) Trump administration is launching a new private health tracking system with Big Tech's help (AP News) Report Links Chinese Companies to Tools Used by State-Sponsored Hackers (SecurityWeek) Top 5 GenAI Tools Vulnerable to Man-in-the-Prompt Attack, Billions Could Be Affected (LayerX) Introducing Unit 42's Attribution Framework (Unit42) Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes (SecurityWeek) Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed Cybercriminals ‘Spooked' After Scattered Spider Arrests (Infosecurity Magazine) Polish Train Maker Is Suing the Hackers Who Exposed Its Anti-Repair Tricks (iFixit) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Moor Insights & Strategy Podcast
Ep47 Datacenter Podcast Palo Alto Networks & CyberArk, FTQC, Dell, Intel, Microsoft, AI & Consulting

Moor Insights & Strategy Podcast

Play Episode Listen Later Jul 31, 2025 52:52


Welcome to this week's edition of “MI&S Datacenter Podcast.” Join Moor Insights & Strategy co-hosts Matt, Will, and Paul as they analyze the week's top datacenter and datacenter edge news. They talk compute, cloud, security, storage, networking, operations, data management, AI, quantum, and more!    We will be talking on this week's show about:   Palo Alto Networks & CyberArk https://www.linkedin.com/posts/wstownsend_palo-alto-networks-announces-agreement-to-activity-7356466398220439554-VZnH?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAAdOCkB7GSD8YuNAaXuDKP_xFHkrnLbNFk   What the Hell is FTQC? https://www.linkedin.com/pulse/beyond-hype-practical-applications-ftqc-paul-smith-goodson-6wsq/ https://www.forbes.com/sites/moorinsights/2025/06/10/ibms-vision-for-a-large-scale-fault-tolerant-quantum-computer-by-2029/   How Dell is addressing sustainability in the AI era https://moorinsightsstrategy.com/research-notes/has-ai-killed-the-sustainability-charge-dell-says-no/   Intel plans networking spin off https://www.linkedin.com/posts/wstownsend_intels-networking-spin-off-desperate-gamble-activity-7356408254513508352-bNdB?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAAdOCkB7GSD8YuNAaXuDKP_xFHkrnLbNFk   4D without Glasses https://azure.microsoft.com/en-us/blog/quantum/2025/06/19/microsoft-advances-quantum-error-correction-with-a-family-of-novel-four-dimensional-codes/   AI reinvigorates the consulting game https://www.linkedin.com/feed/update/urn:li:activity:7356342771839848448/   Disclaimer: This show is for information and entertainment purposes only. While we will discuss publicly traded companies on this show. The contents of this show should not be taken as investment advice.  

Audio News
PALO ALTO FORTALECE SU APUESTA EN SEGURIDAD DE IDENTIDAD CON LA COMPRA DE CYBERARK

Audio News

Play Episode Listen Later Jul 31, 2025 4:14


Uniendo tecnologías avanzadas impulsadas por inteligencia artificial para proteger identidades humanas, de máquinas y agentes autónomos, Palo Alto Networks adquiere a CyberArk, en una operación que marca su ingreso definitivo al mercado de seguridad de identidades.

The Rundown
Starbucks' Turn-Around Plan Shows No Signs of Improvement, Palo Alto Networks Makes $25B Acquisition

The Rundown

Play Episode Listen Later Jul 30, 2025 9:51


Stock market update for July 30, 2025. This video is for informational purposes only and reflects the views of the host and guest, not Public Holdings or its subsidiaries. Mentions of assets are not recommendations. Investing involves risk, including loss. Past performance does not guarantee future results. For full disclosures, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Public.com/disclosures⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Unsupervised Learning
A Conversation With Sarit Tager from Prisma Cloud

Unsupervised Learning

Play Episode Listen Later Jul 29, 2025 25:31 Transcription Available


➡ Prevent Risk At The Source with Cortex Cloud: https://www.paloaltonetworks.com/cortex/cloud/application-security In this sponsored conversation, I speak with Sarit Tager, VP of Product Management at Palo Alto Networks, about how Prisma Cloud and their new ASPM solution are transforming cloud and application security by unifying data and deeply integrating business context into AppSec workflows. We talk about: Unifying AppSec, Cloud, and SOC into One Data Lake How Palo Alto merged their products into a single system that consolidates runtime, code, identity, cloud, and SOC data, allowing for true context-aware risk prioritization and faster response times across the board. From Detection to Dynamic Prevention Why the future of application security isn’t just about discovering vulnerabilities, but enforcing smart, context-based guardrails during development, CI/CD, and build processes to prevent issues before they reach production. AI-Powered Insight and the Future of Secure DevOpsHow their system uses AI to analyze the full security posture, enrich findings, simulate attack paths, and recommend precise mitigations. The platform even helps guide security and engineering teams through better workflows, boosting velocity, and not blocking it. Subscribe to the newsletter at:https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://x.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler Chapters: 00:00 – Sarit’s Background and the Goal of Unifying Security Context01:50 – Building a Single Data Lake for Cloud, SOC, and AppSec04:28 – From Noise to Clarity: Fixing the Prioritization Problem in AppSec06:47 – Using Business Context to Drive Risk-Based Decisions10:18 – True App Ownership, Developer Velocity, and Aligning with Business Impact13:12 – Continuous Discovery and Bringing External Signals Into One View15:25 – Why App Grouping and Context-Rich Policies Increase Velocity17:58 – How Attackers Are Already Building Their Own Unified Context (UEC)20:45 – Prisma’s Control Points: IDE, PR, CI/CD, Image, Admission Control21:56 – Bringing In Data From External Scanners and Enriching Coverage24:23 – Ecosystem Signals, Query Language, and Intelligent Workflow Automation25:05 – Closing Thoughts: Security and Developers Working TogetherBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

Cyber Risk Management Podcast
EP 189: Agentic AI and Ransomware

Cyber Risk Management Podcast

Play Episode Listen Later Jul 29, 2025 40:19


Unit 42 (Palo Alto Networks) just showed they can use AI to conduct a complete ransomware attack in 25 minutes, a 100x speed increase. What does this mean for defenders? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.

Audio News
OKTA Y PALO ALTO FORTALECEN LA CIBERSEGURIDAD IMPULSADA POR IA

Audio News

Play Episode Listen Later Jul 29, 2025 3:47


Combinando identidad digital e inteligencia artificial, Okta y Palo Alto Networks refuerzan su alianza con soluciones integradas que automatizan la respuesta a amenazas, aseguran el acceso a aplicaciones y simplifican la gestión en entornos corporativos.

The Ravit Show
Securing the AI Agent Era: A CISO's Playbook

The Ravit Show

Play Episode Listen Later Jul 28, 2025 11:14


What does it really take to secure AI as it becomes part of the fabric of how we work? I had the chance to sit down with Sunil Agrawal, Chief Information Security Officer at Glean — and the company's first-ever CISO — to dive deep into this question.Sunil's perspective is clear: securing AI isn't about slapping on controls after deployment. It's about building secure AI by design — from prompt injection defense to real-time content protection and fine-grained governance.In our conversation, we covered a lot of ground:Why traditional security frameworks fall short for AI agentsHow Glean is preventing real-world attacks like jailbreaks and prompt injectionsWhy content awareness is key to managing sensitive data exposureWhat true visibility and control over agents looks like in the enterpriseWhy trust — not just compliance — is the new security currencyAnd how their new partnership with Palo Alto Networks is raising the bar on threat detection and posture managementWith over 100 million actions now executed by Glean's AI agents each year, it's no longer a hypothetical risk landscape — it's a live one.If you're responsible for security, IT, or AI strategy at your org, I highly recommend giving this interview a watch. It'll reshape how you think about governance, risk, and the future of work.Let me know what resonated with you — and if you're thinking differently about securing your AI initiatives after this.#data #ai #agents #GleanGo #theravitshow

The CyberWire
Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]

The CyberWire

Play Episode Listen Later Jul 26, 2025 36:11


Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group's shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today's threat landscape and what's coming next. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]

Research Saturday

Play Episode Listen Later Jul 26, 2025 36:11


Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group's shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today's threat landscape and what's coming next. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices

Packet Pushers - Full Podcast Feed
PP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 22, 2025 46:20


CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss... Read more »

Packet Pushers - Fat Pipe
PP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?

Packet Pushers - Fat Pipe

Play Episode Listen Later Jul 22, 2025 46:20


CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss... Read more »

Telecom Reseller
Rethinking Cybersecurity Distribution: Exclusive Networks Brings Channel Services Aggregation to North America, Podcast

Telecom Reseller

Play Episode Listen Later Jul 22, 2025


Why Exclusive Networks says modern cybersecurity requires more than “pick, pack, and ship” “We're not just a distributor. We're a channel services aggregator — an extension of our partners' businesses.” — Jason Beal, President, Americas, Exclusive Networks In this episode of Technology Reseller News, publisher Doug Green sits down with Jason Beal, President, Americas, and Andrew Warren, VP of Sales and Marketing, North America, to explore how Exclusive Networks is rewriting the rules of cybersecurity distribution in North America. More than just moving product, Exclusive Networks delivers white-glove service, certified expertise, and true channel partnership — simplifying cybersecurity sales and delivery for MSPs, MSSPs, and solution providers. With over 45 country operations and reach into 170 markets, the company now brings its global playbook to North America with fresh investments, expanded services, and a unique partner-first approach. Key Highlights from the Conversation: Partner Empathy as Philosophy Exclusive Networks builds programs around the real-world needs of partners — from helping an MSP with student-powered hiring programs to assisting with complex financing, logistics, and field deployment. From MSP to MSSP, Cyber Expertise at Every Step Whether you're a security-focused MSP or a fully-fledged MSSP, Exclusive offers domain expertise, hands-on technical support, and services like SASE implementation, firewall deployment, and SOC augmentation through its CloudRise acquisition. Training & Certification Simplified With global training centers and relationships with top vendors like Fortinet and Palo Alto Networks, Exclusive lowers the barrier for entry but offers high benefits for those who commit to deep certification and specialization. Demand Generation for End Users and Partners Exclusive not only helps vendors reach the market — it also helps partners generate demand directly from end users, creating new revenue opportunities across the lifecycle. A New Kind of Distributor Exclusive Networks calls itself a “channel services aggregator”, offering a full lifecycle of services — from sales support and technology enablement to post-sales adoption and renewals — redefining what a modern cybersecurity distributor should be. What's Next? Expect new vendor partnerships, expanded services, and continued investment in dedicated local support across the U.S. and Canada — all backed by the belief that “people still do business with people.” Learn more at: www.exclusive-networks.com

Packet Pushers - Full Podcast Feed
Tech Bytes: How Is SD-WAN Driving SASE Success (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 21, 2025 20:46


Today on the Tech Bytes podcast, sponsored by Palo Alto Networks, we examine how SASE is being adopted and deployed by enterprise customers. What does this integration of networking and security mean for the teams that need to operate this solution? We talk with Palo Alto Networks about SASE as a transformative technology for networking... Read more »

Packet Pushers - Briefings In Brief
Tech Bytes: How Is SD-WAN Driving SASE Success (Sponsored)

Packet Pushers - Briefings In Brief

Play Episode Listen Later Jul 21, 2025 20:46


Today on the Tech Bytes podcast, sponsored by Palo Alto Networks, we examine how SASE is being adopted and deployed by enterprise customers. What does this integration of networking and security mean for the teams that need to operate this solution? We talk with Palo Alto Networks about SASE as a transformative technology for networking... Read more »

Moor Insights & Strategy Podcast
Ep46 MI&S Datacenter Podcast Talking Palo Alto Networks & Okta, Microsoft, AWS, Zscaler, Q-CTRL, IBM

Moor Insights & Strategy Podcast

Play Episode Listen Later Jul 17, 2025 54:20


Welcome to this week's edition of “MI&S Datacenter Podcast.” Join Moor Insights & Strategy co-hosts Matt, Will, and Paul as they analyze the week's top datacenter and datacenter edge news. They talk compute, cloud, security, storage, networking, operations, data management, AI, quantum, and more!   We will be talking on this week's show about:   Palo Alto Networks & Okta Partnership https://x.com/WillTownTech/status/1945223993096655338   Microsoft, Atom Computing, & Magne https://www.qunorth.com   AWS Summit & The Agentic Lifecycle https://www.linkedin.com/feed/update/urn:li:activity:7351302065609994240/   Zscaler's Zero Trust Solution Scales https://www.linkedin.com/posts/wstownsend_zscaler-extends-zero-trust-platform-to-enable-activity-7348392046908358658-1XcG?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAAdOCkB7GSD8YuNAaXuDKP_xFHkrnLbNFk   Next-Gen Naval Nav https://thequantuminsider.com/2025/07/16/q-ctrls-new-maritime-quantum-navigation-solution-successfully-undergoes-first-defense-trials-at-sea/   IBM Power11 & TAM Expansion https://www.forbes.com/sites/patrickmoorhead/2025/07/14/ibm-aims-to-expand-its-infrastructure-market-reach-with-power11/    Disclaimer: This show is for information and entertainment purposes only. While we will discuss publicly traded companies on this show. The contents of this show should not be taken as investment advice.  

Secure Ventures with Kyle McNulty
Descope | Co-founder Rishi Bhargava on Cybersecurity GTM

Secure Ventures with Kyle McNulty

Play Episode Listen Later Jul 15, 2025 44:28


With me in this episode is Rishi Bhargava, co-founder of Descope. Rishi has a standout background having founded Demisto in 2015 and then selling to Palo Alto Networks in 2019 for over $500 million dollars. Before Demisto, he was a VP at McAfee and Intel. Rishi is extremely knowledgable about go-to-market in the cyber domain, and we dove into his lessons learned over his career and how he has applied those to Descope for customer identity.Website

Modern CTO with Joel Beasley
Security for AI, or AI for Security? With Nick Calver, VP at Palo Alto Networks

Modern CTO with Joel Beasley

Play Episode Listen Later Jul 14, 2025 45:36


Today, we're talking to Nick Calver, VP of Financial Services at Palo Alto Networks. We discuss the state of AI ransomware attacks, what the mindset is to best prepare for them, and how to think about product consolidation in order to best serve your customers. All of this right here, right now, on the Modern CTO Podcast! To learn more about Palo Alto Networks, check out their website here.

Masters of Privacy
Nathalie Barrera: NIS2 (EU) and the interplay between cybersecurity, privacy, AI, and IoT data laws

Masters of Privacy

Play Episode Listen Later Jul 13, 2025 30:33


Will EU cybersecurity laws result in new global standards? Should companies handle NIS2 compliance in concert with GDPR, AI Act, or Data Act requirements? Does it make sense to take data localization to its ultimate consequences? Nathalie Barrera serves as the Director for Privacy for the EMEA region at Palo Alto Networks, which is a leading provider of cybersecurity solutions. Her expertise involves the company's compliance with NIS2, the AI Act, the GDPR, and DORA. She also assists customers in navigating their own complex regulatory requirements. She has previously spent seven years at Cisco Systems working as commercial counsel and Privacy and Security Counsel.  She studied law and completed her LLM at the University of Navarra.  References: Nathalie Barrera on LinkedIn EU Network and Information Services Directive II EU Data Act EU Digital Operational Resilience Act (DORA)  

The CyberWire
Memory leaks and login sneaks.

The CyberWire

Play Episode Listen Later Jul 8, 2025 30:50


Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offline after reports of RCE vulnerabilities. President Trump's spending bill allocates hundreds of millions for cybersecurity. Nearly 26 million job seekers' resumes and personal data are leaked. CISA adds four actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Outsmarting AI scraper bots with math. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Daniel Frank⁠ and ⁠Tom Fakterman⁠ from Palo Alto Networks' threat research team about “Hunting Threats in Developer Environments.” You can hear David and Tyler's full discussion on Threat Vector ⁠⁠here⁠⁠ and catch new episodes every Thursday on your favorite podcast app. Selected Reading Public exploits released for Citrix Bleed 2 NetScaler flaw, patch now (Bleeping Computer) Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild (SecurityWeek) Hacker leaks Telefónica data allegedly stolen in a new breach (Bleeping Computer) Italian police arrest Chinese national wanted by FBI for alleged industrial espionage (Reuters) Beware of Bert: New ransomware group targets healthcare, tech firms (The Record) Call of Duty takes PC game offline after multiple reports of RCE attacks on players (CyberScoop) GOP domestic policy bill includes hundreds of millions for military cyber (CyberScoop) TalentHook leaks resumes of 26 Million job seekers (Beyond Machines) CISA Adds Four Known Exploited Vulnerabilities to Catalog (CISA) The Open-Source Software Saving the Internet From AI Bot Scrapers (404 Media) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]

The CyberWire

Play Episode Listen Later Jul 4, 2025 38:00


While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year's “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won't change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale. Resources: Kubikle: A comedy webseries about cybercriminals. Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024 Join the conversation on our social media channels: Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠ Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠ Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
Undetectable Android spyware is detectable, Hunters ransomware quits, Salt Typhoon dormant

Cyber Security Headlines

Play Episode Listen Later Jul 4, 2025 9:09


Undetectable Android spyware leaks user logins Hunters ransomware group shuts doors Medical device company Surmodics reports cyberattack Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response Find the stories behind the headlines at CISOseries.com.

Cyber Security Headlines
Columbia hack, hunger relief ransomware, Qantas breach

Cyber Security Headlines

Play Episode Listen Later Jul 3, 2025 7:27


Student data lost in Columbia University hack German hunger relief charity hit by ransomware Qantas contact center breached Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response

Cyber Security Headlines
Google issues Chrome security update, ICC targeted by new attack, Microsoft nixes Authenticator password management

Cyber Security Headlines

Play Episode Listen Later Jul 2, 2025 7:23


Chrome Zero-Day CVE-2025-6554 under active attack — Google issues security update International Criminal Court targeted by new ‘sophisticated' attack Kelly Benefits says 2024 data breach impacts 550,000 customers, Esse Health says recent data breach affects over 263,000 patients Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response

Cyber Security Headlines
New Iran warning, Chinese surveillance company banned, CISA names new executive director

Cyber Security Headlines

Play Episode Listen Later Jul 1, 2025 8:04


U.S. agencies issue urgent warning over Iran threat Canada bans Chinese surveillance company CISA names new executive director Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response

DGMG Radio
Inside Atlassian's Product Marketing Strategy: Team Structure, Metrics, and Execution with Matt De Vincentis

DGMG Radio

Play Episode Listen Later Jun 30, 2025 56:18


#260 Product Marketing | Dave is joined by Matt De Vincentis, VP of Product Marketing at Atlassian. With a background that spans engineering, product marketing, and leadership at companies like VMware and Palo Alto Networks, Matt shares how Atlassian structures its product marketing team, prioritizes work, and stays tied to business outcomes, even at massive scale.Dave and Matt cover:How Atlassian connects product marketing to revenue and pipeline (and why PMMs need to “own the outcome”)How to build high-trust, high-impact marketing teams, drawing on lessons from firefighting and enterprise leadershipThe async work philosophy Atlassian uses to eliminate unnecessary meetings and increase productivity across a global teamWhether you lead a team or want a seat at the table, this episode breaks down how to structure, scale, and lead product marketing the Atlassian way.Timestamps(00:00) - – Intro (03:04) - – Matt's path from engineer to Atlassian VP (06:19) - – Why technical backgrounds can be both a strength and a curse in PMM (10:04) - – What product marketing looks like at a $5B company (11:04) - – “Own the outcome, not the task”: tying PMM to revenue (13:24) - – Why product marketers should care about pipeline (even if they don't own it) (14:49) - – How brand and creative marketers can still align to business outcomes (17:19) - – Measuring inputs vs. outcomes (and how to stay focused on the right one) (18:04) - – How Matt applies firefighting lessons to leading marketing teams (19:44) - – Triaging “fire drills” and protecting your team's focus (21:34) - – How to prioritize ruthlessly (and what real prioritization means) (24:04) - – From IC to VP: how your mindset and responsibilities shift (28:35) - – Why leaders should double down on strengths—not fix weaknesses (30:50) - – How self-assurance became Matt's superpower as a leader (33:50) - – The StrengthsFinder approach Matt uses with his team (35:50) - – The value of executive coaching for marketing leaders (37:20) - – The goal: build the best marketing team anyone's worked on (38:50) - – Why trust and 10x thinking unlock great marketing work (41:20) - – Where product marketing sits inside Atlassian's org (42:50) - – How Atlassian uses Loom and async work to eliminate unnecessary meetings (45:20) - – What qualifies as a real meeting at Atlassian (46:50) - – Why async work helps global teams move faster (49:50) - – How Atlassian balances async with intentional in-person gatherings (51:50) - – Why trust changes how Slack and email are interpreted (52:35) - – How Atlassian thinks about AI's role in marketing (54:50) - – Why it's hard to stand out in an “AI-washed” market (56:05) - – Matt's mission: help make work suck less (57:20) - – Final thoughts and wrap-up Send guest pitches and ideas to hi@exitfive.comJoin the Exit Five Newsletter here: https://www.exitfive.com/newsletterCheck out the Exit Five job board: https://jobs.exitfive.com/Become an Exit Five member: https://community.exitfive.com/checkout/exit-five-membership***Today's episode is brought to you by Zuddl.We're halfway through 2025, and one thing's clear: events continue to be one of the highest performing marketing channels. Niche meetups, conferences, curated dinners, networking - you name it. Everyone's leaning in.Events are a core part of our playbook this year at Exit Five. So far, we've hosted two virtual sessions each month, one large virtual event, one in-person meetup, and we're deep in the weeds planning our Drive conference coming back to Vermont this September.Zuddl helps us run a smarter event strategy - from driving registrations, managing invites, automating comms, reminders, analytics, tracking. Their Salesforce integration also makes it simple to report on pipeline and revenue from events without pulling in ops.On top of that, the differentiator with Zuddl is how their team is insanely good at supporting us. They always go above and beyond for us - and that's how we've been able to keep the momentum going with 12+ events already this year, with plenty more to come.If events are part of your marketing strategy, you need to look at Zuddl to see how companies like Zillow, CrowdStrike, and Iterable are using the top event platform for Business events in 2025. Head over to zuddl.com/exitfive to learn more. 

Cyber Security Headlines
Hawaiian Airlines cyberattack, United Natural Foods update, Russia throttles Cloudflare

Cyber Security Headlines

Play Episode Listen Later Jun 30, 2025 8:12


Hawaiian Airlines suffers cyberattack United Natural Foods says cyber incident will impact quarterly income Russia throttles Cloudflare making sites inaccessible Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response Find the stories behind the headlines at CISOseries.com.

TD Ameritrade Network
CRWD, PANW & ZS Growth Show Cybersecurity is Here to Stay

TD Ameritrade Network

Play Episode Listen Later Jun 27, 2025 13:24


"Cybersecurity is going to continue to grow," says Alex Hamerstone. Companies like CrowdStrike (CRWD), Palo Alto Networks (PANW), and ZScaler (ZS) have seen tremendous growth over the last year, a trend Alex says will continue with larger companies looking to boost online security. However, he also notes downside risk these companies could face long-term. Tom White later joins to offer example options trades for CrowdStrike and Palo Alto Networks.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

10X Success Hacks for Startups, Innovations and Ventures (consulting and training tips)
What's up RSA? Top Trends at RSAC 2025 You MUST Know! | ft. Sameer Ahirrao & Nick Salian

10X Success Hacks for Startups, Innovations and Ventures (consulting and training tips)

Play Episode Listen Later Jun 24, 2025 13:58


Welcome to a special episode covering everything happening at the RSAC 2025. Meet Sameer Ahirrao, Founder & CEO of Ardent Privacy, with 25+ years of experience working with global giants like Deloitte, Lockheed Martin, and Symantec. Joining him is Nick Salian, CISO at Cantor Fitzgeraldic, and an AI regulation expert who's played key roles at Wipro and Palo Alto Networks. In this episode, we dive deep into how AI is transforming the cybersecurity landscape, the biggest trends at RSA 2025, and why AI governance solutions are the next big thing. We also break down the concept of Data Bill of Materials and how Ardent Privacy helps organizations protect critical data infrastructures—whether you're launching new software or safeguarding legacy IT. Sameer's reference in the interview • "AI Ethics by Design Is the Way Ahead to P...

The SDR DiscoCall Podcast: For Brand New Sales Development Reps
#108 The SDR DiscoCall Show – David Wilkins

The SDR DiscoCall Podcast: For Brand New Sales Development Reps

Play Episode Listen Later Jun 17, 2025 45:22


In this episode of the SDR Disco Call Show, host Neil Bhuiyan sits down with David Wilkins, the founder of SDR Leaders of EMEA, to explore his remarkable career journey. Find David on LinkedInTheir Website:From relocating from the UK to the Netherlands to overcoming challenges like imposter syndrome, David shares how his experiences have shaped his leadership approach and professional growth in tech sales.Together, they discuss the pivotal role of networking, the power of building supportive communities, and how SDR Leaders of EMEA have become a vital resource for SDRs striving to succeed in a competitive landscape. With practical insights and candid reflections, this episode offers valuable takeaways for sales professionals at every stage of their careers.Timestamps00:00 – Introduction 01:31 – The Importance of Community and Mentorship02:12 – David's Hobbies and Interests04:06 – David's Career Path and Challenges10:53 – Transitioning to Infoblox18:05 – Career Growth at Infoblox20:48 – Dealing with Self-Doubt and Recognising Potential in Others22:59 – Teasing Out Leadership Potential30:13 – Working at Snowflake31:53 – SDR Leaders of EMEA Community40:08 – Advice for SDR Leaders42:39 – Advice for Younger Self44:06 – Shout Outs and ConclusionKey TakeawaysThe SDR Disco Call Show delivers valuable insights for tech sales professionals, helping them navigate challenges and excel in their roles.David Wilkins highlights the critical role that community plays for SDR leaders, offering both guidance and camaraderie in an often isolated role.Dyslexia and imposter syndrome were hurdles that shaped David's personal growth and professional resilience, showing how challenges can drive success.Amsterdam's work-life balance has become a strong draw for many professionals, providing a supportive environment for career advancement.Starting at Palo Alto Networks marked a turning point for David, giving him the platform to grow into leadership and deepen his expertise.Recognising and nurturing potential in team members is a fundamental leadership skill, and trust, as well as collaboration, are the cornerstones of long-term success in sales.Post-COVID networking has transformed, making community-building initiatives like SDR Leaders of EMEA even more vital to the growth and connection of sales professionals.

The CyberWire
Cloudflare's cloudy day resolved.

The CyberWire

Play Episode Listen Later Jun 13, 2025 29:03


Cloudflare says yesterday's widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscation method dubbed “JSFireTruck.” Trend Micro and Mitel patch multiple high-severity vulnerabilities. CISA issues multiple advisories. My Hacking Humans cohost Joe Carrigan joins us to discuss linkless recruiting scams. Uncle Sam wants an AI chatbot.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we are joined by Joe Carrigan, one of Dave's Hacking Humans co-hosts, to talk about linkless recruiting scams. You can learn more in this article from The Record: FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters. Tune in to Hacking Humans each Thursday on your favorite podcast app to hear the latest on the social engineering scams that are making the headlines from Joe, Dave and their co-host Maria Varmazis.  Selected Reading Cloudflare: Outage not caused by security incident, data is safe (Bleeping Computer) Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection (Cyber Security News) Microsoft confirms auth issues affecting Microsoft 365 users (Bleeping Computer) TeamFiltration Abused in Entra ID Account Takeover Campaign (SecurityWeek) 270K websites injected with ‘JSF-ck' obfuscated code (SC Media) Palo Alto Networks Patches Series of Vulnerabilities (Infosecurity Magazine) SimpleHelp Vulnerability Exploited Against Utility Billing Software Users (SecurityWeek) Trend Micro fixes critical vulnerabilities in multiple products (Bleeping Computer) Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking  (SecurityWeek) CISA Releases Ten Industrial Control Systems Advisories (CISA) Trump team leaks AI plans in public GitHub repository (The Register) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
BEAR-ly washed and dangerous.

The CyberWire

Play Episode Listen Later May 27, 2025 35:43


“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tactics. Chinese hackers exploit Cityworks flaw to breach US municipal networks. Everest Ransomware Group leaks Coca-Cola employee data. Nova Scotia Power hit by ransomware.  On today's Threat Vector, ⁠David Moulton⁠ speaks with ⁠his Palo Alto Networks colleagues Tanya Shastri⁠ and ⁠Navneet Singh about a strategy for secure AI by design.  CIA's secret spy site was… a Star Wars fan page? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Tanya Shastri⁠, SVP of Product Management, and ⁠Navneet Singh⁠, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. You can hear their full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app. Selected Reading Dutch intelligence unmasks previously unknown Russian hacking group 'Laundry Bear' (The Record) GitHub MCP Server Vulnerability Let Attackers Access Private Repositories (Cybersecurity News) Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges (Cybersecurity News) Ransomware attack on MATLAB dev MathWorks – licensing center still locked down (The Register) US Government Launches Audit of NIST's National Vulnerability Database (Infosecurity Magazine) Law Firms Warned of Silent Ransom Group Attacks  (SecurityWeek) Chinese Hackers Exploit Cityworks Flaw to Target US Local Governments (Infosecurity Magazine) Everest Ransomware Leaks Coca-Cola Employee Data Online (Hackread) Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised (GB Hackers) The CIA Secretly Ran a Star Wars Fan Site (404 Media) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Emprendeduros
EP. #330 | La gran apuesta de Donald Trump

Emprendeduros

Play Episode Listen Later May 23, 2025 24:23


¡Emprendeduros! En este episodio Rodrigo nos da una actualización de mercado donde habla del estatus del mercado, del viaje de Trump al Medio Oriente, de la baja de calificacion de los bonos soberanos, de la nueva propuesta de baja de impuestos y de los riesgos de deuda. Nos da los reportes de ingresos de Alibaba, Walmart, Home Depot, Palo Alto Networks y Snowflake. Después habla de las fusiones y adquisiciones de esta semana en el mercado. Finalmente, en la actualizacion de crypto habla de Coinbase y sus muy activas dos semanas. ¡Síguenos en Instagram! Alejandro: https://www.instagram.com/salomondrin Rodrigo: https://www.instagram.com/rodnavarro Emprendeduros: https://www.instagram.com/losemprendeduros

Telecom Reseller
The New Goldmine: GCX Secures the Future of Global Networking with GNSX, Podcast

Telecom Reseller

Play Episode Listen Later May 22, 2025


“Where's the gold? It's in your data.” That was the premise behind a wide-ranging conversation between Doug Green, Publisher of Technology Reseller News, and Lorenzo Romano, CEO of GCX, a global managed services provider with a 30-year legacy of delivering secure networking solutions to multinational enterprises. Romano describes how today's enterprises face an evolving paradox: data is more valuable than ever—and more vulnerable. With the explosion of cloud-based applications, AI-driven operations, and globally distributed workforces, organizations must rethink how they manage, protect, and gain insight from massive volumes of data generated across disparate systems. Romano introduced GNSX—Global Network Secure Experience—GCX's breakthrough platform that merges secure underlay and overlay architecture to enable a true zero trust network. Built in partnership with Palo Alto Networks and integrated with their Prisma backbone, GNSX embeds SASE at the network layer rather than layering it over existing infrastructure. The result: high-performance, secure access across public and private networks, with real-time visibility into how devices interact with applications. In a real-world deployment, a customer migrated from MPLS and legacy SD-WAN to GNSX, achieving a 40% cost reduction, better performance, and granular control over user experiences—down to analyzing the quality of individual Wi-Fi connections. “Security, visibility, simplicity—and significant cost savings,” summarized Green. “GCX didn't just build a secure network. They redefined what secure, distributed connectivity looks like in the AI and post-COVID era.” Romano emphasized that GCX's solutions are globally available, scalable, and supported by a team ready to tailor services to individual client needs. “Our value as a managed service provider is to stay ahead of the curve—and bring our customers with us,” he said. Learn more: https://gcxworld.com

Packet Pushers - Full Podcast Feed
Tech Bytes: Nix AI Risks With Palo Alto Networks Prisma AIRS, Prisma Access Browser (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 19, 2025 15:05


AI is no longer on the horizon. It's part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today's Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »

Cloud Security Podcast
Cloud Security Evolved: From CNAPP to AI Threats

Cloud Security Podcast

Play Episode Listen Later May 15, 2025 19:16


The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security.Elad shares his insights on how the landscape has shifted, moving beyond the era of CSPM and CNAPP as standalone solutions. We delve into why a cloud-aware Security Operations Center (SOC) is no longer a luxury but a necessity, and what "runtime security" truly means in today's complex, multi-cloud environments.The conversation also tackles the double-edged sword of Artificial Intelligence, how it's empowering both attackers with new capabilities and defenders with advanced tools. Elad discusses the critical considerations for organizations undergoing digital transformation, the importance of AI governance, and provides actionable advice for companies at all stages of their cloud adoption journey, from securing code from day one to building holistic visibility across their entire infrastructure.Guest Socials - Elad's Linkedin Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:38) How has Cloud Security Evolved?(04:21) Why CNAPP is not enough anymore?(07:13) What is runtime security?(07:54) Impact of AI on Cloud Security(11:41) What to include in your cybersecurity program in 2025?(16:47) The Fun SectionThank you to this episode's sponsor - PaloAlto Networks Resources discussed during the episode:PaloAlto Networks RSAC Announcement 1PaloAlto Networks RSAC Announcement 2

Packet Pushers - Full Podcast Feed
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 5, 2025 31:46


Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read more »

Packet Pushers - Network Break
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds

Packet Pushers - Network Break

Play Episode Listen Later May 5, 2025 31:46


Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read more »

This Week in Startups
Meta's Dangerous Chat, Protect AI & Founder Fridays Pitch Comp | E2118

This Week in Startups

Play Episode Listen Later Apr 29, 2025 86:49


Today's show: we break down the wild story behind Meta's AI chatbots going completely off the rails — including a bombshell WSJ exposé about bots flirting with minors. Then they cover Palo Alto Networks' huge $500M+ acquisition of Protect AI, and sit down with the founder of Formulate, who's building a robotic kitchen for chemicals and cosmetics. Plus, we get into some spicy takes on the secret group chats shaping tech behind the scenes, whether AI can clean up bad code faster than humans, and a Founder Fridays Texas showdown between Osprey and Wispr.*Timestamps:(0:00) Jason kicks off the show.(1:45) Jason's recent trip to Detroit.(7:47) The influence of group chats on tech, politics, and Trumpism(10:54) Northwest Registered Agent. Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit northwestregisteredagent.com/twist today!(19:48) The importance of proactive communication in media(20:04) Fidelity Private Shares℠ - Visit ⁠ https://www.fidelityprivateshares.com! Mention our podcast and receive 20% off your first-year paid subscription.(21:44) Palo Alto Networks acquires Protect AI(28:57) ARX Robotics and the future of autonomous military platforms(29:31) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.(35:27) Sentra's $50M Series B in data security posture management(42:16) Lightrun's $70M Series B and venture capital trends(51:28) Meta's AI chatbots, ethical concerns, and Founder Friday competition(1:05:19) Formulate interview with Osmaan Shah(1:11:52) Scaling microfactories and the benefits of Formulate's platform(1:21:10) Business model and future of robotics in manufacturing(1:24:38) Potential applications in food and agriculture for Formulate Robotics*Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Links from episode:Check out Formulate Robotics: https://www.linkedin.com/company/formulaterobotics/posts/?feedView=allCheck out Protect AI: https://protectai.com/Check out Lightrun: https://lightrun.com/Check out Sentra: https://www.sentra.io/Check out the WSK article on Meta's “Digital Companions”: https://www.wsj.com/tech/ai/meta-ai-chatbots-sex-a25311bf?st=6jzH4S&reflink=desktopwebshare_permalinkCheck out ARX Robotics: https://www.arx-robotics.com/*Follow Osmaan:LinkedIn: https://www.linkedin.com/in/osmaanshah/X: https://x.com/osmaanshah*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: ⁠https://www.linkedin.com/in/alexwilhelm*Follow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanis*Thank you to our partners:(10:54) Northwest Registered Agent. Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit northwestregisteredagent.com/twist today!(20:04) Fidelity Private Shares℠ - Visit https://www.fidelityprivateshares.com! Mention our podcast and receive 20% off your first-year paid subscription.(29:31) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.*Great TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarland*Check out Jason's suite of newsletters: https://substack.com/@calacanis*Follow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.com*Subscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916