<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | When Security Friction Becomes the Backdoor in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-when-security-friction-becomes-the-backdoor/ta-p/1247971</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70645iB15DC9A05761EF9F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of Threat Vector, host &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt;&lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; explores a critical truth that most security leaders miss: the difference between friction that protects and friction that creates risk. Our guest this week is&amp;nbsp;&lt;A href="https://www.linkedin.com/in/biratniraula" target="_blank"&gt;Birat Niraula.&lt;/A&gt;&amp;nbsp;Birat leads security for Google Enterprise Network, where he oversees protection across on-premise, network infrastructure, enterprise, and cloud environments.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You'll learn:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why bad security UX isn't just annoying—it's a vulnerability that creates backdoors&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How to identify friction that protects (like MFA and jump hosts) versus friction that makes teams bypass controls&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why DevOps teams inject backdoors into production when security slows them down too much&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How AI is becoming the new cloud rush—teams deploying models without understanding security risks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The Chrome browser principle: best security is seamless security that users don't have to think about&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why embedding security teams in design processes beats the "sledgehammer approach" of blanket policies&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How to use AI agents as security sidekicks to scale beyond what your team can manually review&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Birat shares hard-won lessons from securing enterprises at massive scale—from building 24/7 SOCs to leading multi-cloud architecture at Goldman Sachs to now protecting Google's infrastructure. But this conversation isn't about his resume. It's about the fundamental tradeoffs security leaders face: velocity versus protection, automation versus human judgment, and when to embrace friction versus when friction becomes the enemy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This episode is essential listening if you're:&lt;/STRONG&gt;&lt;SPAN&gt; leading enterprise security programs, struggling with teams that route around your controls, managing DevOps or cloud security, implementing security that doesn't block business velocity, or trying to understand where AI security is heading.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Episodes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-the-modern-workforce-lessons-from-medallias-ciso" target="_blank"&gt;&lt;SPAN&gt;Securing the Modern Workforce&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-why-security-platformization-is-the-future-of-cyber-resilience" target="_blank"&gt;&lt;SPAN&gt;Why Security Platformization Is the Future of Cyber Resilience&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-shifting-security-left" target="_blank"&gt;&lt;SPAN&gt;Shifting Security Left&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW3620110023" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 12 Feb 2026 17:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2026-02-12T17:00:00Z</dc:date>
    <item>
      <title>Threat Vector | When Security Friction Becomes the Backdoor</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-when-security-friction-becomes-the-backdoor/ta-p/1247971</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70645iB15DC9A05761EF9F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of Threat Vector, host &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt;&lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; explores a critical truth that most security leaders miss: the difference between friction that protects and friction that creates risk. Our guest this week is&amp;nbsp;&lt;A href="https://www.linkedin.com/in/biratniraula" target="_blank"&gt;Birat Niraula.&lt;/A&gt;&amp;nbsp;Birat leads security for Google Enterprise Network, where he oversees protection across on-premise, network infrastructure, enterprise, and cloud environments.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You'll learn:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why bad security UX isn't just annoying—it's a vulnerability that creates backdoors&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How to identify friction that protects (like MFA and jump hosts) versus friction that makes teams bypass controls&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why DevOps teams inject backdoors into production when security slows them down too much&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How AI is becoming the new cloud rush—teams deploying models without understanding security risks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The Chrome browser principle: best security is seamless security that users don't have to think about&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why embedding security teams in design processes beats the "sledgehammer approach" of blanket policies&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How to use AI agents as security sidekicks to scale beyond what your team can manually review&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Birat shares hard-won lessons from securing enterprises at massive scale—from building 24/7 SOCs to leading multi-cloud architecture at Goldman Sachs to now protecting Google's infrastructure. But this conversation isn't about his resume. It's about the fundamental tradeoffs security leaders face: velocity versus protection, automation versus human judgment, and when to embrace friction versus when friction becomes the enemy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This episode is essential listening if you're:&lt;/STRONG&gt;&lt;SPAN&gt; leading enterprise security programs, struggling with teams that route around your controls, managing DevOps or cloud security, implementing security that doesn't block business velocity, or trying to understand where AI security is heading.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Episodes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-the-modern-workforce-lessons-from-medallias-ciso" target="_blank"&gt;&lt;SPAN&gt;Securing the Modern Workforce&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-why-security-platformization-is-the-future-of-cyber-resilience" target="_blank"&gt;&lt;SPAN&gt;Why Security Platformization Is the Future of Cyber Resilience&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-shifting-security-left" target="_blank"&gt;&lt;SPAN&gt;Shifting Security Left&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW3620110023" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 12 Feb 2026 17:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-when-security-friction-becomes-the-backdoor/ta-p/1247971</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2026-02-12T17:00:00Z</dc:date>
    </item>
  </channel>
</rss>

