Rephonic
Artwork for Threat Vector by Palo Alto Networks

Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks
Cybersecurity
Artificial Intelligence
Incident Response
Generative AI
Cloud Security
Palo Alto Networks
Unit 42
Ransomware
Risk Management
Operational Technology
Threat Intelligence
AI In Cybersecurity
AI Security
Critical Infrastructure
Zero Trust
User Experience
Multi-Factor Authentication
CISO
Password Management
Phishing Attacks

Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.

PublishesWeeklyEpisodes126Founded2 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Threat Vector by Palo Alto Networks

Latest Episodes

Ingrid Parker, Director of Intel Response at Unit 42, has a background that doesn't fit the mold: art student, Army linguist, systems administrator deployed to Afghanistan, co-author of 11 Strategies of a World-Class Cybersecurity Operations Center. ... more

AI is the most powerful tool defenders have ever had. It's also the most dangerous weapon attackers have ever had. Assaf Keren, CSO at Qualtrics and author of Lessons from the Frontlines, has seen AI reshape both sides of the threat equation. In this... more

YouTube

The FBI sees every breach. You see yours.

Adam Maddock, Section Chief of the FBI's Cyber Technical Analytics and Operations Section, and Jarrod Schlenker, Assistant Section Chief leading the FBI Cyber Division's private-sector engagement, join David... more

What does it take to go from staring at forensic images to sitting across from a CEO whose company is on fire?

Steve Elovitz has spent his entire career in the room when things go wrong. He started in forensics and eDiscovery at PwC, moved to Booz A... more

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CyberWire Daily
CyberWire DailyN2K Networks
Hacking Humans
Hacking HumansN2K Networks
Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap

Recent Guests

Assaf Keren
SVP and Chief Security Officer at Qualtrics
Qualtrics
Episode: AI in the Wrong Hands
Adam Maddock
Section Chief, FBI Cyber Technical Analytics and Operations Section
FBI
Episode: Operation Winter SHIELD: What the FBI Wants Industry to Do Now
Jarrod Forgeschlenker
Assistant Section Chief, FBI Cyber Division's private sector engagement
FBI
Episode: Operation Winter SHIELD: What the FBI Wants Industry to Do Now
Steve Elovitz
VP and managing partner for Unit 42's North America Practice
Unit 42 / Mandiant
Episode: Breach School
Allie Mellen
Author of Code War, investigator of geopolitics and cybersecurity
Author, Code War
Episode: How Nations Hack, Spy, and Win
Elad Koren
Vice President of Product Management for Cortex Cloud
Palo Alto Networks
Episode: Attackers Have Agents. Do You?
Wendi Whitmore
Chief Security Information Officer
Palo Alto Networks
Episode: 39 Seconds to Breach
Sailesh Mishra
Security expert with experience at Uber's Advanced Technologies Group and Palo Alto Networks
Palo Alto Networks
Episode: The Four Horsemen of Agentic Risk
Jeremy D. Brown
Consulting Director at Palo Alto Networks
Palo Alto Networks
Episode: Inside Ransomware Negotiations: Trust Criminals or Walk Away?

Host

David Moulton
Senior Director of Thought Leadership for Unit 42 and host of the show, David brings extensive expertise in cybersecurity and a commitment to educating listeners on emerging threats and effective defense strategies.

Reviews

4.9 out of 5 stars from 141 ratings
  • Insightful and educational

    Awesome podcast discussing and educating on current cybersecurity trends or risks

    Apple Podcasts
    5
    Maocol99
    United States9 months ago
  • Insightful, timely, and concise!

    This is a great podcast for both cybersecurity professionals and enthusiasts. The topics are always timely and relevant, and the experts joining David tend to make extraordinarily complicated subjects easy to understand. Give it a listen!

    Apple Podcasts
    5
    LarsMarie
    United Statesa year ago
  • More OT cybersecurity and Holly rocks.

    It is great to see more episodes on OT security. It helps me as a Sr. Dir responsible for both IT and OT cybersecurity. Holly and others have the skill sets you need on the show.

    Apple Podcasts
    5
    tryangalway
    United Statesa year ago
  • More OT cybersecurity

    It is great to see more episodes zon OT security. It helps me as a Sr. Dir responsible for both IT and OT cybersecurity. I am sure there are others who are just as interested. Keep up the good work.

    Apple Podcasts
    5
    tryangalway
    United Statesa year ago
  • Insightful

    Awesome podcast discussing and educating on current cybersecurity trends or risks

    Apple Podcasts
    5
    sadgirrrl
    United Statesa year ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners find the expert interviews engaging, revealing the personalities behind the technical expertise.
The content is considered timely and relevant, making complex topics accessible for both professionals and enthusiasts.
Listeners appreciate the insightful and educational discussions on current cybersecurity trends and risks.
The podcast is praised for its practical advice and actionable insights in cybersecurity.
Audience members enjoy the variety of topics covered, from technical subjects to the human aspect of cybersecurity.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#172
Canada/Technology
Apple Podcasts
#124
Saudi Arabia/Technology
Apple Podcasts
#201
Finland/Technology
Apple Podcasts
#208
India/Technology

Talking Points

Recent interactions between the hosts and their guests.

AI in the Wrong Hands
Q: What should organizations do first to address AI risk?
The recommended approach is to understand internal AI usage, assess vendor trust, and build guardrails around usage; prioritize identity and data protection as foundational rails, and begin with a robust model risk inventory and ISO/NIST-aligned risk frameworks before expanding AI adoption.
AI in the Wrong Hands
Q: What does a future AI-assisted attack look like at scale?
Assaf outlines a scenario where attackers leverage AI to rapidly enumerate endpoints, establish persistence, and exfiltrate data at scale, with autonomous agentic behavior that reduces human constraints and accelerates attack cycles, demanding stronger bottom-up security controls and runtime protections.
AI in the Wrong Hands
Q: Why this book? Why now?
Assaf explains he wrote the book to share personal stories and practical frameworks developed from his leadership experiences, aiming to provide valuable lessons on curiosity, grit, optimism, and change management in security leadership. He emphasizes that the book consolidates hard-won experiences and structured thinking for readers navigating a rapidly changing AI security landscape.
Operation Winter SHIELD: What the FBI Wants Industry to Do Now
Q: What makes Winter Shield different from other cybersecurity guidance?
Winter Shield compiles actionable, field-tested recommendations directly from investigations, emphasizing what actually gets exploited across many organizations and bringing law enforcement into the planning and response process to improve collaboration and outcomes.
Attackers Have Agents. Do You?
Q: How do you handle the governance and security of the AI agents themselves?
Each agent requires an identity with defined permissions and guardrails to prevent overreach. No one can create agents that exceed the capabilities of the human operating them, and actions are constrained by role-based access to maintain security boundaries.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Threat Vector by Palo Alto Networks

What is Threat Vector by Palo Alto Networks about and what kind of topics does it cover?

Focused on cybersecurity, the episodes present discussions among leading experts who tackle pressing issues in the field. Topics frequently addressed include the latest threats facing organizations, advancements in artificial intelligence, incident response strategies, and the evolving landscape of security including user experience and identity management. The conversations merge technical insights with real-world applications, making complex subjects more accessible for both professionals and individuals interested in cybersecurity trends.

What makes this podcast particularly noteworthy is its commitment to not only inform listeners about threats but also to share strategies for mitigation and success stories that highlight effective sec... more

Where can I find podcast stats for Threat Vector by Palo Alto Networks?

Rephonic provides a wide range of podcast stats for Threat Vector by Palo Alto Networks. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Threat Vector by Palo Alto Networks and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Threat Vector by Palo Alto Networks get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Threat Vector by Palo Alto Networks, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Threat Vector by Palo Alto Networks?

Rephonic provides comprehensive predictive audience data for Threat Vector by Palo Alto Networks, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Threat Vector by Palo Alto Networks have?

To see how many followers or subscribers Threat Vector by Palo Alto Networks has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Threat Vector by Palo Alto Networks?

These podcasts share a similar audience with Threat Vector by Palo Alto Networks:

1. CyberWire Daily
2. Hacking Humans
3. Defense in Depth
4. Cybersecurity Headlines
5. Cybersecurity Today

How many episodes of Threat Vector by Palo Alto Networks are there?

Threat Vector by Palo Alto Networks launched 2 years ago and published 126 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Threat Vector by Palo Alto Networks?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Threat Vector by Palo Alto Networks?

Rephonic pulls ratings and reviews for Threat Vector by Palo Alto Networks from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Threat Vector by Palo Alto Networks?

Rephonic provides full transcripts for episodes of Threat Vector by Palo Alto Networks. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Threat Vector by Palo Alto Networks?

Recent guests on Threat Vector by Palo Alto Networks include:

1. Assaf Keren
2. Adam Maddock
3. Jarrod Forgeschlenker
4. Steve Elovitz
5. Allie Mellen
6. Elad Koren
7. Wendi Whitmore
8. Sailesh Mishra

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days