American technology company
POPULARITY
Categories
We will analyze how the AI arms race is triggering massive Big Tech debt issuance to fund data center construction, and what this "mega-issuance" means for the stability and "spreads" of the investment-grade credit market.Today's Stocks & Topics: Upwork Inc. (UPWK), Market Wrap, Vanguard Total Stock Market Index Fund ETF Shares (VTI), “AI's Credit Market Footprint: Financing the Data Center Boom”, Costco Wholesale Corporation (COST), Key Benchmark Numbers: Treasury Yields, Gold, Silver, Oil and Gasoline, Target Date Funds (TDFs), Onto Innovation Inc. (ONTO), Palo Alto Networks, Inc. (PANW), Mega Mergers.Our Sponsors:* Check out Incogni: https://incogni.com/investtalk* Check out Invest529: https://www.invest529.com* Check out NordProtect: https://nordprotect.com/investalk* Check out Progressive: https://www.progressive.com* Check out Quince: https://quince.com/INVEST* Check out TruDiagnostic and use my code INVEST for a great deal: https://www.trudiagnostic.comAdvertising Inquiries: https://redcircle.com/brands
Cyber threats aren't evolving, they're accelerating.
ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator system. Switzerland questions the security of hyperscale clouds and SaaS services. One of the world's largest cyber insurers pulls back from the market. On our Threat Vector segment, David Moulton sits down with Stav Setty to unpack the Jingle Thief campaign. In Russia, Porsches take a holiday. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector segment In today's Threat Vector segment, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco-based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more. To listen to the full conversation on Threat Vector, listen here. You can catch new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading Browser extensions pushed malware to 4.3M Chrome, Edge users (The Register) India plans to verify and record every smartphone in circulation (TechCrunch) Apple to Resist India's Order to Preload Government App on iPhones (MacRumors) President orders probe into Coupang breach (The Korea Herald) Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process (GB Hackers) Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers (SecurityWeek) Google Releases Patches for Android Zero-Day Flaws Exploited in the Wild (Infosecurity Magazine) 'Cyber Issue' Leads to FDA Recall of Baxter Respiratory Gear (GovInfoSecurity) Swiss government bans SaaS and cloud for sensitive info (The Register) Publication: Resolution on outsourcing data processing to the cloud (Privatim) Insurer Beazley Steps Back From Cyber Market as Attacks Surge (PYMNTS.com) Hundreds of Porsche Owners in Russia Unable to Start Cars After System Failure (The Moscow Times) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created the threat of “harvest now, decrypt... Read more »
We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content Leader at Palo Alto Networks, who has been writing deeply on this intersection of media, tech, and risk. Together, we'll examine how cinematic depictions of hacking have shaped public perception, influenced policy, and sometimes eerily foreshadowed modern cyber threats. Expect a blend of film critique, security insight, and cultural reflection. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company acquisition. In the leadership and communications segment, Boards Seeking AI Specialists, A CISO's Guide to Navigating the Urgent AI Security Storm, How to Write AI Prompts That Get Results (& Don't Suck), and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-423
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company acquisition. In the leadership and communications segment, Boards Seeking AI Specialists, A CISO's Guide to Navigating the Urgent AI Security Storm, How to Write AI Prompts That Get Results (& Don't Suck), and more! Show Notes: https://securityweekly.com/bsw-423
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company acquisition. In the leadership and communications segment, Boards Seeking AI Specialists, A CISO's Guide to Navigating the Urgent AI Security Storm, How to Write AI Prompts That Get Results (& Don't Suck), and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-423
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company acquisition. In the leadership and communications segment, Boards Seeking AI Specialists, A CISO's Guide to Navigating the Urgent AI Security Storm, How to Write AI Prompts That Get Results (& Don't Suck), and more! Show Notes: https://securityweekly.com/bsw-423
Is it time to look past the AI bubble and focus on the infrastructure actually securing it? Today, we're pivoting to a top secular growth trend: Cybersecurity.With the industry projected to grow 12% annually and hit $215 billion in spending by 2025, Palo Alto Networks (PANW) is making aggressive moves to dominate the landscape. We discuss their M&A strategy—including the purchase of Chronosphere and the pending CyberArk deal—and what this means for their entry into the cloud observability market against competitors like Datadog and Dynatrace.In this video, we cover:-- AI-Native Security: Why AI agents and cloud workloads are driving the next wave of IT spending.--The Financials: a breakdown of PANW's cash pile, revenue acceleration, and rising stock-based compensation.-- Valuation Check: With the stock trading around 30-33x Free Cash Flow, is Palo Alto Networks a buy, a hold, or just fair value?.We analyze whether this cybersecurity giant can execute on its "platformization" strategy and if the recent sell-off offers a prime entry point for investors.Tickers mentioned: PANW,CYBR,DT,DDOG#PaloAltoNetworks #Cybersecurity #StockMarket #Investing #PANW #CloudSecurity #AIStocksJoin us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipCharts & Data provided by fiscal.ai. Get 25% off any paid plan (Nov 26 - Dec 1) using our link: https://fiscal.ai/csi/Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-formIf you found this video useful, please make sure to like and subscribe!*********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.Nick and Kasey own shares of Palo Alto Networks
Take a Network Break! We start with a relative path traversal vulnerability in Fortinet’s FortiWeb. We’ll move on to an acquisition by Palo Alto Networks, another hiccup from our friends at Cloudflare, some AI announcements by Itential and Gluware, and finish with first quarter 2026 fiscal results from Palo Alto Networks. AdSpot Sponsor: Itential ... Read more »
Take a Network Break! We start with a relative path traversal vulnerability in Fortinet’s FortiWeb. We’ll move on to an acquisition by Palo Alto Networks, another hiccup from our friends at Cloudflare, some AI announcements by Itential and Gluware, and finish with first quarter 2026 fiscal results from Palo Alto Networks. AdSpot Sponsor: Itential ... Read more »
Take a Network Break! We start with a relative path traversal vulnerability in Fortinet’s FortiWeb. We’ll move on to an acquisition by Palo Alto Networks, another hiccup from our friends at Cloudflare, some AI announcements by Itential and Gluware, and finish with first quarter 2026 fiscal results from Palo Alto Networks. AdSpot Sponsor: Itential ... Read more »
In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more. Together, David and Stav walk through how the attackers abused legitimate identity features like device registration, MFA resets, inbox forwarding rules, and ServiceNow style access requests to blend into normal business workflows and monetize “digital cash” in the form of gift cards. They dig into why MFA alone is not safety, why identity is now the real perimeter, and how behavioral analytics, UEBA, and ITDR can piece together small signals into a clear story of compromise. You'll come away with practical steps to harden identity posture, spot early warning signs in cloud environments, and protect high value systems where trust can be turned directly into profit. To go deeper on this campaign and the Atlas Lion threat actor, read the Unit 42 article Jingle Thief Inside a Cloud-Based Gift Card Fraud Campaign at https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/ Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. Learn more about your ad choices. Visit megaphone.fm/adchoices
Emprendeduros! En este episodio Rodrigo nos da una actualización de mercado donde habla del estatus del mercado, de los aranceles, de las minutas del FED y del reporte de empleos. Nos da los reportes de ingresos de Nvidia, Home Depot, Lowes, Walmart, Target, Palo Alto Networks y Klarna. Después habla de los minerales raros y de una adquisicion que salio muy mal. Finalmente da una breve actualizacion de cryptos y contestara una pregunta de un Emprendeduro. ¡Síguenos en Instagram! Rodrigo: https://www.instagram.com/rodnavarro Emprendeduros: https://www.instagram.com/losemprendeduros Para mas información sobre nuestro fondo visita: https://emprendedurosventures.com/
We weigh the promise and peril of the AI agent economy, pressing into how overprovisioned non-human identities, shadow AI, and SaaS integrations expand risk while go-to-market teams push for speed. A CMO and a CFO align on governance-first pilots, PLG trials, buyer groups, and the adoption metrics that sustain value beyond the sale.• AI adoption surge matched by adversary AI• Overprovisioned agents and shadow AI in SaaS• Governance thresholds before budget scale• PLG trials, sandbox, and POV sequencing• Visualization to reach the aha moment• Buying groups, ICP, and economic buyer alignment• Post‑sales usage, QBRs, NRR and churn signals• Zero trust limits and non-human identities• Breach disclosures as industry standards• Co-sourcing MSSP with in-house oversightSecurity isn't slowing AI down; it's the unlock that makes enterprise AI valuable. We dive into the AI agent economy with a CMO and a CFO who meet in the messy middle. The result is a practical blueprint for moving from hype to governed production without killing momentum.We start by mapping where controls fail: once users pass SSO and MFA, agents often operate beyond traditional identity and network guardrails. That's how prompts pull sensitive deal data across Salesforce and Gmail, and how third‑party API links expand the attack surface. From there, we lay out an adoption sequence that balances trust and speed. Think frictionless free trials and sandboxes that reach an immediate “aha” visualization of shadow AI and permissions, then progress to a scoped POV inside the customer's environment with clear policies and measurable outcomes. Along the way, we detail the buying group: economic buyers who sign and practitioners who live in the UI, plus the finance lens that sets pilot capital, milestones, and time-to-value expectations.We also challenge sacred cows. Zero trust is essential, but attackers increasingly log in with valid credentials and pivot through integrations, so verification must include non-human identities and agent-to-agent controls. Breach disclosures, far from being a greater threat than breaches, are foundational to ecosystem trust and faster remediation. And while MSSPs add critical scale, co-sourcing—retaining strategic oversight and compliance ownership—keeps accountability inside. If you care about ICP, PLG motions, PQLs, NRR, or simply reducing AI risk while driving growth, this conversation turns buzzwords into a playbook you can run.Vamshi Sriperumbudur: https://www.linkedin.com/in/vamsriVamshi Sriperumbudur was recently the CMO for Prisma SASE at Palo Alto Networks, where he led a complete marketing transformation, driving an impact of $1.3 billion in ARR in 2025 (up 35%) and establishing it as the platform leader. Chithra Rajagopalan - https://www.linkedin.com/in/chithra-rajagopalan-mba/Chithra Rajagopalan is the Head of Finance at Obsidian Security and former Head of Finance at Glue, and she is recognized as a leader in scaling businesses. Chithra is also an Investor and Advisory Board member for Campfire, serving as the President and Treasurer of Blossom Projects.Website: https://www.position2.com/podcast/Rajiv Parikh: https://www.linkedin.com/in/rajivparikh/Sandeep Parikh: https://www.instagram.com/sandeepparikh/Email us with any feedback for the show: sparkofages.podcast@position2.com
Cramer thinks analysts will soon like this cybersecurity stock. Become a CNBC Investing Club member to go behind the scenes with Jim Cramer and Jeff Marks as they talk candidly about the market's biggest headlines. Signup here: cnbc.com/morningtake CNBC Investing Club Disclaimer Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Palo Alto Networks announced on Wednesday that it was acquiring Chronosphere for $3.35 billion to boost its AI-enabled cybersecurity offerings. Palo Alto CEO Nikesh Arora tells Bloomberg's Ed Ludlow that the acquisition of Chronosphere put the company “smack in the middle of where the market is going.”See omnystudio.com/listener for privacy information.
Wall Street slumped late in the session with the S&P 500 erasing a 2% gain as Nvidia led the sector lower. Nvidia turned negative, unwinding its post-earnings rally, while Palo Alto Networks announced plans to acquire Chronosphere. Walmart lifted its outlook, and U.S. data showed solid September job gains even as the unemployment rate ticked higher. In commodities, oil dipped on renewed hopes for a Ukraine–Russia peace plan, gold fell as strong U.S. jobs data dimmed the prospects of a December rate cut, and iron ore retreated on supply-glut concerns. Back home, Aussie shares are expected to drop amid a spike in volatility, while a risk-off tone weighs on the Aussie dollar. The content in this podcast is prepared, approved and distributed in Australia by Commonwealth Securities Limited ABN 60 067 254 399 AFSL 238814. The information does not take into account your objectives, financial situation or needs. Consider the appropriateness of the information before acting and if necessary, seek appropriate professional advice.See omnystudio.com/listener for privacy information.
Vistazo a Nvidia, Palo Alto Networks, Meta, Walmart y Abbot. Con Celso Otero, gestor de fondos de Renta 4.
Die robusten Quartalszahlen und Aussichten von NVIDIA hauchen den Bullen mehr Optimismus ein. Die Tatsache, dass die Aktien von NVIDIA positiv reagieren, und die Kursgewinne halten, ist ein ebenfalls gutes Signal. Die Kursziele an der Wall Street steigen auf breiter Front. Die Reaktionen auf die seit gestern Abend gemeldeten Zahlen fallen insgesamt gemischt aus. Die Aktien von Palo Alto Networks stehen wegen der im Grunde nur bestätigten Aussichten schwächer. Walmart zieht dank der soliden Zahlen und Aussichten an. Man sieht einmal mehr die Sonderstellung des Einzelhändlers. Die robusten September-Arbeitsmarktdaten senken die Chance einer Dezember-Zinssenkung auf nur noch rund 20%. Wegen der verschobenen Meldung der November-Arbeitsmarktdaten, könnte die FED-Tagung sogar verschoben werden. Ein Podcast - featured by Handelsblatt. +++ Alle Rabattcodes und Infos zu unseren Werbepartnern findet ihr hier: https://linktr.ee/wallstreet_podcast +++ +++ Hinweis zur Werbeplatzierung von Meta: https://backend.ad-alliance.de/fileadmin/Transparency_Notice/Meta_DMAJ_TTPA_Transparency_Notice_-_Ad_Alliance_approved.pdf +++ Der Podcast wird vermarktet durch die Ad Alliance. Die allgemeinen Datenschutzrichtlinien der Ad Alliance finden Sie unter https://datenschutz.ad-alliance.de/podcast.html Die Ad Alliance verarbeitet im Zusammenhang mit dem Angebot die Podcasts-Daten. Wenn Sie der automatischen Übermittlung der Daten widersprechen wollen, klicken Sie hier: https://datenschutz.ad-alliance.de/podcast.html Impressum: https://www.360wallstreet.de/impressum
A blockbuster Nvidia beat, weakening consumer signals at Target, and surprise moves from Palo Alto Networks, Block, Nokia, Xiaomi, and SGX - we break down the drivers behind global and local market sentiment. Nvidia just delivered one of the most closely watched earnings results of the year - and the AI giant did not disappoint. Market View dives into Nvidia’s 65% profit surge and what it signals for the broader AI trade. We run through a tech-heavy Up or Down round featuring Palo Alto Networks and Block. Target cuts its profit outlook as US consumers tighten spending. Nokia, Xiaomi and SGX headline Round 2 as the AI infrastructure story accelerates. All this and a check-in on the STI - hosted by Michelle Martin with Ryan Huang.See omnystudio.com/listener for privacy information.
NVIDIA liefert starke Quartalszahlen, und die Bullen atmen auf. Die Aktie reagiert positiv, die Gewinne halten, und an der Wall Street schießen die Kursziele reihenweise nach oben. Trotzdem bleibt das Bild gemischt: Palo Alto Networks rutscht ab, weil der Ausblick nur bestätigt wurde. Walmart dagegen glänzt erneut – ein weiteres Beispiel für die Sonderrolle des Einzelhändlers. Dazu kommen robuste Arbeitsmarktdaten für September: Die Chance auf eine Zinssenkung im Dezember fällt auf etwa 20%. Und weil der November-Report verschoben werden könnte, steht sogar eine spätere FED-Tagung im Raum. Kurz gesagt: NVIDIA treibt die Stimmung, Walmart überzeugt, Palo Alto schwächelt – und der Arbeitsmarkt funkt der FED dazwischen. Abonniere den Podcast, um keine Folge zu verpassen! ____ Folge uns, um auf dem Laufenden zu bleiben: • X: http://fal.cn/SQtwitter • LinkedIn: http://fal.cn/SQlinkedin • Instagram: http://fal.cn/SQInstagram
While Nvidia (NVDA) undeniably drew most investors' attention after hours, Datavault AI's Nathaniel Bradley turns to Palo Alto Networks' (PANW) earnings to explain why the company saw downside action after its beat and guidance raise. He attributes the selling to Palo Alto's $3.35 billion acquisition of Chronosphere. Nathaniel explains how the evolution of A.I. pushed Palo Alto to make the acquisition and A.I.'s impact on the cybersecurity space. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
TestTalks | Automation Awesomeness | Helping YOU Succeed with Test Automation
AI is accelerating software delivery, but it's also introducing new security risks that most developers and automation engineers never see coming. In this episode, we explore how AI-generated code can embed vulnerabilities by default, how "vibe coding" is reshaping developer workflows, and what teams must do to secure their pipelines before bad code reaches production. You'll learn how to prompt more securely, how guardrails can stop vulnerabilities at generation time, how to prioritize real risks instead of false positives, and how AI can be used to protect your applications just as effectively as attackers use it to exploit them. Whether you're using Cursor, Copilot, Playwright MCP, or any AI tool in your automation workflow, this conversation gives you a clear roadmap for staying ahead of AI-driven vulnerabilities — without slowing down delivery. Featuring Sarit Tager, VP of Product for Application Security at Palo Alto Networks, who reveals real-world insights on securing AI-generated code, understanding modern attack surfaces, and creating a future-proof DevSecOps strategy.
Most sales leaders start with the comp plan - but the smartest start with strategy. In this episode of the B2B Sales Trends Podcast, host Harry Kendlbacher sits down with Jahangir Iqbal, VP of Central Operations and Sales Compensation at Palo Alto Networks, to unpack how strategic sales compensation can activate your GTM strategy, drive the right behaviors, and inspire sales teams to perform with clarity and purpose.
Hear from host Paul Spain as he sits down with Philippa Cogswell (Palo Alto Networks' Unit 42), to unpack the fast-moving world of cybersecurity. Philippa shares insights into global incident response, including the rise of business disruption tactics, multi-surface attacks and the growing challenges posed by supply chain vulnerabilities. The conversation highlights research findings, including the speed of attacks and the increasing use of AI in cybercrime, plus practical advice for both large enterprises and startups in navigating today's cyber risks. This episode offers a unique window into the realities facing organisations in New Zealand and beyond, with actionable takeaways for anyone invested in digital security.2025 Unit 42 Global Incident Response Report - Palo Alto NetworksSpecial thanks to our show partners 2degrees, One New Zealand, Spark New Zealand, HP, Workday and Gorilla Technology.
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Prodcast: ПоиÑк работы в IT и переезд в СШÐ
Октябрь 2025 выдался тяжелым. Amazon режет 14 тысяч позиций, UPS распрощался с 48 тысячами сотрудников, Intel сокращает заводы, федеральное правительство готовит массовые увольнения. Каждый день новости о сокращениях, каждый день кто-то из знакомых пишет прощальный пост в LinkedIn.А ты сидишь на своем месте и думаешь: блин, как же я ненавижу эту работу. Бессмысленные митинги, токсичный менеджмент, проекты, в которые не веришь. Но уйти? Куда? У тебя ипотека, дети, рабочая виза. Одно неверное движение — и все рухнет.Каждое утро проверяешь почту со страхом. Понимаешь, что должен быть благодарен за то, что есть работа. Но от этого только хуже — теперь еще и чувство вины добавляется к тревоге. Ты пытаешься быть продуктивным, а внутри крутится одна мысль: что если меня уволят? 60 дней на поиск работы, или теряешь визу. Дети, ипотека, жизнь, которую строил годами.Как жить в этом постоянном напряжении и не поехать крышей? Нормально ли просыпаться в холодном поту? И главное — как перестать ненавидеть место, которое одновременно держит тебя на плаву и медленно убивает изнутри?Поговорим честно без токсичного позитива и советов в стиле "просто найди другую работу".Приходите делиться опытом и задавать вопросы. Можно писать их заранее в Телеграм канале https://t.me/prodcastUSAВы уволены! Как пережить увольнение? Как справиться с тревогой? И есть ли жизнь после?Анна Наумова. https://youtu.be/ZSWbXwlFVBMАндрей Микитюк (Andrei Mikitiuk) — Sr Technical Program Manager at Palo Alto Networks, ex Credit Suisse, Citibank, Motorola, выпускник Гарварда.FacebookLinkedInПредыдущие эфиры с Андреем- Какие софты решают карьеру в США, особенно если вы — выходец из СНГ? Марша Подоляк и Андрей Микитюк- 40+: Жизнь после сорока только начинается или все же нет? Перезагрузка или Game Over?Записаться на карьерную консультацию (резюме, LinkedIn, карьерная стратегия, поиск работы в США) https://annanaumova.comКоучинг (синдром самозванца, прокрастинация, неуверенность в себе, страхи, лень) https://annanaumova.notion.site/3f6ea5ce89694c93afb1156df3c903abВидео курс по составлению резюме для международных компаний "Идеальное американское резюме": https://go.mbastrategy.com/resumecoursemainГайд "Идеальное американское резюме"https://go.mbastrategy.com/usresumeПодписывайтесь на мой Телеграм канал: https://t.me/prodcastUSAПодписывайтесь на мой Инстаграм: https://www.instagram.com/prodcast.usГайд "Как оформить профиль в LinkedIn, чтобы рекрутеры не смогли пройти мимо"https://go.mbastrategy.com/linkedinguide⏰ Timecodes ⏰00:00 Начало23:28 Как не сойти с ума в Кремниевой Долине41:06 Как не поехать кукухой при поиске работы?1:16:13 Что делать если выгорел?
Recent advancements in quantum computing are pushing the technology closer to practical application, with companies like Google, IBM, and ICONIC making significant strides in stabilizing quantum systems. This progress poses risks to current encryption methods, as traditional security measures may become obsolete due to quantum capabilities. The National Institute of Standards and Technology (NIST) is advocating for the adoption of post-quantum cryptography (PQC) to protect sensitive data, emphasizing the urgency for organizations to reassess their security protocols. Failure to act could result in severe repercussions, including data breaches and regulatory noncompliance.Google's quantum computing division has published research demonstrating practical applications for quantum computers, such as using quantum technology for nuclear magnetic resonance to estimate atomic structures. The company is shifting its focus from merely proving quantum feasibility to making the technology cost-effective. Sundar Pichai, CEO of Alphabet, expressed optimism about the timeline for commercially viable quantum computing, while industry opinions vary, with some experts suggesting practical applications may still be decades away. This divergence highlights the uncertainty surrounding the timeline for widespread quantum adoption.In addition to quantum computing advancements, the episode discusses the integration of PQC into mainstream technology. Microsoft Windows 11 has begun incorporating PQC algorithms into its cryptographic APIs, allowing for the generation of PQC key pairs and hybrid TLS handshakes. Meanwhile, companies like Palo Alto Networks are updating their software to support quantum-resistant encryption. These developments indicate a growing recognition of the need for quantum-safe security measures as organizations prepare for the potential threats posed by quantum computing.For Managed Service Providers (MSPs) and IT decision-makers, the implications are clear: proactive measures are necessary to prepare for the quantum computing era. MSPs should assist clients in inventorying their cryptographic systems and developing a roadmap for adopting PQC. As the U.S. government urges organizations to transition to quantum-safe encryption by 2035, MSPs must prioritize updating protocols and exploring quantum-resistant solutions. The transition to quantum-safe encryption is a multi-year effort, and early preparation will help mitigate future risks associated with quantum advancements. One thing to know today00:00 All About Quantum Computing This is the Business of Tech. Supported by:
In this episode of The Segment, host Raghu Nandakumara sits down with Carl Froggett, Chief Information Officer at Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity.With nearly three decades of experience — including over 20 years at Citi leading global infrastructure defense and cybersecurity services — Carl brings a rare, full-circle perspective on how the cyber landscape, leadership, and culture have evolved from the early 2000s to today's AI-driven world.You'll learn:How Carl “accidentally” fell into cybersecurity — and what the early days of firewalls and compliance-driven security looked like What it was like to pioneer one of Citi's first dedicated cyber teams Lessons in leadership from iconic figures like Charles Blauner, Greg Lavender, and John Miller How Citi became an early adopter of technologies like Palo Alto Networks, Splunk, CrowdStrike, and Illumio Why building business alignment and trust matters more than ever for CISOs How to frame security risks in business terms — and where many leaders go wrong The massive shift from machine learning to deep learning in cybersecurity How generative AI and “dark AI” are redefining the threat landscape — and why the next era of defense demands a mindset change Packed with nostalgia, hard-won wisdom, and forward-looking insight, this episode bridges cybersecurity history, human leadership, and the AI-powered future ahead.Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
Episode 263 of The Smart Agents Podcast features Aidan Brannigan, founder of No Boring Brands, to share how he's redefining social media marketing through humor, memes, and creative storytelling — helping even the most traditional industries break through online.From building one of the largest marketing meme pages on Instagram to leading campaigns for companies like Apollo and Palo Alto Networks, Aidan has proven that humor isn't just for entertainment — it's one of the most powerful tools for brand connection and audience growth.In this episode, Aidan shares:✅ How real estate agents can use humor to stand out without losing professionalism✅ Why niche, authentic content outperforms generic marketing every time✅ Simple tools and strategies for creating engaging memes and short-form videos✅ How consistency and creativity lead to long-term brand authorityLearn More From Aidan
In this episode, Dr. Dave Chatterjee speaks with Anupam Upadhyay, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product and cybersecurity leader, to unpack the “new browser wars” and why enterprise browsers are fast becoming a core battleground in the fight for digital trust. Drawing on over two decades of experience spanning Cisco, startups, and Palo Alto, Upadhyay traces the evolution of the humble browser from a passive content viewer into the primary interface for cloud applications, collaboration tools, and sensitive business data.The conversation examines the browser's expanding role as both a productivity hub and a primary attack vector—accounting for over 90 percent of initial intrusions via phishing, malicious extensions, or session hijacking. Through the lens of the Commitment-Preparedness-Discipline (CPD) Framework, Dr. Chatterjee and Anupam Upadhyay emphasize that securing the enterprise browser is not merely a technical exercise but a governance imperative: leadership commitment to zero-trust principles, preparedness through hardened configurations and employee training, and disciplined enforcement of consistent controls across devices and partners.Time Stamps• 00:49 — Dave's introduction and guest overview.• 03:00 — Anupam Upadhyay's career journey and reinvention at Palo Alto Networks.• 05:00 — Historical context: how browsers stayed outside the security spotlight.• 08:40 — Cloud and SaaS migration shifting business to the browser.• 11:20 — Emerging browser threats and data sanctity concerns.• 14:30 — Malicious extensions and the limits of traditional EDR.• 16:07 — Browser security as part of Zero Trust architecture.• 18:30 — Balancing security and user experience.• 22:10 — Operating in hostile environments and credential revocation.• 25:00 — Dr. Chatterjee introduces the CPD framework for governance.• 28:45 — Implementation and user adoption challenges.• 30:00 — Continuous testing and discipline in browser security.• 33:05 — Closing takeaways on Zero Trust mindset and defense-in-depth.Podcast summary with discussion highlights - https://www.dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground/Connect with Host Dr. Dave Chatterjee LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Books PublishedThe DeepFake ConspiracyCybersecurity Readiness: A Holistic and High-Performance ApproachArticles PublishedRamasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A...
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud networks. We... Read more »
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud networks. We... Read more »
You've likely heard of Pareto's Principle or the 80/20 rule. Is there a way to achieve most of the benefits of crypto-agility with minimal effort? Palo Alto Networks has undoubtedly made its mark with firewalls and security detection and response offerings. We learn how they can also provide a rapid head start to PQC migration, covering everything from cryptographic inventory to creating wrappers for legacy app communications that need to remain secure against quantum computing threats. Even the latest version of their PAN-OS is PQC enabled. And you won't believe what they're seeing in network traffic: PQC used to hide hacking attacks? Join host Konstantinos Karagiannis for a wide-ranging chat with Rich Campagna from Palo Alto Networks where they cover practical ways to get your company ready for tomorrow. For more information on Palo Alto Networks, visit https://www.paloaltonetworks.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarterly magazines at Barnes & Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. Kyle Wilhoit is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: Hacking Exposed Industrial Control Systems and Operationalizing Threat Intelligence. As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals. Connect with Kyle on LinkedIn Previous appearances on Threat Vector: Inside DeepSeek's Security Flaws (Mar 31, 2025) https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws War Room Best Practices (Nov 07, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research (Jan 11, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research Learn more about Unit 42's threat research at https://unit42.paloaltonetworks.com/. Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at https://www.paloaltonetworks.com/podcasts/threat-vector. Join the conversation on our social media channels: Website: http://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/palo-alto-networks/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybersecurity, automation, and PowerShell advocate Adil Leghari returns to The PowerShell Podcast to kick off Cybersecurity Month. Adil shares insights from his career journey: from PowerShell and automation to identity and now cloud security at Palo Alto Networks. He discusses creating tools like Cyberdle and QR Check, how AI is reshaping cybersecurity, and the importance of empathy, authenticity, and mentorship in tech and community life. Key Takeaways: AI in cybersecurity – Adil explains how organizations can protect sensitive data and combat threats using AI Security Posture Management and why we must “fight AI with AI.” Personal projects with purpose – Tools like Cyberdle and QR Check show how small, open-source projects can educate users and strengthen security awareness. Human connection in tech – Adil emphasizes empathy, authenticity, and community as keys to building better workplaces, stronger teams, and more fulfilling careers. Guest Bio: Adil Leghari is a Cloud Solutions Architect at Palo Alto Networks, where he works on the Cortex Cloud platform. With over twenty years of IT experience, Adil's career spans PowerShell automation, identity management, repositories + packaging, and cloud security. A passionate community contributor and speaker, he is known for his open-source projects, approachable teaching style, and advocacy for authenticity and mentorship in the tech industry. He is a speaker, author, and a really kind human that I like a lot (Andrew wrote this)Resource Links: Cyberdle (Cybersecurity Wordle Game) – https://cyberdle.adilio.ca QR Check (QR Code Security Tool) – https://qrcheck.ca GitHub Spec Kit: https://github.com/github/spec-kit Adil's GitHub – https://github.com/adilio Adil's Website – https://adilio.ca Adil on X/Twitter – https://twitter.com/adilio Adil on BlueSky – https://bsky.app/profile/adilio.ca Find Andrew: https://andrewpla.tech/links PDQ Discord – https://discord.gg/PDQ PowerShell Wednesdays – https://www.youtube.com/watch?v=uWfSbuYnpFA&list=PL1mL90yFExsix-L0havb8SbZXoYRPol0B The PowerShell Podcast on YouTube: https://youtu.be/HpOeZ4LBq9s
Prodcast: ПоиÑк работы в IT и переезд в СШÐ
Пару лет назад Андрей написал пост «Как я был гопником». Пост был откровенный и очень точный. Особенно для тех, кто строит карьеру менеджера в США. Он — Technical Program Manager, я — Technical Product Marketing Manager. И мы оба пришли сюда из постсоветской культуры.Всё, что вы раньше знали про «главное — быть экспертом» — работает, но только до определённого уровня. Если хотите расти, управлять, влиять — без софтов не вытащить.Soft skill #1: Active Listening & Stakeholder Alignment— Умение слушать не чтобы перебить, а чтобы услышать— Понимание мотиваций других людей, даже если они не озвучены напрямую— Согласование интересов без пассивной агрессии и ультиматумовМы выходим на звонки не чтобы доказать, что кто-то не прав.Мы выходим, чтобы сдвинуть проект с мёртвой точки.В СНГ часто говорят: «Я же прав, почему меня не слушают?»В США чаще спросят: «Как мы можем вместе решить проблему, чтобы всем было ок?»Что дальше?Я хочу собрать подборку софтов, которые реально помогают строить карьеру. От общения с менеджером до презентации идей на уровне VP. Особенно — когда ты иммигрант и вырос в другой культуре.
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can/must work together for national security. Selected Reading FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer) Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek) Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq) Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED) Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine) In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly) Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai) RondoDox Botnet Takes ‘Exploit Shotgun' Approach (SecurityWeek) ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek) Pro-Russian hackers caught bragging about attack on fake water utility (The Record) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Matt, Chief Strategy Officer at Cerby, discusses how the autonomous AI agents create a demand for a fresh approach to identity security and shares practical insights on navigating these new challenges.Join the Defender Fridays community, live every Friday, to discuss the dynamic world of information security in a collaborative space with seasoned professionals.Matt has spent 20+ years at the intersection of cybersecurity, strategy, and company building. His career began in the trenches as a practitioner and architect, grew into CISO and CSO roles, and today he helps scale Cerby as Chief Strategy Officer.At Cerby, Matt has been part of the journey from pre-launch through significant enterprise adoption, serving first as Founding Advisor, then Chief Trust Officer, COO, and now CSO. Each role reflected a different stage of building the company: establishing trust and market credibility, creating the operations foundation, and shaping long-term strategy and growth.Before Cerby, as part of the early RedLock team, Matt helped scale Prisma Cloud (formerly RedLock) from $4M to $500M+ ARR after Palo Alto Networks' $235M acquisition. That experience taught him how to scale security businesses from the ground up while staying connected to practitioner needs.Matt believes the best security leaders shouldn't have to choose between protecting and growing the business; his work is helping organizations achieve both.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastruture for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
With over 30 years in wireless—from helping pioneer intercarrier SMS to running mobile identity operations across Americas and Asia Pacific — Eddie DeCurtis saw what others missed: 967 of 1,000 global mobile network operators lack the infrastructure to monetize CPNI data while protecting customers from fraud. The technical challenge isn't building APIs. It's that operators spent billions on 5G infrastructure and now lack capital, internal expertise, and operational frameworks to launch authentication services. In 18 months, Shush went from PowerPoint to 30 employees, supporting 47 network APIs with full GSMA Open Gateway compliance. Eddie shares how understanding regulatory frameworks by jurisdiction, not just deploying technology, became their competitive moat—and why hiring the executive who built T-Mobile USA's authentication platform gave them credibility no competitor could match. Topics Discussed: Why operators repeatedly said "we want to do it, we have no idea how, we have no money, we don't have a platform" Validating the thesis with former AT&T Communications CEO John Donovan before launching Securing a POC with a major operator pre-incorporation—with only a PowerPoint deck The three-legged stool: technology, network integration, and business operations (where competitors fail) Why knowing privacy regulations for CPNI data sharing by country became a deal-closer Reducing network integration from dozens of touchpoints to three specific network elements Supporting 8 Linux Foundation Camara APIs and TS.43 GBA AKA authentication standard Going from 3 to 30 employees and launching at Mobile World Congress on a $75/night Airbnb budget GTM Lessons For B2B Founders: Validate with the person most likely to kill your idea: Eddie deliberately chose John Donovan—former CEO of AT&T Communications, board member at Lockheed and Palo Alto Networks—specifically because "he's going to be rough, he's going to totally ask the really hard questions." When Donovan's response was "go raise $40 million and own this space...you're not going to be alone for long," the validation carried weight because it came from someone incentivized to find fatal flaws. Most founders validate with friendly audiences or investors looking for deals. Find the battle-tested executive who has nothing to gain from being kind. Convert pre-product conviction into design partner commitments: Eddie secured a POC agreement with a major operator before Shush incorporated. "I had nothing. I didn't have software. We had an idea, we had a PowerPoint presentation." This only works when you've spent decades building domain expertise and relationships. The lesson isn't "sell vaporware"—it's that deep industry knowledge lets you articulate problem-solution fit so precisely that sophisticated buyers commit before seeing code. Infrastructure founders with 10+ years in-market can accelerate 12-18 months of product-market fit by converting expertise into early design partnerships. The enterprise moat is operational knowledge, not technical capability: Eddie's thesis: "Anybody can come up with the technology. You walk down the street in the Bay Area, 10 developers will develop it for you." Shush differentiated by answering questions competitors couldn't: How do you price SIM swap detection per query? What are CPNI data sharing regulations in Indonesia versus Brazil? How do you navigate internal stakeholder alignment across legal, privacy, and regulatory teams at a tier-one operator? When Eddie told an operator "here's the privacy rules for your country" after they admitted "I have no idea," he closed a knowledge gap that pure technology vendors can't fill. In regulated infrastructure markets, execution expertise beats technical superiority. Target the ambition-capability gap in capital-constrained buyers: Operators told Eddie the same story: eager to launch authentication services, zero clarity on execution, budgets decimated by 5G spending. This created perfect conditions for a full-stack solution. "Mid-market is hard because you have a buyer with problems that are not basic anymore, but they lack the ability to execute." Shush didn't sell point solutions—they delivered technology, integration, and business operations as a turnkey package. Identify buyers with sophisticated needs, strong intent, and constrained internal resources. That's where full-stack platforms win over point tools. Hire the operator who ran your exact use case at scale: Eddie cold-called John Morrowton, who "built this actual product and service offering at T-Mobile USA, from its inception to its execution and ran it for four years." His pitch: "I'm Eddie DeCurtis, how are you? You want a job? You're Chief Product Officer." Hiring someone who'd operationalized authentication services at a tier-one carrier gave Shush instant credibility with operator buyers and compressed years of trial-and-error into institutional knowledge. In infrastructure sales, hiring executives from reference customers eliminates "can you actually do this" objections before they surface. Minimize integration surface area to accelerate deployment: Mobile operators run highly secure networks with limited external access points. Shush "narrowed it down to three network elements that we can communicate with to provide all 47 APIs." Fewer integration points means faster deployment, lower implementation risk, and reduced operator IT overhead. This architectural decision became a sales accelerator. Infrastructure founders: identify the minimal viable integration that unlocks maximum API coverage, then make that your differentiated deployment story. // Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe. www.GlobalTalent.co // Don't Miss: New Podcast Series — How I Hire Senior GTM leaders share the tactical hiring frameworks they use to build winning revenue teams. Hosted by Andy Mowat, who scaled 4 unicorns from $10M to $100M+ ARR and launched Whispered to help executives find their next role. Subscribe here: https://open.spotify.com/show/53yCHlPfLSMFimtv0riPyM
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There's been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals. A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft's Ann Johnson, Ann and guest Volker Wagner, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don't spend that ParkMobile settlement all in one place. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea Segment Today we are highlighting Afternoon Cyber Tea with Ann Johnson. Ann and guest Volker Wagner, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. Selected Reading PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability (Cyber Security News) ICE Wants to Build Out a 24/7 Social Media Surveillance Team (WIRED) Discord blames third-party support outfit for data breach (The Register) Android and Windows gamers worldwide potentially affected by bug in Unity game engine (The Record) XWorm malware resurfaces with ransomware module, over 35 plugins (Bleeping Computer) Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (HackRead) Scanning of Palo Alto Portals Surges 500% (Infosecurity Magazine) $4.5 Million Offered in New Cloud Hacking Competition (SecurityWeek) Accenture acquires Japanese AI and DX provider, Aidemy Inc. (N2K Pro Business Briefing) ParkMobile pays... $1 each for 2021 data breach that hit 22 million (Bleeping Computer) Vote for Dave! Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus' operations and underscores the group's strategic intelligence-gathering objectives. The research can be found here: Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite Learn more about your ad choices. Visit megaphone.fm/adchoices
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Between the future of search, the biggest threats in cybersecurity, and the jobs and platforms of tomorrow, Nikesh Arora sees one common thread connecting and transforming them all—AI. Sarah Guo and Elad Gil sit down with Nikesh Arora, CEO of cybersecurity giant Palo Alto Networks, to talk about a wide array of topics from agentic AI to leadership. Nikesh dives into the future of search, the disruptive potential of AI agents for existing business models, and how AI has both compressed the timeline for cyberattacks as well as fundamentally shifted defense strategies in cybersecurity. Plus, Nikesh shares his leadership philosophy, and why he's so optimistic about AI. Sign up for new podcasts every week. Email feedback to show@no-priors.com Follow us on Twitter: @NoPriorsPod | @Saranormous | @EladGil | @nikesharora | @PaloAltoNtwks Chapters: 00:00 – Nikesh Arora Introduction 00:39 – Nikesh on the Future of Search 04:46 – Shifting to an Agentic Model of Search 08:12 – AI-as-a-Service 16:55 – State of Enterprise Adoption 20:15 – Gen AI and Cybersecurity 27:35 – New Problems in Cybersecurity in the AI Age 29:53 – Deepfakes, Spearfishing, and Other Attacks 32:56 – Expanding Products at Palo Alto 35:49 – AI Agents and Human Replaceability 44:28 – Nikesh's Thoughts on Growth at Scale 46:52 – Nikesh's Leadership Tips 51:14 – Nikesh on Ambition 54:18 – Nikesh's Thoughts on AI 58:21 – Conclusion
Owning too many overlapping investments can water down returns, so we will explain how spreading your portfolio too thin may create more risk than protection. Today's Stocks & Topics: XPO, Inc. (XPO), Market Wrap, Tax Lost Harvesting, Infosys Limited (INFY), Palo Alto Networks, Inc. (PANW), Top 4 Signs You've Over-Diversified Your Portfolio, Newmont Corporation (NEM), Barrick Mining Corporation (B), Dollar Cost Average, Invesco S&P SmallCap Energy ETF (PSCE), Vanguard Total World Stock Index Fund ETF Shares (VT), Rates and Inflation.Our Sponsors:* Check out Anthropic: https://claude.ai/INVEST* Check out Gusto: https://gusto.com/investtalk* Check out TruDiagnostic and use my code INVEST for a great deal: https://www.trudiagnostic.comAdvertising Inquiries: https://redcircle.com/brands
A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw bypasses Apple's Transparency, Consent, and Control (TCC) protections. Are cost saving from outsourced IT services worth the risk? Poland boosts its cybersecurity budget after a surge in Russian-backed attacks. NTT Group joins the Comm-ISAC. Jaguar Land Rover's global shutdown continues. A data breach affects millions of customers of top luxury brands. On today's Threat Vector segment, David Moulton speaks with Palo Alto Networks' Spencer Thellmann about the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. AI chatbots hustle seniors for science. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On today's segment of Threat Vector, host David Moulton, Director of Thought Leadership for Unit 42, speaks with Spencer Thellmann, Principal Product Manager at Palo Alto Networks. David and Spencer explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. You can listen to the full conversation here, and catch new episodes of Threat Vector each Thursday in your podcast app of choice. Selected Reading In Giant Deals, U.A.E. Got Chips, and Trump Team Got Crypto Riches (The New York Times) Critical FlowiseAI password reset flaw exposes accounts to complete takeover (Beyond Machines) New FileFix attack uses steganography to drop StealC malware (Bleeping Computer) From Spotlight to Apple Intelligence (Objective- See) The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security | by Kevin Beaumont | Sep, 2025 (DoublePulsar) Russian hackers target Polish hospitals and city water supply (The Financial Times) NTT Group Joins the U.S. Communications-ISAC (Topics) Jaguar Land Rover says cyberattack shutdown to last 'at least' another week (The Record) Bags of info stolen from multiple top luxury brands - double check your data now (TechRadar) We wanted to craft a perfect phishing scam. AI bots were happy to help (Reuters) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices