24 episodes

Threat Vector is your compass in the world of cyberthreats. We unravel cyberthreat intelligence secrets through engaging discussions, expert interviews, and insightful analysis. Hear our unique threat intelligence, cutting-edge techniques, and real-world case studies. We'll equip you with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

Threat Vector by Unit 42 Palo Alto Networks Unit 42 and N2K Networks

    • Technology
    • 5.0 • 3 Ratings

Threat Vector is your compass in the world of cyberthreats. We unravel cyberthreat intelligence secrets through engaging discussions, expert interviews, and insightful analysis. Hear our unique threat intelligence, cutting-edge techniques, and real-world case studies. We'll equip you with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Beyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig

    Beyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig

    In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. Daniel shares his insights on the critical partnership between legal and tech teams, revealing how a deep understanding of both realms can empower businesses to navigate evolving legal frameworks, particularly in light of emerging AI technologies. Listeners will gain valuable perspectives on operationalizing legal requirements and the importance of proactive collaboration across teams for robust protection strategies. Tune in to discover actionable advice for maintaining compliance in the rapidly shifting cybersecurity landscape.

    Disclaimer:
    The information provided on this podcast is not intended to constitute legal advice. All information presented is for general informational purposes only. The information contained may not constitute the most update, legal or interpretative compliance guidance. Contact your own attorney to obtain advice with respect to any particular legal matter.

    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Palo Alto Networks
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 39 min
    Guardians of the Digital Age: How Gregory Jones Shapes Cybersecurity at Xavier University

    Guardians of the Digital Age: How Gregory Jones Shapes Cybersecurity at Xavier University

    In this episode of Threat Vector, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Greg brings a wealth of knowledge from his military background and applies a disciplined, adaptive approach to securing one of America's most vibrant educational institutions. They discuss how Greg's cybersecurity strategies, ranging from comprehensive awareness campaigns to dark web monitoring, protect the campus community from emerging threats like phishing, ransomware, and social engineering. Greg shares how he builds a culture of cybersecurity, the importance of proactive and adaptive strategies, and how empowering students and faculty transforms them into crucial allies in protecting the digital campus. Tune in to discover how collaborative ideas shape resilient security measures and how adaptable strategies ensure success in this ever-evolving field.

    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Palo Alto Networks
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 33 min
    Navigating the AI Frontier: A Security Perspective with Mike Spisak

    Navigating the AI Frontier: A Security Perspective with Mike Spisak

    In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, discusses the challenges and opportunities of AI adoption with guest Mike Spisak, Managing Director of Proactive Security at Unit 42. They emphasize the importance of early security involvement in the AI development lifecycle and the crucial role of inventorying AI usage to tailor protection measures. 
    Mike provides insights on balancing innovation with security, warning against treating security as the 'last gate,' and describes AI as a 'baby tiger,' underscoring how initial enthusiasm can lead to unforeseen risks if not carefully managed. Listeners will gain actionable strategies for proactive risk assessment and ethical AI adoption.

    Interested in an AI Security Assessment?
    Visit  https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment
    
    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Palo Alto Networks
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 38 min
    Understanding the Midnight Eclipse Activity and CVE 2024-3400

    Understanding the Midnight Eclipse Activity and CVE 2024-3400

    In this episode of Threat Vector, host David Moulton and Andy Piazza, Sr. Director of Threat Intelligence at Unit 42, dive into the critical vulnerability CVE-2024-3400 found in PAN-OS software of Palo Alto Networks, emphasizing the importance of immediate patching and mitigation strategies for such vulnerabilities, especially when they affect edge devices like firewalls or VPNs. The discussion covers the discovery, technical details, and exploitation of the vulnerability, highlighting its potential for unauthenticated attackers to execute arbitrary code with root privileges. They discuss the Midnight Eclipse activity related to pre-disclosure exploitation of the vulnerability, the collaborative response with cybersecurity firm Volexity, and the living off the land techniques employed by threat actors. The episode underlines the critical nature of patching vulnerabilities promptly, monitoring network traffic for suspicious activity, and ensuring that mitigation strategies are in place to protect against such threats.

    Visit the Unit 42 Threat Research Center for the latest on Midnight Eclipse. https://unit42.paloaltonetworks.com/cve-2024-3400/

    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Palo Alto Networks
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 19 min
    Defending against Adversarial AI and Deepfakes with Billy Hewett and Tony Huynh

    Defending against Adversarial AI and Deepfakes with Billy Hewett and Tony Huynh

    In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, explores Adversarial AI and Deepfakes as part of the ongoing series “AI’s Impact in Cybersecurity” with two expert guests, Billy Hewlett, Senior Director of AI Research at Palo Alto Networks, and Tony Huynh, a Security Engineer specializing in AI and deepfakes. They unpack the escalating risks posed by adversarial AI in cybersecurity. You’ll learn how organizations can fortify their defenses against AI-driven attacks and the critical role of human vigilance in safeguarding against sophisticated cyber threats. 

    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Palo Alto Networks
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 28 min
    Mission-Driven Security: From Marine Corps to Silicon Valley with Donnie Hasseltine

    Mission-Driven Security: From Marine Corps to Silicon Valley with Donnie Hasseltine

    In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity.
    Drawing from over two decades in the Marine Corps and a seamless transition into the tech industry, Donnie shares insights into leveraging military discipline and strategic thinking in the rapidly evolving cybersecurity landscape. This conversation not only explores the challenges and opportunities within the startup ecosystem but also highlights the criticality of foundational cybersecurity practices and the value of a security-first approach.
    Listeners will gain an understanding of how military experience equips veterans for impactful roles in cybersecurity, offering unique perspectives on problem-solving, leadership, and the importance of nurturing a security mindset to navigate and mitigate cyber risks effectively.
    Hacking for Defense

    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    Palo Alto Networks
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 39 min

Customer Reviews

5.0 out of 5
3 Ratings

3 Ratings

mrdavidrmoulton ,

Threat Vector is a good show

I learn a lot from Threat Vector by Unit 42. Two aspects of the podcast that I like- first, the depth and breadth of topics covered, from AI's influence on cybersecurity to advanced threat defense tactics, provide listeners with a great understanding of the challenges and solutions in the field. Secondly, I like the interviews discussions as it makes complex subjects accessible and interesting. I listen to every episode and enjoy it.

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Catalyst with Shayle Kann
Latitude Media
TED Radio Hour
NPR
Hard Fork
The New York Times

You Might Also Like

CyberWire Daily
N2K Networks
Cyber Security Headlines
CISO Series
Defense in Depth
David Spark
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC