Rephonic
Artwork for Threat Vector by Palo Alto Networks

Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks
Cybersecurity
Artificial Intelligence
Cve-2024-3400
Incident Response
Threat Intelligence
Threat Hunting
Pan-Os
Unit 42
Social Engineering
Threat Intelligence Feeds
Cloud Computing
Cybersecurity Threats
Ivanti
SEC Cybersecurity Regulations
Data Privacy
Materiality
Midnight Eclipse
Machine Learning
Advanced Persistent Threats (apts)
Governance Risk Management

Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.

PublishesWeeklyEpisodes120Founded2 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Threat Vector by Palo Alto Networks

Latest Episodes

Can your organization survive a breach in 39 seconds? That's how fast attackers are moving now, and if your defenses are still running at human speed, you're already behind.

⁠Wendi Whitmore⁠, Chief Security Intelligence Officer at Palo Alto Networks... more

Your AI agent just wiped an entire email inbox and said sorry. That's not a hypothetical. It already happened.

Sailesh Mishra, Product Marketing at Palo Alto Networks and founder of SydeLabs (acquired by Protect AI), has spent years at the frontier ... more

What happens when you're face-to-face with a ransomware gang demanding millions—and every decision could determine whether your company survives?

Jeremy D. Brown, Consulting Director at Palo Alto Networks Unit 42 with nearly seven years negotiating ... more

What if the choices we make about AI security today determine who holds power tomorrow?

Erica L. Shoemate brings over a decade of experience from the FBI and U.S. Intelligence Community, followed by senior leadership roles at Twitter, Amazon, and Me... more

YouTube

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CyberWire Daily
CyberWire DailyN2K Networks
Hacking Humans
Hacking HumansN2K Networks
The Find Out Podcast
The Find Out PodcastFind Out Media & Studio71
Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap

Recent Guests

Sailesh Mishra
Security expert with experience at Uber's Advanced Technologies Group and Palo Alto Networks
Palo Alto Networks
Episode: The Four Horsemen of Agentic Risk
Jeremy D. Brown
Consulting Director at Palo Alto Networks
Palo Alto Networks
Episode: Inside Ransomware Negotiations: Trust Criminals or Walk Away?
Erica S.
Advocate for health equity and national security expert with FBI background; leads strategy at Lead Within Strategy
Lead Within Strategy
Episode: Who Holds Power When AI Compresses Decision Time?
Justin Moore
Rapid Response Lead, Fusion Intelligence Team
Unit 42, Palo Alto Networks
Episode: Unit 42's Iran Threat Brief: What We're Seeing
Evan Gordenker
Consulting Director focused on AI and disrupting the activity of the DPRK
Episode: The Billion Dollar Hiring Scam Funding North Korea
Steve Elovitz
Leads Unit 42's North America Consulting Practice, experienced in incident response
Unit 42, Palo Alto Networks
Episode: Inside 750 Breaches with Unit 42
Birat Niraula
Head of Security for Google Enterprise Networks
Google
Episode: When Security Friction Becomes the Backdoor
Aaron Isaksen
Vice President of AI Research and Engineering at Palo Alto Networks
Palo Alto Networks
Episode: Is Your AI Well-Engineered Enough to Be Trusted?
Carey Frey
Chief Security Officer at Telus
Telus
Episode: The Kill Switch for AI Agents

Host

David Moulton
Senior Director of Thought Leadership for Unit 42 and host of the show, David brings extensive expertise in cybersecurity and a commitment to educating listeners on emerging threats and effective defense strategies.

Reviews

4.8 out of 5 stars from 137 ratings
  • Insightful and educational

    Awesome podcast discussing and educating on current cybersecurity trends or risks

    Apple Podcasts
    5
    Maocol99
    United States8 months ago
  • Insightful, timely, and concise!

    This is a great podcast for both cybersecurity professionals and enthusiasts. The topics are always timely and relevant, and the experts joining David tend to make extraordinarily complicated subjects easy to understand. Give it a listen!

    Apple Podcasts
    5
    LarsMarie
    United Statesa year ago
  • More OT cybersecurity and Holly rocks.

    It is great to see more episodes on OT security. It helps me as a Sr. Dir responsible for both IT and OT cybersecurity. Holly and others have the skill sets you need on the show.

    Apple Podcasts
    5
    tryangalway
    United Statesa year ago
  • More OT cybersecurity

    It is great to see more episodes zon OT security. It helps me as a Sr. Dir responsible for both IT and OT cybersecurity. I am sure there are others who are just as interested. Keep up the good work.

    Apple Podcasts
    5
    tryangalway
    United Statesa year ago
  • Insightful

    Awesome podcast discussing and educating on current cybersecurity trends or risks

    Apple Podcasts
    5
    sadgirrrl
    United Statesa year ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners find the expert interviews engaging, revealing the personalities behind the technical expertise.
The content is considered timely and relevant, making complex topics accessible for both professionals and enthusiasts.
Listeners appreciate the insightful and educational discussions on current cybersecurity trends and risks.
The podcast is praised for its practical advice and actionable insights in cybersecurity.
Audience members enjoy the variety of topics covered, from technical subjects to the human aspect of cybersecurity.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#140
Australia/Technology
Apple Podcasts
#174
Germany/Technology
Apple Podcasts
#57
Norway/Technology
Apple Podcasts
#83
Poland/Technology
Apple Podcasts
#103
Brazil/Technology
Apple Podcasts
#134
Singapore/Technology

Talking Points

Recent interactions between the hosts and their guests.

Inside Ransomware Negotiations: Trust Criminals or Walk Away?
Q: How do sanctions and legal considerations influence whether you pay?
Sanctions checks, AML screening, and external counsel guidance all strongly influence decisions; paying sanctioned actors is avoided, and legal risk and potential liability are weighed carefully with stakeholders.
Inside Ransomware Negotiations: Trust Criminals or Walk Away?
Q: What are the red lines defenders should avoid during negotiations?
Red lines include appearing desperate for the decryption key and speaking to criminals in a hostile or insulting manner; maintaining a professional, empathetic stance tends to yield more information and better outcomes.
Inside Ransomware Negotiations: Trust Criminals or Walk Away?
Q: Can you walk us through how you decide when to begin negotiations versus walking away?
Negotiations typically start within a three- to five-day window, depending on the threat actor's note and the availability of reliable data; decisions to walk away are driven by data value, backup integrity, and whether paying would meaningfully reduce risk or simply reward the attacker.
Who Holds Power When AI Compresses Decision Time?
Q: What role do human-centered principles play in AI governance for security teams?
Human-in-the-loop decisions, diversity of perspectives, and ongoing education are essential to prevent overreliance on models and to keep ethical considerations at the fore during high-stakes moments.
Who Holds Power When AI Compresses Decision Time?
Q: How should organizations balance rapid innovation with the safeguards of policy and ethics?
Restraint is not anti-innovation; it's about ensuring accountability and durable capability through guardrails, transparency, and continuous auditability to prevent catastrophic failures and maintain trust.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Threat Vector by Palo Alto Networks

What is Threat Vector by Palo Alto Networks about and what kind of topics does it cover?

Focused on cybersecurity, the episodes present discussions among leading experts who tackle pressing issues in the field. Topics frequently addressed include the latest threats facing organizations, advancements in artificial intelligence, incident response strategies, and the evolving landscape of security including user experience and identity management. The conversations merge technical insights with real-world applications, making complex subjects more accessible for both professionals and individuals interested in cybersecurity trends.

What makes this podcast particularly noteworthy is its commitment to not only inform listeners about threats but also to share strategies for mitigation and success stories that highlight effective sec... more

Where can I find podcast stats for Threat Vector by Palo Alto Networks?

Rephonic provides a wide range of podcast stats for Threat Vector by Palo Alto Networks. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Threat Vector by Palo Alto Networks and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Threat Vector by Palo Alto Networks get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Threat Vector by Palo Alto Networks, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Threat Vector by Palo Alto Networks?

Rephonic provides comprehensive predictive audience data for Threat Vector by Palo Alto Networks, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Threat Vector by Palo Alto Networks have?

To see how many followers or subscribers Threat Vector by Palo Alto Networks has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Threat Vector by Palo Alto Networks?

These podcasts share a similar audience with Threat Vector by Palo Alto Networks:

1. CyberWire Daily
2. Hacking Humans
3. The Find Out Podcast
4. Defense in Depth
5. Cybersecurity Today

How many episodes of Threat Vector by Palo Alto Networks are there?

Threat Vector by Palo Alto Networks launched 2 years ago and published 120 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Threat Vector by Palo Alto Networks?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Threat Vector by Palo Alto Networks?

Rephonic pulls ratings and reviews for Threat Vector by Palo Alto Networks from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Threat Vector by Palo Alto Networks?

Rephonic provides full transcripts for episodes of Threat Vector by Palo Alto Networks. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Threat Vector by Palo Alto Networks?

Recent guests on Threat Vector by Palo Alto Networks include:

1. Sailesh Mishra
2. Jeremy D. Brown
3. Erica S.
4. Justin Moore
5. Evan Gordenker
6. Steve Elovitz
7. Birat Niraula
8. Aaron Isaksen

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days