

Threat Vector by Palo Alto Networks
Palo Alto Networks and N2K Networks
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next.Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
Episodes
Mentioned books

Apr 9, 2026 • 44min
Attackers Have Agents. Do You?
Elad Koren, VP of Product Management for Cortex Cloud and AI agents expert, explains agentic-first security and why machine agents are already running. Short takes on how agents automate analyst basics, change SOC roles, and require identities, guardrails, and new data approaches. He also outlines concrete agent tasks and why defenders must plan for agent security now.

11 snips
Apr 2, 2026 • 41min
39 Seconds to Breach
Wendi Whitmore, Chief Security Intelligence Officer and veteran incident responder from Mandiant, CrowdStrike and IBM X-Force. She talks about AI-driven attack speeds and why defenses must operate at machine pace. She contrasts Volt Typhoon and Salt Typhoon motivations. She outlines building resilient teams, operational telemetry sharing, and the need for both AI for security and security for AI.

Mar 26, 2026 • 37min
The Four Horsemen of Agentic Risk
Sailesh Mishra, AI security practitioner and founder with experience at Uber's Advanced Technologies Group and AI startups. He explores autonomous agents that act, not just answer. He warns about agents with persistent memory, logic-bomb style attacks, and indirect prompt injection in the wild. He stresses scoping agent identity and monitoring every tool call to catch time-shifted, stateful threats.

Mar 19, 2026 • 30min
Inside Ransomware Negotiations: Trust Criminals or Walk Away?
Jeremy D. Brown, Consulting Director at Unit 42 with extensive ransomware negotiation and incident response experience. He recounts how initial contact yields forensic clues and which attacker playbooks are most common. He explains timing, who should be at the table, why politeness helps, and which groups are too risky or sanctioned to engage.

12 snips
Mar 12, 2026 • 40min
Who Holds Power When AI Compresses Decision Time?
Erica L. Shoemate, former FBI and U.S. intelligence leader turned AI and policy strategist, explores how AI compresses decision timelines and reshapes security. She discusses governance built alongside innovation. Short, sharp takes cover human-centered design to avoid cognitive overload, the strategic role of trust, and why policy should be guardrails rather than brakes.

5 snips
Mar 5, 2026 • 30min
Zero Trust Without the Hype
Brandon Hogle, Consulting Director experienced in Zero Trust architecture across commercial, federal, and defense; LeeAnne Pelzer, Senior Consulting Director who operationalizes Zero Trust for business outcomes. They discuss why Zero Trust often stalls, visibility and asset inventory gaps, outcome-driven quick wins, dynamic access by user and device context, breaking silos for shared outcomes, and pragmatic steps to sustain Zero Trust over time.

Mar 4, 2026 • 34min
Unit 42's Iran Threat Brief: What We're Seeing
Andy Piazza, Senior Director of Threat Intelligence with 20+ years in ops, and Justin Moore, Senior Manager with intelligence and rapid‑response experience, walk through Unit 42’s Iran threat brief. They discuss active hacktivist groups and which claims are unverified. They explain how Iran’s outages shift activity worldwide. They highlight dispersed operators, TTPs to watch, and immediate defensive priorities.

Feb 26, 2026 • 38min
The Billion Dollar Hiring Scam Funding North Korea
Evan Gordenker, Director-level investigator of DPRK operations and AI security, reveals how North Korea embeds fabricated identities and accomplice networks into legitimate hiring pipelines. He discusses deepfakes, interview stand-ins, and AI-assisted deception. He also covers how roles are chosen, facilitator infrastructures, detection gaps in HR and security, and the shift from wage theft to extortion.

Feb 19, 2026 • 42min
Inside 750 Breaches with Unit 42
Steve Elovitz, incident response leader for Unit 42 with 15+ years at Mandiant, PwC, and Booz Allen, breaks down what 750+ breaches reveal. He discusses shrinking detection windows and autonomous containment. Identity as the top attack surface and overprivileged SaaS integrations get focus. High-ROI defensive priorities like segmentation, identity hardening, and visibility are highlighted.

11 snips
Feb 12, 2026 • 34min
When Security Friction Becomes the Backdoor
Birat Niraula, a security leader who protects enterprise, network, on-prem, and cloud systems. He digs into how poor security UX creates backdoors. He contrasts protective friction like MFA with harmful friction that drives workarounds. He warns of AI repeating cloud security mistakes and urges embedding seamless security in design to keep velocity without adding risk.


