logo
episode-header-image
Feb 2025
35m 28s

Rethinking Cloud Security Strategies

Palo Alto Networks and N2K Networks
About this episode
Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is reshaping cloud security.  Amol shares why security can’t be siloed, how AI is tran ... Show More
Up next
Nov 21
Inside Jingle Thief Cloud Fraud Unwrapped
In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a g ... Show More
36m 10s
Nov 20
Why Proactive Security Can’t Wait
In this episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, speaks with Elad Koren, Vice President of Product Management for Cortex Cloud at Palo Alto Networks. With the 2025 Unit 42 Incident Response Report showing that adversaries ca ... Show More
34m 37s
Nov 13
Securing the AI Frontier
AI adoption is outpacing every major tech wave of the past two decades, reshaping the digital enterprise faster than most security leaders expected. In this episode of Threat Vector, Meerah Rajavel, Chief Information Officer at Palo Alto Networks, joins David Moulton to talk abou ... Show More
32m 50s
Recommended Episodes
Aug 2024
State of Cloud Security 2024 - Leadership Edition
<p>Leadership Insights on Cloud Security in 2024. Ashish sat down with return guest <a href="https://www.linkedin.com/in/skuruvadi/" target="_blank" rel="noopener noreferer">Srinath Kuruvadi,</a> a seasoned cloud security leader with over two decades of experience in the field. T ... Show More
25m 31s
Dec 2024
Decoding XDR: Allie Mellen on What’s Next [Threat Vector]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn mo ... Show More
39m 59s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Mar 2025
#243 Greg Osuri: Why the Future of AI Depends on Decentralized Cloud Platforms
<p>This episode is sponsored by Indeed. </p> <p>Stop struggling to get your job post seen on other job sites. Indeed's Sponsored Jobs help you stand out and hire fast. With Sponsored Jobs your post jumps to the top of the page for your relevant candidates, so you can reach the pe ... Show More
59m 19s
Jan 2022
Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)
Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is A ... Show More
14m 28s
Apr 2024
The role of Real Time Defense in Cloud Security
<p>In this episode from KubeCon Paris 2024, we spoke to <a href="https://www.linkedin.com/in/degio/" target="_blank" rel="noopener noreferer">Loris Degioanni,</a> Co-Founder and CTO of <a href="https://sysdig.com/" target="_blank" rel="noopener noreferer">Sysdig</a> about Open So ... Show More
21m 35s
Feb 2025
PAN-ic mode: The race to secure PAN-OS.
Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited. CISA warns of an actively exploited iOS vulnerability. Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability. The acting commission ... Show More
29m 23s