
Threat Vector by Palo Alto Networks
by Palo Alto Networks and N2K Networks
Is this your podcast?Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Total monthly reach
Estimated from 3 chart positions in 3 markets.
By chart position
- 🇲🇽MX · Technology#4330K to 100K
- 🇸🇦SA · Technology#1530K to 100K
- 🇩🇰DK · Technology#179500 to 3K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
18K to 61K🎙 Daily cadence·122 episodes·Last published 6d ago - Monthly Reach
Unique listeners across all episodes (30 days)
61K to 203K🇲🇽49%🇸🇦49%🇩🇰1% - Active Followers
Loyal subscribers who consistently listen
33K to 112K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 12 epsHosts
Recent guests
Recent episodes
AI in the Wrong Hands
May 7, 2026
39m 56s
Operation Winter SHIELD: What the FBI Wants Industry to Do Now
Apr 30, 2026
37m 17s
Breach School
Apr 23, 2026
34m 03s
How Nations Hack, Spy, and Win
Apr 16, 2026
38m 17s
Attackers Have Agents. Do You?
Apr 9, 2026
44m 14s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 5/7/26 | ![]() AI in the Wrong Hands✨ | AI in cybersecuritythreat landscape+3 | Assaf Keren | QualtricsPalo Alto Networks+1 | — | AIcybersecurity+5 | — | 39m 56s | |
| 4/30/26 | ![]() Operation Winter SHIELD: What the FBI Wants Industry to Do Now✨ | cybersecurityFBI+4 | Adam MaddockJarrod Schlenker | FBIFBI Cyber Division+1 | — | cyber breachesMFA+5 | — | 37m 17s | |
| 4/23/26 | ![]() Breach School✨ | incident responseforensics+4 | Steve Elovitz | PwCBooz Allen+3 | — | incident responseforensics+5 | — | 34m 03s | |
| 4/16/26 | ![]() How Nations Hack, Spy, and Win✨ | nation-state cyberattackscybersecurity+4 | Allie Mellen | Palo Alto NetworksN2K Networks+5 | ChinaRussia+4 | nation-state attackscybersecurity strategy+8 | — | 38m 17s | |
| 4/9/26 | ![]() Attackers Have Agents. Do You?✨ | agentic-first securityautonomous agents+3 | Elad Koren | XDL 2.0Palo Alto Networks+4 | — | security analystautonomous risk monitoring+3 | — | 44m 14s | |
| 4/2/26 | ![]() 39 Seconds to Breach✨ | cybersecurityAI in security+3 | Wendi Whitmore | Volt TyphoonSalt Typhoon+8 | — | breachAI+5 | — | 41m 13s | |
| 3/26/26 | ![]() The Four Horsemen of Agentic Risk✨ | AI securityautonomous agents+3 | Sailesh Mishra | Palo Alto NetworksSydeLabs+3 | — | AI riskautonomous agents+5 | — | 36m 58s | |
| 3/19/26 | ![]() Inside Ransomware Negotiations: Trust Criminals or Walk Away?✨ | ransomware negotiationscybersecurity+3 | Jeremy D. Brown | Palo Alto NetworksUnit 42+1 | — | ransomwarenegotiation+5 | — | 30m 16s | |
| 3/12/26 | ![]() Who Holds Power When AI Compresses Decision Time?✨ | AI securitydecision-making+4 | Erica L. Shoemate | FBIU.S. Intelligence Community+4 | — | AI governancecyber strategy+5 | — | 39m 41s | |
| 3/5/26 | ![]() Zero Trust Without the Hype✨ | Zero Trustcybersecurity+3 | LeeAnne PelzerBrandon Hogle | Palo Alto NetworksUnit 42 | — | Zero Trustcybersecurity maturity+3 | — | 29m 39s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 3/4/26 | ![]() Unit 42's Iran Threat Brief: What We're Seeing✨ | Iran threat actorshacktivism+3 | Justin MooreAndy Piazza | Unit 42Mandiant+3 | Middle East | hacktivist groupsIran cyber threats+3 | — | 33m 54s | |
| 2/26/26 | ![]() The Billion Dollar Hiring Scam Funding North Korea✨ | North Koreahiring scams+5 | Evan Gordenker | Unit 42Palo Alto Networks+2 | North KoreaUS+2 | DPRKhiring pipeline+6 | — | 38m 27s | |
| 2/19/26 | ![]() Inside 750 Breaches with Unit 42 | Your security budget is funding the wrong defenses. Steve Elovitz leads Unit 42's North America consulting and incident response practice, where his team helps prevent, and ultimately answers the call when organizations face their worst day. After analyzing 750+ major breaches in a single year, he's seen exactly which security investments save companies and which ones fail when attackers strike. The data is uncomfortable: 90% of breaches succeed not because attackers are sophisticated, but because of misconfigurations or gaps in security coverage. You'll discover: - Why your detection window just shrunk to 1.2 hours (and what autonomous containment actually means when every minute counts) - The single identity control that separated organizations recovering in days from those shut down for weeks—with the same attacker, same techniques, different outcome - How to stop wasting money on tools that can't see the SaaS integrations and OAuth tokens attackers are already exploiting in your environment - Which gaps in your security posture are preventable right now, before they become next quarter's incident response bill - The defensive investment that delivers ROI in real breach scenarios, not just compliance checkboxes With 15+ years leading incident response teams at Mandiant, PriceWaterhouseCoopers, and Booz Allen Hamilton, Steve has helped security teams make critical decisions under pressure when ransomware is encrypting, data is walking out the door, and the board is demanding answers. He knows which controls actually stop sophisticated threat actors and which ones just look good in budget presentations. This episode is essential listening if you: - Need to defend your security roadmap with evidence from actual breach investigations, not vendor promises - Want to understand why identity keeps appearing in every postmortem and what to do about it before you're the case study - Are tired of "best practices" that don't map to how attackers actually succeed against real organizations Related Episodes: - Muddled Libra: From Spraying to Preying in 2025 - Learn which conditional access policies actually stopped the threat actor Unit 42 calls their toughest fight - Transform Your SOC and Get Ahead of the Threats - Discover how organizations build SOCs that partner effectively with IR teams instead of slowing down containment - Inside Jingle Thief: Cloud Fraud Unwrapped - Understand why your MFA deployment isn't protecting you from identity compromise the way you think it is #IncidentResponse If you think you may have been compromised or have an urgent matter, please contact Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, UK: +44.20.3743.3660, APAC: +65.6983.8730, or Japan: +81.50.1790.0200. About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 42m 27s | ||||||
| 2/12/26 | ![]() When Security Friction Becomes the Backdoor | Security that slows people down is security that gets bypassed. Birat Niraula leads security for Google Enterprise Network, where he oversees protection across on-premise, network infrastructure, enterprise, and cloud environments. In this episode of Threat Vector, host David Moulton explores a critical truth that most security leaders miss: the difference between friction that protects and friction that creates risk. You'll learn: - Why bad security UX isn't just annoying—it's a vulnerability that creates backdoors - How to identify friction that protects (like MFA and jump hosts) versus friction that makes teams bypass controls - Why DevOps teams inject backdoors into production when security slows them down too much - How AI is becoming the new cloud rush—teams deploying models without understanding security risks - The Chrome browser principle: best security is seamless security that users don't have to think about - Why embedding security teams in design processes beats the "sledgehammer approach" of blanket policies - How to use AI agents as security sidekicks to scale beyond what your team can manually review Birat shares hard-won lessons from securing enterprises at massive scale—from building 24/7 SOCs to leading multi-cloud architecture at Goldman Sachs to now protecting Google's infrastructure. But this conversation isn't about his resume. It's about the fundamental tradeoffs security leaders face: velocity versus protection, automation versus human judgment, and when to embrace friction versus when friction becomes the enemy. This episode is essential listening if you're: leading enterprise security programs, struggling with teams that route around your controls, managing DevOps or cloud security, implementing security that doesn't block business velocity, or trying to understand where AI security is heading. Related Episodes: - Securing the Modern Workforce - Why Security Platformization Is the Future of Cyber Resilience - Shifting Security Left #Cloud #SecurityUX #DevSecOps | 33m 57s | ||||||
| 2/5/26 | ![]() Security Success Stories You Haven't Heard | What separates organizations that truly excel at cybersecurity from those that just spend money on it? In this episode of Threat Vector, host David Moulton sits down with Isaias Telhado, Senior Cybersecurity Customer Success Engineer at Palo Alto Networks, to explore what cybersecurity success actually looks like. With over 25 years in IT and security leadership across Nestlé, Zscaler, and now Palo Alto Networks, Isaiah has seen firsthand what transforms organizations from vulnerable and reactive to confident and resilient. You'll learn: - Why the "castle and moat" security model creates massive blind spots that leave you vulnerable from the inside - The museum analogy that finally makes Zero Trust architecture click - How AI is shifting security teams from reactive firefighting to strategic threat forecasting - What "crypto agility" means and why quantum readiness matters today, not tomorrow - The cultural shifts that separate mature security programs from expensive tool collections Isaias shares a powerful case study of a major financial institution that transformed from a devastating data breach caused by misconfiguration to a proactive, cloud-native security posture. The outcome? Incidents dropped dramatically, and the security team's confidence soared—proving security can be a business driver, not a blocker. Beyond technology, Isaiah reveals why collaboration across IT, legal, operations, and business leadership is essential—and why the best security awareness programs are bidirectional, not just pushing policies onto users. With insights on breaking down silos, measuring what matters, and avoiding common pitfalls that slow security maturity even in well-funded organizations, this conversation delivers practical wisdom for security leaders at any stage of their journey. This episode is essential listening if you're: implementing Zero Trust architecture, managing cloud migration while maintaining security, breaking down organizational silos between security and business units, struggling to prove ROI on security investments, or preparing your organization for AI-powered threats and quantum computing risks. Related Episodes: - Why Security Platformization Is the Future of Cyber Resilience - Securing the Modern Workforce - Unlocking Cybersecurity ROI with Platformization #ZeroTrust #CloudSecurity About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 31m 59s | ||||||
| 1/29/26 | ![]() Is Your AI Well-Engineered Enough to Be Trusted? | Can you trust your AI systems with your business, or are they just another attack surface waiting to be exploited? Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity. In this episode of Threat Vector, host David Moulton sits down with Dr. Aaron Isaksen to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments. You'll learn: Why well-engineered AI must be the prerequisite before discussing AI ethics How prompt injection attacks are becoming the "SQL injection of the AI era," and why they may never be fully solved What defending the Black Hat USA NOC with AI-powered security taught about real-world AI resilience How machine learning transforms attack surface management from manual inventory chaos to automated risk reduction Why game development experience creates better cybersecurity AI researchers (and what curiosity has to do with it) Before Palo Alto Networks, Aaron spent 15+ years building products across wildly different domains. From co-founding mobile gaming companies and funding independent game developers through Indie Fund, to leading ML engineering at ASAPP where his teams prototyped state-of-the-art neural networks for NLP. With a PhD from NYU (automated software design), a Master's from MIT (light field rendering), and a BS from UC Berkeley, Aaron brings a unique perspective: AI security isn't about philosophical debates. It's about rigorous engineering, continuous red teaming, and building systems that can withstand determined adversaries. This episode is essential listening if you're: deploying AI in production systems, building security programs around generative AI tools, leading attack surface management initiatives, trying to separate AI security theater from actual resilience, or wondering whether your AI agents can operate safely on the open web. #AI Related Episodes: Identity: The Kill Switch for AI Agents Securing AI in the Enterprise Inside AI Runtime Defense About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 38m 47s | ||||||
| 1/22/26 | ![]() The Kill Switch for AI Agents | Can AI agents be trusted when 80% of today's breaches start with compromised identities? Carey Frey, Chief Security Officer at TELUS, joins Threat Vector host David Moulton to tackle the most overlooked security challenge in the AI revolution: identity. With 20+ years protecting everything from Canada's Communication Security Establishment to one of North America's largest telecommunications companies, Carey brings hard-won wisdom about why identity isn't just important—it's the foundation that determines whether agentic AI becomes a force multiplier or an attack surface disaster. You'll learn: Why 95% of organizations haven't thought about AI agent identity (and what happens when they deploy anyway) The single data layer CISOs need to build before AI agents can operate safely at scale How threat actors have already abandoned malware for something far simpler—and why AI makes it exponentially worse What "delegated authority" means for AI agents and why Gmail's EA permissions model points the way forward The maturity model that tells you if your identity foundation will crumble under agentic AI Carey leads security programs protecting TELUS's global assets while delivering managed cybersecurity services to 450+ customers across Canada. As a member of the Security Innovation Network (SINet), he co-authored practitioner guidance defining what "AI-native identity fabric" actually means—and why solving identity before deploying agents isn't optional. His insights bridge 20 years of government intelligence work with real-world enterprise security at telecommunications scale. Read Carey's work on identity and AI: The AI Revolution: Identity Will Unleash Its Full Power SINet Identity Working Group Strategic Guide This episode is essential listening if you're: evaluating AI agent platforms, struggling with fragmented IAM systems across cloud and on-prem, implementing Zero Trust for non-human identities, or trying to understand why identity suddenly became the CISO's #1 priority after being the "third rail" for decades. Related Episodes: Transform Your SOC And Get Ahead Of The Threats Securing AI in the Enterprise How to Scale Responsible AI in the Enterprise Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 37m 55s | ||||||
| 1/15/26 | ![]() Securing AI Without Slowing Business | What does it take to lead the world's largest cybersecurity company through the AI revolution—without breaking things? Nikesh Arora, Chairman and CEO of Palo Alto Networks, doesn't sugarcoat it: security always becomes an afterthought during innovation cycles. In this special 100th episode of Threat Vector, Nikesh sits down with host David Moulton to share how he transformed Palo Alto Networks from a $2.7B firewall company into the world's largest cybersecurity platform—and why the AI inflection point requires a completely different playbook. You'll learn: Why security inevitably lags innovation (and the psychology behind "Jerry-rigging production") The three-part strategic framework that separates winners from losers during inflection points How "deep laziness" drives first-principles thinking and better decision-making Why enterprises will need 3-5x more data consumption to properly train AI How Palo Alto Networks reduced mean time to detect from 4 days to 1 minute through architectural reinvention What 11 pages of written business principles look like in practice Before Palo Alto Networks, Nikesh served as President and COO at SoftBank and spent nearly a decade at Google as Chief Business Officer. He's seen consumer tech explosions, enterprise transformations, and now leads cybersecurity's response to AI—giving him a rare vantage point on how companies actually navigate technological shifts. The conversation ranges from rapid-fire questions about cricket and family time to deep strategic thinking about looking around corners, normalizing pressure, and the radical bets required to transform a company. Nikesh shares how intent matters more than perfection, why automation will eventually require AI to execute on our behalf, and what he wants his legacy to be. This episode is essential listening if you're: navigating AI adoption without clear playbooks, leading teams through uncertainty, trying to balance innovation velocity with security discipline, or building long-term strategy when the ground keeps shifting beneath you. Related Episodes: Why Security Platformization Is the Future of Cyber Resilience Securing the AI Frontier Transform Your SOC and Get Ahead of the Threats #Leadership #AI Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 40m 27s | ||||||
| 1/8/26 | ![]() Securing the AI Supply Chain | AI security is no longer optional, it’s urgent. In this episode of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. They also explore "vibe coding" the practice of developers relying on instinct and intuition rather than rigorous review when coding with or around LLMs. It's a fun name for a very real risk. Whether you're a CISO, a developer, or anyone helping shape AI in your organization, this conversation is your guide to locking down AI before it locks you out. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 36m 06s | ||||||
| 1/1/26 | ![]() Encore: Confronting China’s Expanding Cyber Threats | While our team is out on winter break, please enjoy this encore episode of Threat Vector . In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen. From the show: ASEAN Entities in the Spotlight: Chinese APT Group Targeting Preparing for a Secure Paris 2024 Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025 FBI talks about how China is testing AI in cyberattacks Hear more from Wendi Whitmore on Threat Vector: Episode 5: From Nation States to Cybercriminals Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com | 22m 55s | ||||||
| 12/25/25 | ![]() Encore: What Happened to Hacker Culture? | While our team is out on winter break, please enjoy this encore episode of Threat Vector . Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarterly magazines at Barnes & Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. Kyle Wilhoit is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: Hacking Exposed Industrial Control Systems and Operationalizing Threat Intelligence. As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals. Connect with Kyle on LinkedIn Previous appearances on Threat Vector: Inside DeepSeek’s Security Flaws (Mar 31, 2025) https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws War Room Best Practices (Nov 07, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research (Jan 11, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research Learn more about Unit 42's threat research at https://unit42.paloaltonetworks.com/. Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at https://www.paloaltonetworks.com/podcasts/threat-vector. Join the conversation on our social media channels: Website: http://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/palo-alto-networks/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com | 38m 02s | ||||||
| 12/18/25 | ![]() Lessons from the Underground | In this episode of Threat Vector, David Moulton is joined by Keith Mularski, Chief Global Ambassador at Qintel and former FBI cybercrime investigator, to explore how threat intel forged in the underground is reshaping today’s SOC. Keith shares lessons from his legendary career—undercover operations, dismantling DarkMarket, and leading some of the FBI’s most successful cybercrime takedowns. Together, they dig into how security operations centers can evolve by adopting the mindset of the adversary. You’ll hear why today’s SOC needs to prioritize threat context over alert volume, how collaboration across sectors drives real transformation, and why the next leap in SOC maturity won’t be technical—it’ll be strategic. You can also find Keith as one of the hosts of N2K CyberWire's Only Malware in the Building podcast that publishes the first Tuesday of each month. Check it out. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 35m 57s | ||||||
| 12/11/25 | ![]() The Adversarial Hacker Mindset | In this episode of Threat Vector, host Michael Heller, Managing Editor for Cortex and Unit 42 and Executive Producer of the podcast, sits down with long-time security leaders Greg Conti and Tom Cross to unpack the hacker mindset and the idea of “dark capabilities” inside modern technology companies. Greg, Principal at Kopidion Cybersecurity and a former Army Cyber Institute founder, and Tom, Head of Threat Research at GetReal and Senior Associate at Kopidion, explain why the real risk is not just what a product is supposed to do, but everything it is technically capable of doing in the hands of insiders, governments, or determined adversaries. Drawing on their DEF CON trainings in adversarial thinking and recent talks on effects based operations for tech companies, they explore how security leaders can systematically map their organization’s hidden capabilities, stress test them with an “if we decided to be evil” lens, and then build the technical and institutional guardrails that keep both people and platforms aligned with ethical and strategic goals. This conversation is especially important for decision makers tasked with securing the workforce in an era of AI, pervasive sensors, and increasingly blurred lines between defense and offense. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 28m 49s | ||||||
| 12/4/25 | ![]() Securing the Modern Workforce - Lessons from Medallia’s CISO | In this episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership at Unit 42, speaks with Jiphun Satapathy, SVP and CISO of Medallia. They discuss how security and user experience must coexist in today’s hybrid and AI-driven workplace. Satapathy explains how Medallia secures its global workforce, manages SaaS adoption, and uses enterprise browsers to protect users without adding friction. The conversation explores GenAI risk, shadow AI, endpoint visibility, and how SASE architecture enables smarter, safer workflows. Learn how CISOs can rethink old processes to keep innovation and protection in balance. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 36m 20s | ||||||
| 11/27/25 | ![]() Hacker Movies Then vs Now | We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content Leader at Palo Alto Networks, who has been writing deeply on this intersection of media, tech, and risk. Together, we’ll examine how cinematic depictions of hacking have shaped public perception, influenced policy, and sometimes eerily foreshadowed modern cyber threats. Expect a blend of film critique, security insight, and cultural reflection. Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com. | 47m 06s | ||||||
Showing 25 of 125
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
3 placements across 3 markets.
Chart Positions
3 placements across 3 markets.

























