Podcasts about Palo Alto Networks

American technology company

  • 584PODCASTS
  • 1,712EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 27, 2025LATEST
Palo Alto Networks

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Palo Alto Networks

Show all podcasts related to palo alto networks

Latest podcast episodes about Palo Alto Networks

The CyberWire
BEAR-ly washed and dangerous.

The CyberWire

Play Episode Listen Later May 27, 2025 35:43


“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tactics. Chinese hackers exploit Cityworks flaw to breach US municipal networks. Everest Ransomware Group leaks Coca-Cola employee data. Nova Scotia Power hit by ransomware.  On today's Threat Vector, ⁠David Moulton⁠ speaks with ⁠his Palo Alto Networks colleagues Tanya Shastri⁠ and ⁠Navneet Singh about a strategy for secure AI by design.  CIA's secret spy site was… a Star Wars fan page? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Tanya Shastri⁠, SVP of Product Management, and ⁠Navneet Singh⁠, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. You can hear their full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app. Selected Reading Dutch intelligence unmasks previously unknown Russian hacking group 'Laundry Bear' (The Record) GitHub MCP Server Vulnerability Let Attackers Access Private Repositories (Cybersecurity News) Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges (Cybersecurity News) Ransomware attack on MATLAB dev MathWorks – licensing center still locked down (The Register) US Government Launches Audit of NIST's National Vulnerability Database (Infosecurity Magazine) Law Firms Warned of Silent Ransom Group Attacks  (SecurityWeek) Chinese Hackers Exploit Cityworks Flaw to Target US Local Governments (Infosecurity Magazine) Everest Ransomware Leaks Coca-Cola Employee Data Online (Hackread) Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised (GB Hackers) The CIA Secretly Ran a Star Wars Fan Site (404 Media) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Emprendeduros
EP. #330 | La gran apuesta de Donald Trump

Emprendeduros

Play Episode Listen Later May 23, 2025 24:23


¡Emprendeduros! En este episodio Rodrigo nos da una actualización de mercado donde habla del estatus del mercado, del viaje de Trump al Medio Oriente, de la baja de calificacion de los bonos soberanos, de la nueva propuesta de baja de impuestos y de los riesgos de deuda. Nos da los reportes de ingresos de Alibaba, Walmart, Home Depot, Palo Alto Networks y Snowflake. Después habla de las fusiones y adquisiciones de esta semana en el mercado. Finalmente, en la actualizacion de crypto habla de Coinbase y sus muy activas dos semanas. ¡Síguenos en Instagram! Alejandro: https://www.instagram.com/salomondrin Rodrigo: https://www.instagram.com/rodnavarro Emprendeduros: https://www.instagram.com/losemprendeduros

Telecom Reseller
The New Goldmine: GCX Secures the Future of Global Networking with GNSX, Podcast

Telecom Reseller

Play Episode Listen Later May 22, 2025


“Where's the gold? It's in your data.” That was the premise behind a wide-ranging conversation between Doug Green, Publisher of Technology Reseller News, and Lorenzo Romano, CEO of GCX, a global managed services provider with a 30-year legacy of delivering secure networking solutions to multinational enterprises. Romano describes how today's enterprises face an evolving paradox: data is more valuable than ever—and more vulnerable. With the explosion of cloud-based applications, AI-driven operations, and globally distributed workforces, organizations must rethink how they manage, protect, and gain insight from massive volumes of data generated across disparate systems. Romano introduced GNSX—Global Network Secure Experience—GCX's breakthrough platform that merges secure underlay and overlay architecture to enable a true zero trust network. Built in partnership with Palo Alto Networks and integrated with their Prisma backbone, GNSX embeds SASE at the network layer rather than layering it over existing infrastructure. The result: high-performance, secure access across public and private networks, with real-time visibility into how devices interact with applications. In a real-world deployment, a customer migrated from MPLS and legacy SD-WAN to GNSX, achieving a 40% cost reduction, better performance, and granular control over user experiences—down to analyzing the quality of individual Wi-Fi connections. “Security, visibility, simplicity—and significant cost savings,” summarized Green. “GCX didn't just build a secure network. They redefined what secure, distributed connectivity looks like in the AI and post-COVID era.” Romano emphasized that GCX's solutions are globally available, scalable, and supported by a team ready to tailor services to individual client needs. “Our value as a managed service provider is to stay ahead of the curve—and bring our customers with us,” he said. Learn more: https://gcxworld.com

Gestalt IT Rundown
US Signs Take It Down Act || The Tech Field Day News Rundown: May 21, 2025

Gestalt IT Rundown

Play Episode Listen Later May 21, 2025 41:27


The US government signed a new act into law that has opponents concerned about the ramifications of what it will be used to do. The Take It Down Act was proposed to allow for the rapid takedown of non-consensual intimate images, or NCII, from the Internet. The law requires social media platforms to remove identified content within 48 hours and people convicted of violating the law could face up to three years in prison. What's the catch? According ot the EFF and other freedom organizations, the law has been written so broadly as to let it apply to a broad range of content, including political speech. The law also could be used to pressure companies into weakening encryption and security to allow for easier detection of content being shared. This and more on the Tech Field Day News Rundown. Time Stamps: 0:00 - Welcome to the Tech Field Day News Rundown1:08 - ZT Systems Acquired by Sanmina4:15 - Arista Networks Rumored to Buy Velocloud from Broadcom9:19 - Microsoft open-sources Windows System for Linux12:35 - Palo Alto Networks and T-Mobile Team Up for SASE15:46 - Salesforce buys Convergence for more agentic AI18:48 - Charter to Buy Cox Communications for $21.9 Billion23:41 - HPE integrates Morpheus with Greenlake27:12 - US Signs Take It Down Act37:31 - The Weeks Ahead40:16 - Thanks for WatchingHosts: Tom Hollingsworth: ⁠https://www.linkedin.com/in/networkingnerd/⁠Stephen Foskett: ⁠https://www.linkedin.com/in/sfoskett/⁠Alastair Cooke: ⁠https://www.linkedin.com/in/alastaircooke/⁠Follow Tech Field Day: Website: ⁠https://techfieldday.com/ ⁠LinkedIn:⁠ https://www.linkedin.com/company/tech-field-day/⁠X/Twitter: ⁠https://x.com/TechFieldDay ⁠Bluesky: ⁠https://bsky.app/profile/techfieldday.com

Moor Insights & Strategy Podcast
The G2 on 5G - Episode 224: AST SpaceMobile's Consumer Push, EchoStar FCC Investigation & More

Moor Insights & Strategy Podcast

Play Episode Listen Later May 20, 2025 30:39


In this episode of The G2 on 5G, analysts Will Townsend and Anshel Sag return after traveling, to discuss six key topics shaping the 5G landscape. They cover AST SpaceMobile's shift toward a consumer satellite service, EchoStar's FCC investigation, Mobile World Congress Las Vegas' rebrand, T-Mobile's latest network advancements, new security initiatives in partnership with Palo Alto Networks, and Xiaomi's upcoming smartphone SoC. Topics Covered:

Packet Pushers - Full Podcast Feed
Tech Bytes: Nix AI Risks With Palo Alto Networks Prisma AIRS, Prisma Access Browser (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 19, 2025 15:05


AI is no longer on the horizon. It's part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today's Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »

Packet Pushers - Briefings In Brief
Tech Bytes: Nix AI Risks With Palo Alto Networks Prisma AIRS, Prisma Access Browser (Sponsored)

Packet Pushers - Briefings In Brief

Play Episode Listen Later May 19, 2025 15:05


AI is no longer on the horizon. It's part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today's Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »

@BEERISAC: CPS/ICS Security Podcast Playlist
The Truth About OT Vulnerabilities

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 17, 2025 33:32


Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: The Truth About OT VulnerabilitiesPub date: 2025-05-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson Bort sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, to pull back the curtain on OT threat research. With a background in electrical engineering, Adam's first job in cybersecurity was at an IT help desk. He now leads a team dedicated to identifying, analyzing, and mitigating cyber threats targeting Operational Technology (OT) environments.What are the top threats Adam is seeing in OT attacks? Why is manufacturing such a vulnerable sector? And if he could wave a magic, non-Internet connected wand, what would he change? “I really would love to have more experts in OT,” Adam said. “The more knowledge…and the more experts we have, it will fasten this process [of innovation].” Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cloud Security Podcast
Cloud Security Evolved: From CNAPP to AI Threats

Cloud Security Podcast

Play Episode Listen Later May 15, 2025 19:16


The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security.Elad shares his insights on how the landscape has shifted, moving beyond the era of CSPM and CNAPP as standalone solutions. We delve into why a cloud-aware Security Operations Center (SOC) is no longer a luxury but a necessity, and what "runtime security" truly means in today's complex, multi-cloud environments.The conversation also tackles the double-edged sword of Artificial Intelligence, how it's empowering both attackers with new capabilities and defenders with advanced tools. Elad discusses the critical considerations for organizations undergoing digital transformation, the importance of AI governance, and provides actionable advice for companies at all stages of their cloud adoption journey, from securing code from day one to building holistic visibility across their entire infrastructure.Guest Socials - Elad's Linkedin Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:38) How has Cloud Security Evolved?(04:21) Why CNAPP is not enough anymore?(07:13) What is runtime security?(07:54) Impact of AI on Cloud Security(11:41) What to include in your cybersecurity program in 2025?(16:47) The Fun SectionThank you to this episode's sponsor - PaloAlto Networks Resources discussed during the episode:PaloAlto Networks RSAC Announcement 1PaloAlto Networks RSAC Announcement 2

Experts of Experience
Your Pre-AI Processes are USELESS | AI Rules For 2025

Experts of Experience

Play Episode Listen Later May 7, 2025 51:21


What does it really take to build an AI-powered customer experience from the ground up?Lacey Peace sits down with Katie Bianchi, Chief Customer Officer at Palo Alto Networks, to unpack how her team rebuilt support systems for the AI era — eliminating handoffs, reducing resolution time by over 40%, and transforming how their teams work.Katie walks through their phased AI implementation strategy, from data unification and process re-architecture to training internal copilots capable of diagnosing the most complex cases. She shares why tight alignment between product, IT, and customer success is now a non-negotiable, and how empowering frontline employees to lead experimentation created real transformation.Plus, Katie gets candid about what she would've done differently, why NPS might be obsolete, and how AI is becoming the operating system for work itself. Whether you're navigating digital transformation or trying to unite siloed teams, this episode offers a clear, tactical, and deeply human roadmap to scaling customer experience in the age of AI. Key Moments:00:00 Meet AI-Expert Katie Bianchi, CCO at Palo Alto Networks01:31 Why Dirty Data Is Killing Your AI Strategy02:46 AI Adoption Starts with Empowered Employees06:49 Joining a Cybersecurity Giant During Peak Disruption08:41 Step-by-Step: How Palo Alto Networks Rolled Out AI14:17 Building a Culture of Rapid Experimentation21:50 What AI Agents Can Do in Tech Support Right Now23:12 What We'd Do Differently: Lessons from the Frontlines of AI25:47 End-to-End Automation: Connecting Pre- and Post-Sales27:38 Smarter CX: Turning Data Into Actionable Insights36:41 Rethinking Metrics: How to Measure AI's Real Impact39:17 From Reactive to Proactive: Real AI Customer Wins41:26 AI as Your New Operating System: What's Next  –Are your teams facing growing demands? Join CX leaders transforming their AI strategy with Agentforce. Start achieving your ambitious goals. Visit salesforce.com/agentforce Mission.org is a media studio producing content alongside world-class clients. Learn more at mission.org

Gestalt IT Rundown
AI Growth Driving Cloud Provider Investment || Tech Field Day News Rundown: May 7, 2025

Gestalt IT Rundown

Play Episode Listen Later May 7, 2025 23:00


The demand for AI services is driving more growth in public cloud platforms, Amazon, Microsoft, and Google have all continued investment in the public cloud platforms to keep up with generative AI. Andy Jassy highlighted triple-digit growth in AI revenues, Microsoft has committed to 40% more capacity in Europe, and Google is investing $17 Billion in cloud infrastructure.Time Stamps: 0:00 - Welcome to the Tech Field Day News Rundown1:13 - Amazon Internet from Space in 20263:07 - Palo Alto Networks buys Protect AI5:44 - Forescout and NVIDIA Team Up for Operational Technology8:29 - Cloud Costs are Higher than Expected, Value to the Business is Even Higher11:24 - Chatbots aren't Giving Good Health Advice14:18 - Huawei AI chips to take on NVIDIA and beat US controls17:13 - AI Growth Driving Cloud Provider Investment21:27 - The Weeks Ahead22:21 - Thanks for WatchingHosts: Tom Hollingsworth: https://www.linkedin.com/in/networkingnerd/Stephen Foskett: https://www.linkedin.com/in/sfoskett/Alastair Cooke: https://www.linkedin.com/in/alastaircooke/Follow Tech Field Day: Website: https://techfieldday.com/ LinkedIn: https://www.linkedin.com/company/tech-field-day/X/Twitter: https://x.com/TechFieldDay Bluesky: https://bsky.app/profile/techfieldday.com

ITSPmagazine | Technology. Cybersecurity. Society
From Term Sheets to Trust: What Mergers & Acquisitions Trends Reveal About Cybersecurity's Future | An On Location RSAC Conference 2025 Conversation with Yair Geva

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 6, 2025 20:18


In this on-location conversation recorded during RSAC 2025, attorney, investor, and strategic advisor Yair Geva shares a global perspective shaped by years of legal counsel, venture investing, and deal-making across Israel, Europe, and the U.S. Geva offers unique insight into how cybersecurity, AI, and M&A are not only intersecting—but actively reshaping—the tech ecosystem.More than just a legal expert, Geva advises early-stage founders and institutional investors across markets, helping them navigate cultural, legal, and strategic gaps. With over 50 personal investments and a strong focus on cybersecurity in recent institutional activity, his perspective reflects where real momentum is building—and how smart capital is being deployed.AI Acceleration and M&A HesitationAccording to Geva, the accelerating capabilities of AI have created a strange paradox: in some sectors, VCs are hesitant to invest because the pace of change undermines long-term confidence. Yet in cybersecurity, AI is acting as a catalyst, not a caution. Cyber-AI combinations are among the few domains where deals are still moving quickly. He points to recent acquisitions—such as Palo Alto Networks' move on Protect AI—as a sign that strategic consolidation is alive and well, even if overall deal volume remains lighter than expected.Cyber Due Diligence Is Now Table StakesAcross all industries, cybersecurity evaluations have become a non-negotiable part of M&A. Whether acquiring a fashion brand or a software firm, buyers now expect a clear security posture, detailed risk management plans, and full disclosure of any prior breaches. Geva notes that incident response experience, when managed professionally, can actually serve as a confidence builder in the eyes of strategic buyers.From Global Hubs to Human ConnectionsWhile San Francisco remains a major force, Geva sees increasing momentum in New York, London, and Tel Aviv. Yet across all markets, he emphasizes that human relationships—trust, cultural understanding, and cross-border collaboration—ultimately drive deal success more than any legal document or term sheet.With a front-row seat to innovation and a hand in building the bridges that power global tech growth, Yair Geva is helping define the next chapter of cybersecurity, AI, and strategic investment.Listen to the full conversation to hear what's shaping the deals behind tomorrow's cybersecurity innovations.Note: This story contains promotional content. Learn more.Guest: Yair Geva, Attorney and Investor | https://www.linkedin.com/in/yairgeva/ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, yair geva, cybersecurity, investment, ai, m&a, venture, resilience, innovation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

The Ripple Effect Podcast with Steve Harper
Why Emotional Intelligence and Servant Leadership Are the Future of Work

The Ripple Effect Podcast with Steve Harper

Play Episode Listen Later May 6, 2025 73:02 Transcription Available


What if the best leaders aren't the ones who always have the answers, but the ones who know how to ask the right questions? Learn from the incredible Angela Pappas in this unforgettable episode of The Ripple Effect Podcast! This conversation will leave you rethinking everything you know about career growth, team building, and what real leadership looks like today. Angela's journey is anything but ordinary. From leading software developers in cold data centers to building high-performing teams at Tesla and Palo Alto Networks, she's seen firsthand how empathy, emotional intelligence (EQ), and vulnerability aren't just “soft skills.” They're the foundation of servant leadership, high-performing teams, and long-term success. Angela believes trust-based relationships empower people to embrace autonomy, find inspiration, and hold themselves accountable to deliver results. From diversity and inclusion to onboarding, leadership development, and performance management, Angela works to engage employees and leaders in learning, growing, and accelerating individual, team, and organizational performance. Angela has led technical training, cybersecurity training, and professional development teams at Thomson Reuters, Tesla, and Palo Alto Networks. She's thrilled about her current role at Lumen Technologies, using her learning and organization development skills to support the company's transformation to a next-generation tech company, redefining what's possible beyond telecom.  Angela lives in Minnesota with her husband, daughter, and the dog that rules their home. She enjoys being in nature and speaks gratitude fluently. Introductions aside, this episode is packed with authentic stories, leadership strategies that actually work, and candid moments that will make you rethink your role as a leader. You'll hear how Angela helped launch talent initiatives in some of the world's top tech companies, turned setbacks into leadership superpowers, and why creating positive Ripples in your organization matters more than ever. Sometimes, all you need to do is admit that you can't possibly know everything, listen with curiosity, and use what you've learned to face challenges with a brave face. Make sure to listen until the end!   Connect with Angela Pappas: linkedin.com/in/angelapappas-learndevelop Ripple with Steve Harper Instagram: http://instagram.com/rippleon Facebook: https://www.facebook.com/rippleon X: https://twitter.com/rippleon Website: http://www.ripplecentral.com Be a Patron: https://www.patreon.com/SteveHarper Join our ever-growing community of Ripplers in The Pond: https://ripplecentral.com/pond  #therippleeffect #leadership #organizationaldevelopment #talentdevelopment #companyculture #careergrowth #careeradvancement #learningjourney #learningvideos

Storm⚡️Watch by GreyNoise Intelligence
Biggest Cybersecurity Threats EXPOSED: Zero-Day Attacks, Chinese Hackers & Enterprise Breaches

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later May 6, 2025 52:42


Forecast = Cloudy with a chance of zero-days-watch for Spellbinder storms and scattered Git leaks! ‍ On this episode of Storm⚡️Watch, the crew dives into the fast-moving world of vulnerability tracking and threat intelligence, spotlighting how defenders are moving beyond the traditional CVE system to keep pace with real-world attacks. The show kicks off with a look at the latest listener poll, always a source of lively debate, before jumping into some of the most pressing cybersecurity stories of the week. A major focus of this episode is the recent revelation that a China-aligned APT group, dubbed TheWizards, is using a tool called Spellbinder to abuse IPv6 SLAAC for adversary-in-the-middle attacks. This technique lets attackers move laterally through networks by hijacking software update mechanisms-specifically targeting popular Chinese applications like Sogou Pinyin and Tencent QQ-to deliver malicious payloads such as the modular WizardNet backdoor. The crew unpacks how this approach leverages IPv6's stateless address autoconfiguration to intercept and redirect legitimate traffic, underscoring the evolving sophistication of lateral movement techniques in targeted campaigns. The episode then turns to Google's 2024 zero-day exploitation analysis, which reports a drop in the total number of zero-days exploited compared to last year but highlights a worrying shift: attackers are increasingly targeting enterprise products and infrastructure. Microsoft, Ivanti, Palo Alto Networks, and Cisco are among the most targeted vendors, with nearly half of all zero-day exploits now aimed at enterprise systems and network appliances. The discussion covers how attackers are chaining vulnerabilities for more impactful breaches and why defenders need to be vigilant as threat actors pivot to harder-to-monitor enterprise environments. Censys is in the spotlight for its recent research and tooling, including a new Ports & Protocols Dashboard that gives organizations granular visibility into their attack surface across all ports and protocols. This helps teams quickly spot risky exposures and misconfigurations, making it easier to prioritize remediation efforts and automate alerting for high-risk assets. The crew also highlights Censys's collaborative work on botnet hunting and their ongoing push to retire stale threat indicators, all of which are reshaping proactive defense strategies. runZero's latest insights emphasize the importance of prioritizing risks at the asset stack level, not just by CVE. The crew explains how misconfigurations, outdated software, and weak network segmentation can create stacked risks that traditional scanners might miss, urging listeners to adopt a more holistic approach to asset management and vulnerability prioritization. Rounding out the episode, GreyNoise shares new research on a dramatic spike in scanning for Ivanti Connect Secure VPNs and a surge in crawling activity targeting Git configuration files. These trends highlight the persistent risk of codebase exposure and the critical need to secure developer infrastructure, as exposed Git configs can lead to the leak of sensitive credentials and even entire codebases. As always, the show wraps up with some final thoughts and goodbyes, leaving listeners with actionable insights and a reminder to stay vigilant in the face of rapidly evolving cyber threats. If you have questions or want to hear more about any of these topics, let us know-what's on your mind this week? Storm Watch Homepage >> Learn more about GreyNoise >>  

Sales Pipeline Radio
Lead Management Directly Leads to Revenue Impact for Palo Alto Networks

Sales Pipeline Radio

Play Episode Listen Later May 6, 2025 20:11 Transcription Available


In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Lauren Daley, Director, Marketing Operations, and Jeremy Schwartz, Sr. Manager, Global Lead Management & Strategy at Palo Alto Networks. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also available on demand). In just 20 fast-paced minutes, host Matt interviews the brightest minds in sales and marketing, delivering actionable advice, best practices, and insights for B2B sales and marketing professionals. Sales Pipeline Radio was recently recognized as one of the 25 Best Sales Management Podcasts and Top 60 Sales Podcasts—don't miss out! You can subscribe right at Sales Pipeline Radio and/or listen to full recordings of past shows everywhere you listen to podcasts! You can even ask Siri, Alexa and Google or search on Audible!

Packet Pushers - Full Podcast Feed
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 5, 2025 31:46


Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read more »

Packet Pushers - Network Break
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds

Packet Pushers - Network Break

Play Episode Listen Later May 5, 2025 31:46


Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read more »

Packet Pushers - Fat Pipe
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds

Packet Pushers - Fat Pipe

Play Episode Listen Later May 5, 2025 31:46


Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read more »

Telemetry Now
Telemetry News Now: Palo Alto Boosts AI Security, Qwen 3 Released, Llama API, Spanish Internet Outage, IPv6 Making Headway

Telemetry Now

Play Episode Listen Later May 1, 2025 25:30


In this episode, Phil Gervasi and Justin Ryburn cover major developments in AI and networking, including Palo Alto Networks' $650M push into AI security, Alibaba's release of Qwen 3, and Meta's new Llama API. They also discuss Microsoft's AI-generated code stats, Asia's IPv6 milestone, and the massive Iberian power outage that disrupted internet traffic across multiple countries.

Investorideas -Trading & News
From Hacks to Riches – Investing in Cyber Defense's Explosive Growth

Investorideas -Trading & News

Play Episode Listen Later May 1, 2025 43:33


(00:00:00) coming up (00:01:26) disclaimer (00:02:18) Intro to cyber-security Investorideas.com, a global news source and expert investing resource covering cybersecurity stocks issues a podcast interview with host Dawn Van Zant talking to Chris Temple , editor and publisher of The National Investor,   With cybersecurity stocks seeing gains from 18%, to up to 40% in the past six months, Chris and Dawn do a deep dive into what is driving the growth in the sector.       Chris has been a regular guest on the Exploring Mining Podcast at Investorideas.com talking about gold stocks.  Today he joins Investorideas to talk about cybersecurity.   Starting as an investor at 18, Chris says about his newsletter, “You can get information everywhere but here you get knowledge.”      Chris shares insight into the future of cybersecurity and how to navigate the sector as it sees a 50 % increase in cyber-attacks in the first quarter of 2025.   Looking at the stocks in the sector he says, “There are the go-to legacy companies like CrowdStrike Holdings, Inc. (NASDAQ: CRWD) and Palo Alto Networks, Inc. (NASDAQ: PANW but he has an interesting investment theme, adding two smaller companies for his subscribers that have their own little niche. When you look at these events where you have this quantum increase in cyber-attacks, you need to have an increase in the protocol, software solutions.  .   The best of the companies that come up with the better solutions end up being gobbled up bigger companies.   “This happened with Y2K. A few of the software companies I recommended were bought out within months.”    He also says Cyber ETF's are a great way for investors to bet on the sector.   About Chris Temple   Chris Temple is editor and publisher of The National Investor. He has had an over 40-year career now in the financial/investment industry. Temple is a sought-after guest on radio stations, podcasts, blogs and the like all across North America, as well as a sought-after speaker for organizations. His ability to help average investors unravel, understand and navigate today's markets is unparalleled; and his ability to uncover "off-the-radar" companies is likewise.   His commentaries and some of his recommendations have appeared in Barron's, Forbes, CBS Marketwatch, Wall Street's Best Investments/The Cabot Group, Kitco.com, the Korelin Economics Report, Benzinga.com, Palisade Radio, Mining Stocks Education, Mining Stock Daily and other media.   Connect with Chris on X: https://x.com/NatInvestor      Research more cyber stocks with Investorideas.com free defense stock directory https://www.investorideas.com/Companies/HomelandDefense/Stock_List.aspAbout Investorideas.com - Big Investing Ideas Investorideas.com is the go-to platform for big investing ideas. From breaking stock news to top-rated investing podcasts, we cover it all. Our original branded content includes podcasts such as Exploring Mining, Cleantech, Crypto Corner, Cannabis News, and the AI Eye. We also create free investor stock directories for sectors including mining, crypto, renewable energy, gaming, biotech, tech, sports and more. Public companies within the sectors we cover can use our news publishing and content creation services to help tell their story to interested investors. Paid content is always disclosed.Disclaimer/Disclosure: Investorideas.com is a digital publisher of third party sourced news, articles and equity research as well as creates original content, including video, interviews and articles. Original content created by investorideas is protected by copyright laws other than syndication rights. Our site does not make recommendations for purchases or sale of stocks, services or products. Nothing on our sites should be construed as an offer or solicitation to buy or sell products or securities. All investing involves risk and possible losses. This site is currently compensated for news publication and distribution, social media and marketing, content creation and more. Disclosure is posted for each compensated news release, content published /created if required but otherwise the news was not compensated for and was published for the sole interest of our readers and followers. Contact management and IR of each company directly regarding specific questions. More disclaimer info: https://www.investorideas.com/About/Disclaimer.asp Learn more about publishing your news release and our other news services on the Investorideas.com newswire https://www.investorideas.com/News-Upload/ and tickertagstocknews.com Global investors must adhere to regulations of each country. Please read Investorideas.com privacy policy: https://www.investorideas.com/About/Private_Policy.asp   Learn more about our news, PR and social media, podcast and ticker tag services at Investorideas.com https://www.investorideas.com/Investors/Services.asp Learn more about digital advertising and guest posts https://www.investorideas.com/Advertise/     Follow us on X @investorideas Follow us on Facebook https://www.facebook.com/Investorideas Follow us on YouTube https://www.youtube.com/c/Investorideas   Contact Investorideas.com 800 665 0411      

GREY Journal Daily News Podcast
OpenAI's new acquisition could change the AI landscape forever

GREY Journal Daily News Podcast

Play Episode Listen Later May 1, 2025 2:40


Last year, major companies like Mastercard, Nvidia, and AMD acquired venture-backed AI startups. OpenAI plans to acquire the AI-assisted coding tool Windsurf for about $3 billion, which would be its largest acquisition. OpenAI also secured a $40 billion investment in March and previously considered acquiring Anysphere, which sought a valuation of nearly $10 billion. Anthropic invested in Goodfire's $50 million Series A funding, marking its first direct startup investment after raising $4.5 billion this year. xAI acquired the social media platform X for $33 billion and is in talks to raise $20 billion. Palo Alto Networks plans to acquire Protect AI, focusing on AI application security. These transactions indicate continued activity in the AI acquisition market by both public and private entities.Learn more on this news visit us at: https://greyjournal.net/news/ Hosted on Acast. See acast.com/privacy for more information.

Corporate Competitor Podcast
Technology Executive and Thoroughbred Owner Mark Kornegay encourages you to run your own race

Corporate Competitor Podcast

Play Episode Listen Later Apr 30, 2025 31:16


Ep. 228: Get excited for the Kentucky Derby with Spectrum Vice President Mark Kornegay! “Horses are like people—they can burn themselves out trying to keep up with the fastest ones, instead of running their own race,” he shared on this episode. Mark's career also includes leadership roles at Microsoft, Palo Alto Networks, and he served as a Special Agent for the FBI and an Assistant U.S. Attorney. You will learn why preparation is everything and the best performers understand their strengths and craft a strategy that suits them. Our BONUS RESOURCE for this episode includes Don's favorite quotes from today's episode and a reflection question so you can apply today's insights.  Do you want to write a book? In my new role as Publisher at Forbes Books and with the incredible resources and expertise of their team, we're making it easier than ever to help YOU to tell your story. Send us a message here to get started: https://books.forbes.com/don/  Looking for a speaker for your next event? From more than 30 years of interviewing and studying the greatest winners of all time Don offers these live and virtual presentations built to inspire your team towards personal and professional greatness.  Special thanks to Samantha Clark and Guillermo Orellana for making this episode possible.

This Week in Startups
Meta's Dangerous Chat, Protect AI & Founder Fridays Pitch Comp | E2118

This Week in Startups

Play Episode Listen Later Apr 29, 2025 86:49


Today's show: we break down the wild story behind Meta's AI chatbots going completely off the rails — including a bombshell WSJ exposé about bots flirting with minors. Then they cover Palo Alto Networks' huge $500M+ acquisition of Protect AI, and sit down with the founder of Formulate, who's building a robotic kitchen for chemicals and cosmetics. Plus, we get into some spicy takes on the secret group chats shaping tech behind the scenes, whether AI can clean up bad code faster than humans, and a Founder Fridays Texas showdown between Osprey and Wispr.*Timestamps:(0:00) Jason kicks off the show.(1:45) Jason's recent trip to Detroit.(7:47) The influence of group chats on tech, politics, and Trumpism(10:54) Northwest Registered Agent. Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit northwestregisteredagent.com/twist today!(19:48) The importance of proactive communication in media(20:04) Fidelity Private Shares℠ - Visit ⁠ https://www.fidelityprivateshares.com! Mention our podcast and receive 20% off your first-year paid subscription.(21:44) Palo Alto Networks acquires Protect AI(28:57) ARX Robotics and the future of autonomous military platforms(29:31) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.(35:27) Sentra's $50M Series B in data security posture management(42:16) Lightrun's $70M Series B and venture capital trends(51:28) Meta's AI chatbots, ethical concerns, and Founder Friday competition(1:05:19) Formulate interview with Osmaan Shah(1:11:52) Scaling microfactories and the benefits of Formulate's platform(1:21:10) Business model and future of robotics in manufacturing(1:24:38) Potential applications in food and agriculture for Formulate Robotics*Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Links from episode:Check out Formulate Robotics: https://www.linkedin.com/company/formulaterobotics/posts/?feedView=allCheck out Protect AI: https://protectai.com/Check out Lightrun: https://lightrun.com/Check out Sentra: https://www.sentra.io/Check out the WSK article on Meta's “Digital Companions”: https://www.wsj.com/tech/ai/meta-ai-chatbots-sex-a25311bf?st=6jzH4S&reflink=desktopwebshare_permalinkCheck out ARX Robotics: https://www.arx-robotics.com/*Follow Osmaan:LinkedIn: https://www.linkedin.com/in/osmaanshah/X: https://x.com/osmaanshah*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: ⁠https://www.linkedin.com/in/alexwilhelm*Follow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanis*Thank you to our partners:(10:54) Northwest Registered Agent. Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit northwestregisteredagent.com/twist today!(20:04) Fidelity Private Shares℠ - Visit https://www.fidelityprivateshares.com! Mention our podcast and receive 20% off your first-year paid subscription.(29:31) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.*Great TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarland*Check out Jason's suite of newsletters: https://substack.com/@calacanis*Follow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.com*Subscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916

The Digital Project Manager Podcast
The Retro: How to Negotiate for The Salary You Deserve as a PM

The Digital Project Manager Podcast

Play Episode Listen Later Apr 29, 2025 11:27 Transcription Available


Landing a new project manager role is a huge achievement, but before you accept the offer, don't skip the crucial step of negotiating your salary. Failing to negotiate can cost you millions over your career, yet many find the process intimidating and awkward.Yonelly Gutierrez, Senior Project Manager at Palo Alto Networks and Founder of Velvet Vision, joins us to share her expert advice on negotiating with confidence. With her experience coaching women into $100K+ project management roles, she offers practical strategies for securing the compensation you deserve without the stress.Resources from this episode:Join DPM MembershipSubscribe to the newsletter to get our latest articles and podcastsConnect with Yonelly on LinkedInCheck out Palo Alto Networks

Bloomberg Talks
Palo Alto Networks CEO Nikesh Arora Talks Latest Acquisition

Bloomberg Talks

Play Episode Listen Later Apr 28, 2025 7:56 Transcription Available


Palo Alto Networks Chairman & CEO Nikesh Arora discusses the company’s purchase of artificial intelligence security firm Protect AI and the challenges companies face in securing agentic tools. He speaks with Bloomberg's Caroline Hyde.See omnystudio.com/listener for privacy information.

Cloud Security Podcast
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)

Cloud Security Podcast

Play Episode Listen Later Apr 24, 2025 35:01


Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig.Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains. Sergej explains the critical shift from basic posture management (CSPM/CNAPP) towards runtime security, emphasizing the need for an "assume breach" mindset.Learn about the staggering reality that over 60% of containers now live for less than a minute and the immense challenges this poses for detection, incident response, and forensics.This episode covers:The evolution from traditional security to cloud-native and runtime security.Why CNAPP/CSPM is like a map, but runtime security is the essential radar.The complexities of modern incident response with ephemeral workloads.Key strategies for Security Operations Centers (SOC) adapting to the cloud.The importance of visibility, data collection, and tools for hybrid and even air-gapped environments.How AI is starting to aid security operations and forensics.Guest Socials: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Sergej LinkedinPodcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Cybersecurity PodcastQuestions asked:(00:00) Introduction: Cloud Security & The One-Minute Container Problem(01:31) Meet Sergej Epp: 20+ Years in Cybersecurity (Deutsche Bank, Palo Alto, Sysdig)(02:44) What is Cloud Native Today? From Train Stations to Airports with Drones(05:34) Runtime Security Explained: Why It's Crucial Now(11:05) The Evolution of Cloud Security: Beyond Basic Posture Management(13:49) Incident Response Evolution: Tackling One-Minute Containers(18:34) Who Needs Runtime Security? Platform Engineers, SOC Teams & More(21:01) Runtime Security as a Platform: Beyond Detection to Prevention & Insights(24:45) Cloud Security Program Maturity: From On-Prem to Cloud Native SOC(29:20) AI in SOC Operations: Speeding Up Forensics & Context

AI in Action
Agentic AI: The emerging challenge in cybersecurity

AI in Action

Play Episode Listen Later Apr 22, 2025 27:39


The rise of agentic AI is significantly expanding and widening the attack surface for cybersecurity threats. As AI systems become more capable of autonomous decision-making and action, they simultaneously introduce newer vulnerabilities across workflows, data pipelines and third-party integrations. In this episode, Wendi Whitmore, Senior Vice President of Unit 42 at Palo Alto Networks, shares her views on how agentic AI is redefining the cybersecurity game for both sides: attackers and defenders. Attackers have already started leveraging agentic AI to make the cyberattack process faster and more efficient. Now, the onus is on cyber defenders to quickly harness agentic AI and build security controls that not just match but outpower the speed, sophistication and scale of new age, AI-driven cyberthreats. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Cyber Work
When AI Goes Rogue: API Security in the Age of AI Agents | Guest Sam Chehab

Cyber Work

Play Episode Listen Later Apr 21, 2025 49:35


Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastToday on Cyber Work, Sam Chehab, the head of security and IT at Postman, dives into API security and the intriguing concept of rogue AI agents. Chehab discusses the internal challenges posed by well-meaning developers, the potential threat of hackers using AI to create more sophisticated malware, and the evolving roles of development and security teams. The episode also navigates through Chehab's career, including his time at Nvidia and leading a zero-trust strategy deployment for Palo Alto Networks. Listeners will gain insights on integrating AI tools for API defense, the future of cybersecurity roles, and practical advice for breaking into the industry. Plus, learn about Postman's strategies and tools to ensure secure API development and management.– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast00:00 API security and rogue AI agents00:45 Sam Chehab's background and career journey03:54 Transition to data security12:47 Implementing a zero-trust strategy at Palo Alto20:06 Responsibilities at Postman23:02 Understanding rogue AI agents26:42 Ensuring API security and collaboration27:34 Challenges in securing APIs28:31 Postman's approach to API hygiene29:39 The future of API security34:42 Career advice for aspiring security professionals39:18 The role of AI in API security45:20 Postman and upcoming events47:59 OutroAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.

The School for Humanity
#134 "From Ideas to Impact: Crafting Engaging Marketing Strategies with Aimee Savran and Cameron Berry"

The School for Humanity

Play Episode Listen Later Apr 21, 2025 27:55


Aimee Savran is a cybersecurity marketer specializing in social media, content marketing, and demand generation. She is passionate about transforming ideas and products into thought leadership and educational content for target audiences, with the goal of driving the cybersecurity industry forward. Having managed B2B social media accounts for several innovative companies including Palo Alto Networks, Aimee is an accomplished marketing leader for brands big and small. When she's not creating content, she enjoys going to Disneyland with her family, watching movies, and spending time with her dog, Pancake. Website: https://www.mitiga.io/  LinkedIn: https://www.linkedin.com/in/aimeesavran/    Cameron Berry is a skilled Marketing Specialist with 3 years of experience specializing in email marketing, LinkedIn ad campaigns, and promotional marketing. Known for crafting targeted strategies that drive engagement and deliver results, Cameron combines creativity and data-driven insights to optimize marketing efforts across diverse platforms. Website: https://www.supplypike.com/  LinkedIn: www.linkedin.com/in/cameronleeberry  YouTube: https://www.youtube.com/@supplypike  Instagram: https://www.instagram.com/supplypike/  Facebook: https://www.facebook.com/SupplyPike/    In this episode, we join Amy and Cameron as they share insights and strategies for growth marketing and discuss the role of AI in modern marketing efforts.  Apply to join our marketing mastermind group: https://notypicalmoments.typeform.com/to/hWLDNgjz   Follow No Typical Moments at: Website: https://notypicalmoments.com/ LinkedIn: https://www.linkedin.com/company/no-typical-moments-llc/ YouTube: https://www.youtube.com/channel/UC4G7csw9j7zpjdASvpMzqUA Instagram: https://www.instagram.com/notypicalmoments Facebook: https://www.facebook.com/NTMoments

The NTM Growth Marketing Podcast
#134 "From Ideas to Impact: Crafting Engaging Marketing Strategies with Aimee Savran and Cameron Berry"

The NTM Growth Marketing Podcast

Play Episode Listen Later Apr 21, 2025 27:55


Aimee Savran is a cybersecurity marketer specializing in social media, content marketing, and demand generation. She is passionate about transforming ideas and products into thought leadership and educational content for target audiences, with the goal of driving the cybersecurity industry forward. Having managed B2B social media accounts for several innovative companies including Palo Alto Networks, Aimee is an accomplished marketing leader for brands big and small. When she's not creating content, she enjoys going to Disneyland with her family, watching movies, and spending time with her dog, Pancake. Website: https://www.mitiga.io/  LinkedIn: https://www.linkedin.com/in/aimeesavran/    Cameron Berry is a skilled Marketing Specialist with 3 years of experience specializing in email marketing, LinkedIn ad campaigns, and promotional marketing. Known for crafting targeted strategies that drive engagement and deliver results, Cameron combines creativity and data-driven insights to optimize marketing efforts across diverse platforms. Website: https://www.supplypike.com/  LinkedIn: www.linkedin.com/in/cameronleeberry  YouTube: https://www.youtube.com/@supplypike  Instagram: https://www.instagram.com/supplypike/  Facebook: https://www.facebook.com/SupplyPike/    In this episode, we join Amy and Cameron as they share insights and strategies for growth marketing and discuss the role of AI in modern marketing efforts.  Apply to join our marketing mastermind group: https://notypicalmoments.typeform.com/to/hWLDNgjz   Follow No Typical Moments at: Website: https://notypicalmoments.com/ LinkedIn: https://www.linkedin.com/company/no-typical-moments-llc/ YouTube: https://www.youtube.com/channel/UC4G7csw9j7zpjdASvpMzqUA Instagram: https://www.instagram.com/notypicalmoments Facebook: https://www.facebook.com/NTMoments

In Good Company with Nicolai Tangen
HIGHLIGHTS: Nikesh Arora - CEO of Palo Alto Networks

In Good Company with Nicolai Tangen

Play Episode Listen Later Apr 11, 2025 10:49


We've curated a special 10-minute version of the podcast for those in a hurry. Here you can listen to the full episode: https://podcasts.apple.com/us/podcast/nikesh-arora-ceo-of-palo-alto-networks/id1614211565?i=1000702795367In our increasingly digital world, how do we protect ourselves from growing cyber threats? In this episode of In Good Company, Nicolai Tangen welcomes Nikesh Arora, CEO of Palo Alto Networks, to explore the fast-changing world of cybersecurity. As our homes, cars, and cities become increasingly connected, the opportunities for hackers grow—from targeting individuals to attacking critical infrastructure. They discuss who the "bad actors" really are, how AI is transforming both attacks and defenses, and why future conflicts will likely play out in both digital and physical battlefields. Nikesh also shares his journey from Google and SoftBank to leading a cybersecurity giant, and his approach to spotting tech trends early. Tune in!In Good Company is hosted by Nicolai Tangen, CEO of Norges Bank Investment Management. New full episodes every Wednesday, and don't miss our Highlight episodes every Friday.The production team for this episode includes Isabelle Karlsson and PLAN-B's Niklas Figenschau Johansen, Sebastian Langvik-Hansen and Pål Huuse. Background research was conducted by Kristian Haga.Watch the episode on YouTube: Norges Bank Investment Management - YouTubeWant to learn more about the fund? The fund | Norges Bank Investment Management (nbim.no)Follow Nicolai Tangen on LinkedIn: Nicolai Tangen | LinkedInFollow NBIM on LinkedIn: Norges Bank Investment Management: Administrator for bedriftsside | LinkedInFollow NBIM on Instagram: Explore Norges Bank Investment Management on Instagram Hosted on Acast. See acast.com/privacy for more information.

In Good Company with Nicolai Tangen
Nikesh Arora - CEO of Palo Alto Networks

In Good Company with Nicolai Tangen

Play Episode Listen Later Apr 9, 2025 50:59


In our increasingly digital world, how do we protect ourselves from growing cyber threats? In this episode of In Good Company, Nicolai Tangen welcomes Nikesh Arora, CEO of Palo Alto Networks, to explore the fast-changing world of cybersecurity. As our homes, cars, and cities become increasingly connected, the opportunities for hackers grow—from targeting individuals to attacking critical infrastructure. They discuss who the "bad actors" really are, how AI is transforming both attacks and defenses, and why future conflicts will likely play out in both digital and physical battlefields. Nikesh also shares his journey from Google and SoftBank to leading a cybersecurity giant, and his approach to spotting tech trends early. Tune in!In Good Company is hosted by Nicolai Tangen, CEO of Norges Bank Investment Management. New full episodes every Wednesday, and don't miss our Highlight episodes every Friday.The production team for this episode includes Isabelle Karlsson and PLAN-B's Niklas Figenschau Johansen, Sebastian Langvik-Hansen and Pål Huuse. Background research was conducted by Kristian Haga.Watch the episode on YouTube: Norges Bank Investment Management - YouTubeWant to learn more about the fund? The fund | Norges Bank Investment Management (nbim.no)Follow Nicolai Tangen on LinkedIn: Nicolai Tangen | LinkedInFollow NBIM on LinkedIn: Norges Bank Investment Management: Administrator for bedriftsside | LinkedInFollow NBIM on Instagram: Explore Norges Bank Investment Management on Instagram Hosted on Acast. See acast.com/privacy for more information.

Secure Ventures with Kyle McNulty
Ex Palo Alto Networks CSO Rick Howard on Cybersecurity from First Principles

Secure Ventures with Kyle McNulty

Play Episode Listen Later Apr 8, 2025 45:44


Recorded live at Blu Ventures' Cyber Venture Forum! I got the chance to speak with Rick Howard, previously Chief Security Officer at Palo Alto Networks from 2013 to 2019. Rick has a wealth of cybersecurity industry experience, and he wrote a book called Cybersecurity First Principles and maintains the cybersecurity book hall of fame, called the Cybersecurity Canon. In this episode we discussed his perspective on the fundamental themes of cybersecurity with a lens to how entrepreneurs and investors can leverage these ideas.Cybersecurity Canon WebsiteCybersecurity First Principles on AmazonSponsored by VulnCheck!

The CyberWire
Rick Howard: Give people resources. [CSO] [Career Notes]

The CyberWire

Play Episode Listen Later Apr 6, 2025 8:39


Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Rick Howard: Give people resources. [CSO]

Career Notes

Play Episode Listen Later Apr 6, 2025 8:39


Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Zacks Market Edge
3 Top Tech Stocks on Sale

Zacks Market Edge

Play Episode Listen Later Apr 3, 2025 25:21


Tracey Ryniec, Zacks Senior Stock Strategist, looks at ServiceNow, Palantir, and Palo Alto Networks. Are they deals? (0:30) - Are There Any Tech Stocks To Consider Buying During The Market Sell-off? (2:30) - Tracey's Top Stock Picks For Your Watchlist (22:45) - Episode Roundup:  NOW, PLTR, PANW

The CyberWire
Hackers beware, fines are in the air.

The CyberWire

Play Episode Listen Later Apr 1, 2025 30:47


The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software confirms a data breach. The FTC warns 23andMe's bankruptcy trustees to uphold their privacy obligations. A Canadian hacker has been arrested and charged for allegedly breaching systems tied to the Texas Republican Party. A GCHQ intern pleads guilty to stealing top-secret data. On our Threat Vector segment, host David Moulton from Palo Alto Networks speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. The confabulous hallucinations of AI.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment Host David Moulton from Palo Alto Networks Threat Vector podcast asks “Is the Quantum Threat Closer Than You Think?” on the latest segment of Threat Vector. Quantum computing is advancing fast, and with it comes a major cybersecurity risk—the potential to break today's encryption standards. David speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. You can catch the full discussion here. Be sure to listen to new episodes of Threat Vector every Thursday on your favorite podcast app.  Selected Reading UK threatens £100K-a-day fines under new cyber bill (The Register) Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks (Cyber Security News) Ransomware Group Takes Credit for National Presto Industries Attack (SecurityWeek) Critical Vulnerability Found in Canon Printer Drivers (SecurityWeek) Check Point Acknowledges Data Breach, Claims Information is 'Old (Cyber Security News) FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge (BankInfo Security) Canadian hacker arrested for allegedly stealing data from Texas Republican Party (The Record) GCHQ intern took top secret spy tool home, now faces prison (The Register) A Peek Into How AI 'Thinks' - and Why It Hallucinates (GovInfo Security) Why Confabulation, Not Hallucination, Defines AI Errors (Integrative Psych) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Cybersecurity Defenders Podcast
#205 - Intel Chat: OPSEC FAIL, Manifest Confusion & Github Actions

The Cybersecurity Defenders Podcast

Play Episode Listen Later Apr 1, 2025 29:35


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community.On March 24, The Atlantic's editor-in-chief Jeffrey Goldberg reported a significant OPSEC failure involving U.S. Secretary of Defense Pete Hegseth, who allegedly sent him detailed U.S. military plans over Signal—an encrypted messaging app—on March 15.A newly discovered supply chain attack on the npm ecosystem is targeting developers by backdooring local packages through a process known as “manifest confusion.” Unit 42 researchers at Palo Alto Networks have uncovered an ongoing software supply chain attack targeting GitHub repositories via malicious GitHub Actions workflows.

Storm⚡️Watch by GreyNoise Intelligence
Cybercrime Evolution: Robot Dog Backdoors & Mob's Digital Takeover

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 1, 2025 58:12


Forecast = Cloudy with a chance of cyber meatballs. ‍ We're not fooling around in this episode of Storm⚡️Watch! The show kicks off with some positive news about the Journal Times returning to full operations following a cyberattack. This is followed by important information for VMware users regarding Broadcom's significant licensing changes effective April 10, including an increase in minimum core requirements from 16 to 72 cores per command line and a new 20% penalty for late subscription renewals that will be applied retroactively. The crew then reviews results from their recent poll asking listeners which feature of encrypted messaging apps concerns them most, with options including data storage, unencrypted backups, metadata, and accidental adds. In our first segment, we discuss security concerns with the Unitree Go1 consumer-grade robot dog, specifically focusing on the recently disclosed Zhexi Oray Tunnel backdoor that has raised alarm in the security community. Next up, the team explores FamousSparrow and their SparrowDoor malware, examining the techniques and implications of this threat actor's operations. In light of recent event, the hosts provide comprehensive guidance on secure messaging practices, drawing from recent Washington Post and Wired articles. They emphasize that secure communication depends not just on the app but also on how you use it. Key recommendations include choosing contacts wisely, securing your devices by using personal rather than work equipment, setting messages to automatically delete, and selecting the right messaging apps with Signal being the top recommendation for its verifiable end-to-end encryption. They also warn about potential vulnerabilities in cross-platform messaging and advise caution with apps like Telegram. We quickly review Europol's 2025 report on the evolving landscape of organized crime, which now heavily intersects with cybercrime. Traditional criminal networks have transformed into technology-driven enterprises using AI, blockchain, and cryptocurrency to enhance their operations. The internet has become the primary theater for organized crime with data as the new currency of power. The report identifies seven key threat areas and calls for improved global financial security measures, noting that criminal asset confiscation remains stagnant at around 2%. Finally, we conclude with updates from our benevolent overlords, including Censys' reports on JunOS vulnerabilities and Kubernetes issues, VulnCheck's partnership with Filigran, runZero's approach to exposure management, and GreyNoise's observations on DrayTek router activity and Palo Alto Networks scanner activity that may indicate upcoming threats. Storm Watch Homepage >> Learn more about GreyNoise >>  

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Video Report. Women Hold 30 Percent Of Jobs In Cybersecurity.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 24, 2025 4:55


A new video from Cybercrime Magazine featuring Patricia Murphy, Vice President EMEA & LATAM Ecosystems at Palo Alto Networks, explores hiring more women in the cybersecurity industry. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

This Week in Health IT
Interview In Action: From Complexity to Clarity in Cybersecurity with Tony Douglas

This Week in Health IT

Play Episode Listen Later Mar 19, 2025 10:36


March 19, 2025: Tony Douglas, RVP of US Healthcare from Palo Alto Networks, explores solutions to the current vulnerabilities in healthcare security. Tony unpacks their "platformization" approach, consolidating multiple security functions into a single platform to combat breaches. How are healthcare providers balancing the benefits of AI with the risks of data exposure? The conversation highlights their new Unit 42 service offering remote SOC management with real-time zero-day threat intelligence.Key Points:02:23 Platformization: Simplifying Security04:13 AI Inconsistencies 07:51 Unit 42 and Global Threat IntelligenceSubscribe: This Week HealthTwitter: This Week HealthLinkedIn: This Week HealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer

The CyberWire
Tomcat got your server?

The CyberWire

Play Episode Listen Later Mar 18, 2025 30:57


An Apache Tomcat vulnerability is under active exploitation. CISA rehires workers ousted by DOGE. Lawmakers look to protect rural water systems from cyber threats. Western Alliance Bank notifies 22,000 individuals of a data breach. A new cyberattack method called BitM allows hackers to bypass multi-factor authentication.  A Chinese cyberespionage group targets Central European diplomats. A new cyberattack uses ChatGPT infrastructure to target the financial sector and U.S. government agencies. Australia sues a major securities firm over inadequate protection of customer data. Our Threat Vector segment examines how unifying security capabilities strengthens cyber resilience. Cybercriminals say, “Get me Edward Snowden on the line!” Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment Security platformization is transforming the way organizations defend against cyber threats. In this episode of Threat Vector, host David Moulton speaks with Carlos Rivera, Senior Analyst at Forrester, about how unifying security capabilities strengthens cyber resilience. To listen to the full discussion, please check out the episode here or on your favorite podcast app, and tune in to new episodes of Threat Vector by Palo Alto Networks every Thursday.  Selected Reading Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit (Cyber Security News) CISA Rehires Fired Employees, Immediately Puts Them on Leave (GovInfo Security) Western Alliance Bank Discloses Data Breach Linked to Cleo Hack (SecurityWeek) New BitM Attack Lets Hackers Steal User Sessions Within Seconds (Cyber Security News) US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity  (SecurityWeek) Chinese Hackers Target European Diplomats with Malware (GovInfo Security) Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week (Hackread) Australia Sues FIIG Investment Firm in Cyber 'Wake-Up Call' (GovInfo Security) Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Interviews: Tech and Business
Mastering 5G Network Security (AI, Zero Trust, and SASE) with Palo Alto Networks | CXOTalk #873

Interviews: Tech and Business

Play Episode Listen Later Mar 18, 2025 21:34


In episode 873, we dive deep into 5G security with Anand Oswald, Sr. VP and GM of Network Security at Palo Alto Networks. Explore the transformative impact of 5G on industries and how the convergence of technologies like AI and IoT drives 5G digital transformations. Learn about managing sophisticated threats, the importance of a zero-trust approach, and the difference between public and private 5G network security. Discover real-world examples of 5G technologies in action and get key advice for securing your enterprise-grade 5G infrastructure from the ground up.

Packet Pushers - Full Podcast Feed
Tech Bytes: Securing 5G Networks With Palo Alto Networks Prisma SASE (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Mar 17, 2025 15:13


Today on the Tech Bytes podcast we dive into 5G security with sponsor Palo Alto Networks. 5G services are being adopted worldwide for use cases such as IoT, connected vehicles, and AR and VR. At the same time, the number of threats against 5G is growing. We'll talk about Palo Alto Networks Prisma SASE 5G,... Read more »

The CyberWire
Trailblazers in Cybersecurity: Lessons from the Women Leading the Charge [Threat Vector]

The CyberWire

Play Episode Listen Later Mar 16, 2025 30:10


We thought you might enjoy this episode of Threat Vector podcast from the N2K CyberWIre network as we continue our observance of Women's History Month. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. In this special Women's History Month episode of Threat Vector, host David Moulton speaks with four trailblazing women in cybersecurity who are shaping the industry: Kristy Friedrichs, Chief Partnerships Officer; Tanya Shastri, SVP of Product Management; Sama Manchanda, Consultant at Unit 42; and Stephanie Regan, Principal Technical Architect at Unit 42. They share their journeys into cybersecurity, discuss the challenges they faced, and offer insights on leadership, innovation, and mentorship. From AI-driven security to digital forensics, these women have made a lasting impact. Tune in to hear their advice for the next generation and why cybersecurity remains one of the most exciting and dynamic fields to be in today. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Secure Ventures with Kyle McNulty
Vorlon Security | CEO Amir Khayat on a Decade of Preparing to become a Founder

Secure Ventures with Kyle McNulty

Play Episode Listen Later Mar 14, 2025 39:50


Amir is co-founder and CEO at Vorlon Security, which provides visibility and monitoring for SaaS app connections within an enterprise. For example, Vorlon can detect what other applications are connected to your Salesforce instance along with what data is flowing between each relationship. This helps security teams detect data exfiltration, data leakage, improper configuration, and more. Before Vorlon, Amir worked his way from a software developer into progressively more customer-facing roles, most recently as a Director at Palo Alto Networks. We kick off the episode talking about his early motivation to become a founder and how he led a decade of his career in pursuit of preparing himself for that role. Now, the team is continuing to focus on product and growth after raising $15 million last year from Accel and Shield Capital.WebsiteSponsor: VulnCheck

Smashing Security
HP's hold music, and human trafficking

Smashing Security

Play Episode Listen Later Mar 6, 2025 53:43


Journey with us to Myanmar's shadowy scam factories, where trafficked workers are forced to run romance-baiting and fake tech support scams, and find out why a company's mandatory hold time for tech support could lead to innocent users having their computers compromised.All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.Plus - don't miss our featured interview with Acronis CISO Gerald Beuchelt!Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:HP deliberately adds 15 minutes waiting time for telephone support calls - The Register.HP mandated 15-minute wait time for callers - why that was good news for criminals - Bob Sullivan.How vulnerable people are trafficked to fuel a global cyber scam industry - ABC News.Hundreds of foreigners freed from Myanmar's scam centres - BBC News.'I need help': Freed from Myanmar's scam centres, thousands are now stranded - BBC News.Some foreigners pulled out of Myanmar scam centres face struggle to get home - Yahoo! News.'Pig Butchering' Scam: How China's 'Broken Tooth' stole over $75 bn from global investors using crypto currencies - The Economic Times.Scunthorpe problem - Wikipedia.Scunthorpe Sans font.Sociopath: A Memoir by Patric Gagne - Goodreads.Smashing Security merchandise (t-shirts, mugs, stickers and stuff)Sponsored by:Acronis - Integrated cybersecurity, data protection and endpoint management built for MSPs.Threat Vector - The podcast from Palo Alto Networks that gives you timely analysis of current security trends and challenges.Drata - The world's most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before. SUPPORT THE SHOW:Tell your friends and colleagues about “Smashing Security”, and leave us a review on

The CyberWire
CISA keeps watch on Russia.

The CyberWire

Play Episode Listen Later Mar 4, 2025 35:36


CISA says it will continue monitoring Russian cyber threats. Broadcom patches zero-days that can lead to VM escape. Google patches 43 Bugs, including two sneaky zero-days. CISA flags vulnerabilities exploited in the wild. Palau's health ministry recovers from ransomware attack. Lost and found or lost and leaked? On this week's Threat Vector segment, David Moulton previews an episode with Hollie Hennessy on IoT cybersecurity risk mitigation and next week's special International Women's Day episode featuring trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights. And is that really you?  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On our Threat Vector Segment, host David Moulton shares previews of two upcoming episodes. On this Thursday's episode, he speaks with Hollie Hennessy, Principal Analyst for IoT Cybersecurity at Omdia, to discuss how attackers exploit vulnerabilities in connected environments and the best approaches for risk mitigation. The next week On Thursday, March 13th, David shares four conversations with some of the trailblazing women at Palo Alto Networks in honor of International Women's Day and Women's History Month. They share their journeys into cybersecurity, discuss the challenges they faced and offer insights on leadership, innovation, and mentorship. Be sure to tune in for some inspiring stories. Don't miss the full episodes every Threat Vector Thursday, subscribe now to stay ahead. If you're in Austin, Texas for SXSW and want to meet up, email David at threatvector@Paloaltonetworks.com.  Selected Reading DHS says CISA won't stop looking at Russian cyber threats (CyberScoop) Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Zero Day) Broadcom Patches 3 VMware Zero-Days Exploited in the Wild (SecurityWeek) Google fixes Android zero-day exploited by Serbian authorities (Bleeping Computer)  Several flaws added to CISA known exploited vulnerabilities catalog (SC Media)  Palau health ministry on the mend after Qilin ransomware attack (The Record) Lost luggage data leak exposes nearly a million records (Cybernews) Lee Enterprises ransomware attack halts freelance and contractor payments (TechCrunch) TikTok Blasts Australia for YouTube Carveout in Social Media Ban (Bloomberg) Deepfake cyberattacks proliferated in 2024, iProov claims (The Register)   Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Market Mondays
MM #246: Wealth Blueprint: Stocks for Next 10 Years, S&P 500, Bitcoin for Kids & Palantir ft John Hope Bryant

Market Mondays

Play Episode Listen Later Feb 11, 2025 138:54


In this episode of Market Mondays, we explore whether the S&P 500 is heading toward a lost decade with lower-than-expected returns or if industries like AI, cloud computing, and semiconductors will continue driving growth. We also discuss Bitcoin as an investment for kids—should parents consider crypto as a long-term wealth-building tool? Additionally, with Trump's economic policies shaking the markets, we analyze which three stocks are best positioned to thrive despite tariff pressures and political uncertainty.This week's earnings breakdown includes key reports from McDonald's, Shopify, Medpace, S&P Global, Applovin, and Palo Alto Networks—which stocks look strongest for future gains? We also examine Palantir (PLTR) and its potential 2025 valuation, discuss how to stay disciplined in investing when greed and fear take over, and explore subscription-based stocks beyond Netflix that offer stable recurring revenue. Plus, we take a deep dive into the energy sector and its 2025 outlook, with a focus on Chevron (CVX), ExxonMobil (XOM), and EQT—will oil remain dominant, or will renewables take the lead?To wrap up, we sit down with John Hope Bryant, a champion of financial literacy and wealth-building, to discuss how individuals can shift their mindset from consumer to investor. He shares key strategies for breaking generational cycles of poverty and taking control of financial futures. This is an episode packed with insights for investors of all levels—don't miss it!