Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Don't Panic! is the official podcast from Unit 42 at Palo Alto Networks. We find the big issues that are frustrating cyber security practitioners and help simplify them so they don't need to panic.
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
Join us as we train our neural nets on the theme of the century: AI. Sonya Huang, Pat Grady and more Sequoia Capital partners host conversations with leading AI builders and researchers to ask critical questions and develop a deeper understanding of the evolving technologies—and their implications for technology, business and society. The content of this podcast does not constitute investment advice, an offer to provide investment advisory services, or an offer to sell or solicitation of an ...
…
continue reading
A weekly podcast featuring the leading thinkers in business and management.
…
continue reading
Audio only segments of theCUBE's 'Breaking Analysis' hosted by Dave Vellante (@dvellante), Powered by ETR.
…
continue reading
We feature the brightest minds in B2B sales and marketing, sharing secrets to driving greater volume, velocity and conversion of sales pipelines in any industry. We cover the entire pipeline– demand generation, lead management, sales effectiveness, technology and more– all focused on helping you find, manage and win more business.
…
continue reading
All engineering is customer-facing! Especially sales engineering.
…
continue reading
הפודקאסט שמספר את מאחורי הקלעים המנטליים של א.נשים באקוסיסטם היזמי
…
continue reading
In-depth conversations on technology and business with senior leaders from top global companies. Hosted by industry analyst Michael Krigsman.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Greg Sobiech speaks with high performing leaders to discover how brands create exceptional value and grow revenues for their through obsession and sacrifice. The leaders who succeed today are those who are relentlessly obsessed about a handful of the most important things. Being ‘obsessed’ means channelling all your team’s energy into what really matters. ‘sacrifice’ means deliberately choosing to do the ‘hard things’ because they will deliver greater value in the medium to long term. For ea ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Dr. Hal Scherz Hal C. Scherz MD has been practicing pediatric urology for 23 years. He has been in private practice in San Diego, California and in Atlanta, Georgia and has been on the faculty of the University of California- San Diego and Emory University. He has been involved in resident and fellow training for all of his career, and has published over 75 peer reviewed articles and contributed chapters to 6 academic texts. He has been a reviewer for over 20 years for the major peer reviewe ...
…
continue reading

1
Risk, Resilience and Real Talk with Sam Ainscow
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45In this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a business must prepare through practical training, testing, and honest post-…
…
continue reading

1
Tech Bytes: Nix AI Risks With Palo Alto Networks Prisma AIRS, Prisma Access Browser (Sponsored)
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05AI is no longer on the horizon. It’s part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today’s Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »…
…
continue reading

1
Lead Management Directly Leads to Revenue Impact for Palo Alto Networks
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Lauren Daley, Director, Marketing Operations, and Jeremy Schwartz, Sr. Manager, Global Lead Management & Strategy at Palo Alto Networks. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT …
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Snowflake & Databricks Cross the Rubicon into a New Competitive Domain
57:59
57:59
Play later
Play later
Lists
Like
Liked
57:59By SiliconANGLE
…
continue reading

1
Courageous Marketing: The B2B Marketer's Playbook for Career Success
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52This week's show is entitled, "Courageous Marketing: The B2B Marketer's Playbook for Career Success" and my guest is Udi Ledergor, Chief Evangelist at Gong. Tune in to... Learn how to create memorable brand experiences and why they are crucial for lasting customer connections. Understand the balance of providing psychological safety and process acc…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading
This episode talks about Application Assurance with Prisma SD WAN.
…
continue reading

1
Despite AI Momentum, Tech Spending Faces Continued Uncertainty
38:13
38:13
Play later
Play later
Lists
Like
Liked
38:13By SiliconANGLE
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
Risky Business #793 -- Scattered Spider is hijacking MX records
1:04:52
1:04:52
Play later
Play later
Lists
Like
Liked
1:04:52In this week’s edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week’s news, including: EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed Brian …
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
What Contemporary CMOing and Feeding Teenage Boys Have In Common
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Veena Vadgama, Fractional CMO and Kate Long, Vice President, Marketing at Crunchbase. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also av…
…
continue reading
Although we’ve seen great successes come out of the technology sector in recent decades, many critics — and even some insiders — say it’s due for an overhaul. As a longtime Silicon Valley engineer and executive and cofounder of the Grace Hopper Celebration of Women in Computing conference, Telle Whitney argues that tech culture is still too closed-…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
From Data Centers to Dyson Spheres: P-1 AI's Path to Hardware Engineering AGI
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25Former Airbus CTO Paul Eremenko shares his vision for bringing AI to physical engineering, starting with Archie—an AI agent that works alongside human engineers. P-1 AI is tackling the challenge of generating synthetic training data to teach AI systems about complex physical systems, from data center cooling to aircraft design and beyond. Eremenko …
…
continue reading

1
Are You Making These COMMON AI Organization Mistakes? | CXOTalk #881
53:11
53:11
Play later
Play later
Lists
Like
Liked
53:11How do you transform a tech giant into an AI-first (or AI-native) organization? In CXOTalk episode 881, Cisco's President and Chief Product Officer, Jeetu Patel, reveals the blueprint for building AI-native companies in 2025. Discover why AI won't replace your job – but someone using AI better than you will. Learn how Cisco is revolutionizing its e…
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading

1
Chewing Glass: Stories From an Early-Stage Entrepreneur
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13This week's show is entitled, "Chewing Glass: Stories From an Early-Stage Entrepreneur" and my guest is Ben Henson, Co-Founder, CRO at Peel. Tune in to learn: How to transition from a successful career in marketing to entrepreneurship and find your path. The role of AI in creating efficient marketing solutions and addressing unmet market needs. Str…
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading
In this episode of Threat Vector, host David Moulton speaks with Tanya Shastri, SVP of Product Management, and Navneet Singh, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducin…
…
continue reading

51
What Big Changes Are Coming to AI in 2025? | CXOTalk #880
53:51
53:51
Play later
Play later
Lists
Like
Liked
53:51AI strategist and TikTok commentator Nate B. Jones joins CXOTalk host Michael Krigsman to explain the high-stakes race among OpenAI, Google, Meta, and others to advance large language models. The discussion explores token economics, model specialization, and hands-on prompting skills every executive needs to translate AI progress into business resu…
…
continue reading

1
CISO Cheat Sheet, as Role Evolves and vCISO is Viable, Cobalt Strike and Resilience - Theresa Lanowitz, Rohit Dhamankar - BSW #396
1:17:08
1:17:08
Play later
Play later
Lists
Like
Liked
1:17:08In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
…
continue reading

1
Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain’s legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti …
…
continue reading

1
Gong’s Amit Bendov: From Meeting Recordings to Revenue AI
42:05
42:05
Play later
Play later
Lists
Like
Liked
42:05CEO Amit Bendov shares how Gong evolved from a meeting transcription tool to an AI-powered revenue platform that's increasing sales capacity by up to 60%. He explains why task-specific AI agents are the key to enterprise adoption, and why human accountability will remain crucial even as AI takes over routine sales tasks. Amit also reveals how Gong …
…
continue reading

1
WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and More.. - SWN #478
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-478
…
continue reading

1
From CMO to CRO: Best Practices and Cautionary Tales From a B2B Legend
25:17
25:17
Play later
Play later
Lists
Like
Liked
25:17In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Latané Conant, Chief Revenue Officer at 6sense. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also available on demand). In just 20 fast-pa…
…
continue reading

1
The Secrets Behind Barry Diller’s Business Success
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05To achieve long-term success in tumultuous businesses like media and entertainment, following formulas and data won't get you there. Barry Diller, the current Chairman and Senior Executive of both IAC and Expedia Group, has built a decades-long career in TV, film, and digital media by going with his instincts and betting on what he views as good id…
…
continue reading

1
Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
2:12:42
2:12:42
Play later
Play later
Lists
Like
Liked
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading

1
How Dell Is Riding the AI Wave While Serving Its Massive Installed Base
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13By SiliconANGLE
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
LIVE: Google's Jeff Dean on the Coming Transformations in AI
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59At AI Ascent 2025, Jeff Dean makes bold predictions. Discover how the pioneer behind Google's TPUs and foundational AI research sees the technology evolving, from specialized hardware to more organic systems, and future engineering capabilities.By Sequoia Capital
…
continue reading

1
Risky Biz Soap Box: Push Security's browser-first twist on identity security
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
…
continue reading
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
…
continue reading

1
Aligning Attribution with Modern Buying Journey Realities
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Ed Grossman, Chief Data Nerd at NavigateIQ. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also available on demand). In just 20 fast-paced …
…
continue reading

1
LIVE: Ambient Agents and the New Agent Inbox ft. Harrison Chase of LangChain
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Recorded live at Sequoia’s AI Ascent 2025: LangChain CEO Harrison Chase introduces the concept of ambient agents, AI systems that operate continuously in the background responding to events rather than direct human prompts. Learn how these agents differ from traditional chatbots, why human oversight remains essential and how this approach could dra…
…
continue reading

1
LIVE: How AI is Reinventing Software Business Models ft. Bret Taylor of Sierra
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30Recorded live at Sequoia’s AI Ascent 2025: Sierra co-founder Bret Taylor discusses why AI is driving a fundamental shift from subscription-based pricing to outcomes-based models. Learn why this transition is harder for incumbents than startups, why applied AI and vertical specialization represent the biggest opportunities for entrepreneurs and how …
…
continue reading

1
CISO Communication and Hiring, as they Combat Threat and Penetration Testing Trends - Gunter Ollmann, Derek Manky - BSW #395
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
…
continue reading