logo
episode-header-image
Nov 2024
27m 17s

Bridging AI and Cybersecurity Gaps with ...

Palo Alto Networks and N2K Networks
About this episode

Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversarial machine learning and the critical importance of addressing AI security vulnerabilities. They discuss how AI models are increasingly exposed to cyber-attacks and why organizations must adopt proactive security measures. Tune in to explore the technical and policy challenges of AI risk, key gaps in model security, and how Mileva Security Labs is working to close these. This episode is essential for cybersecurity leaders looking to protect their systems from evolving AI-based threats.


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Up next
Today
Securing Modern Workforce
Hybrid work has changed the game, but has your security kept up? In this episode of Threat Vector, David Moulton sits down with Harish Singh, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at th ... Show More
32m 7s
Oct 2
The High Cost of Chasing Compliance, Not Security
Welcome to Threat Vector, the Palo Alto Networks podcast. In this episode, host David Moulton speaks with Joey Smith, Vice President & Chief Information Security Officer at Schnuck Markets. Joey brings experience from leading incident response and forensics at MasterCard to spear ... Show More
37m 44s
Sep 25
What Happened to Hacker Culture?
Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarte ... Show More
38m 2s
Recommended Episodes
Feb 2025
DeepSeek: The Game-Changer in AI and the Impact on Cybersecurity
In this episode of Cybersecurity Today, host Jim Love dives deep into the latest advancements in AI technology with a focus on the new open-source model, DeepSeek, from China. Love discusses the significant cost differences in training and running this model compared to competito ... Show More
48m 19s
Dec 2024
Decoding XDR: Allie Mellen on What’s Next [Threat Vector]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more ... Show More
39m 59s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Apr 2025
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to ... Show More
7m 47s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Sep 6
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms ... Show More
31m 51s
Sep 2024
UK’s newest cybersecurity MVPs.
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from ... Show More
34m 29s
Aug 2024
Cyber revolt or just digital ruckus?
Hacktivists respond to the arrest of Telegram’s CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A ... Show More
31m 20s
Mar 2025
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025
Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from in ... Show More
35m 49s