<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | The Four Horsemen of Agentic Risk in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-four-horsemen-of-agentic-risk/ta-p/1250932</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71031iC010FBEA10AB1167/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Your AI agent just wiped an entire email inbox and said sorry. That's not a hypothetical. It already happened.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/saileshmishra/" target="_blank"&gt;&lt;SPAN&gt;Sailesh Mishra&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Product Marketing at Palo Alto Networks and founder of SydeLabs (acquired by Protect AI), has spent years at the frontier of AI security, from scaling autonomous vehicle programs at Uber's Advanced Technologies Group to building and selling an AI red-teaming startup. He has a clear-eyed view of what autonomous agents can do, what they can be made to do, and what organizations are dangerously unprepared for.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You'll learn:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why the "lethal trifecta" of AI risk gains a fourth, more dangerous dimension when agents have persistent memory&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How attackers can plant a logic bomb inside an agent's memory using entirely benign inputs, then trigger it later&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;What "identity" means for a piece of software, and why scoping agent behavior is the single most impactful security control&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why indirect prompt injection is already happening in the wild, not just in research papers&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The two questions every CISO must answer before authorizing an autonomous agent deployment&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;This episode is essential listening if you're a CISO evaluating your first autonomous agent deployment, a developer building agentic systems today, or a security practitioner trying to get ahead of a threat landscape that is moving faster than anyone expected.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Reading&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/blog/network-security/why-moltbot-may-signal-ai-crisis/" target="_blank"&gt;&lt;SPAN&gt;OpenClaw (formerly Moltbot, Clawdbot) May Signal the Next AI Security Crisis&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/blog/network-security/the-moltbook-case-and-how-we-need-to-think-about-agent-security/" target="_blank"&gt;&lt;SPAN&gt;​​The Moltbook Case and How We Need to Think about Agent Security&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Related Episodes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-the-future-of-ai-agents" target="_blank"&gt;&lt;SPAN&gt;Securing the Future of AI Agents&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-ai-runtime-defense" target="_blank"&gt;&lt;SPAN&gt;Inside AI Runtime Defense&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-ai-in-the-enterprise" target="_blank"&gt;&lt;SPAN&gt;Securing AI in the Enterprise&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW2744362425" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2026-03-26T15:00:00Z</dc:date>
    <item>
      <title>Threat Vector | The Four Horsemen of Agentic Risk</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-four-horsemen-of-agentic-risk/ta-p/1250932</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71031iC010FBEA10AB1167/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Your AI agent just wiped an entire email inbox and said sorry. That's not a hypothetical. It already happened.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/saileshmishra/" target="_blank"&gt;&lt;SPAN&gt;Sailesh Mishra&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Product Marketing at Palo Alto Networks and founder of SydeLabs (acquired by Protect AI), has spent years at the frontier of AI security, from scaling autonomous vehicle programs at Uber's Advanced Technologies Group to building and selling an AI red-teaming startup. He has a clear-eyed view of what autonomous agents can do, what they can be made to do, and what organizations are dangerously unprepared for.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You'll learn:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why the "lethal trifecta" of AI risk gains a fourth, more dangerous dimension when agents have persistent memory&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How attackers can plant a logic bomb inside an agent's memory using entirely benign inputs, then trigger it later&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;What "identity" means for a piece of software, and why scoping agent behavior is the single most impactful security control&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why indirect prompt injection is already happening in the wild, not just in research papers&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The two questions every CISO must answer before authorizing an autonomous agent deployment&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;This episode is essential listening if you're a CISO evaluating your first autonomous agent deployment, a developer building agentic systems today, or a security practitioner trying to get ahead of a threat landscape that is moving faster than anyone expected.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Reading&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/blog/network-security/why-moltbot-may-signal-ai-crisis/" target="_blank"&gt;&lt;SPAN&gt;OpenClaw (formerly Moltbot, Clawdbot) May Signal the Next AI Security Crisis&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/blog/network-security/the-moltbook-case-and-how-we-need-to-think-about-agent-security/" target="_blank"&gt;&lt;SPAN&gt;​​The Moltbook Case and How We Need to Think about Agent Security&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Related Episodes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-the-future-of-ai-agents" target="_blank"&gt;&lt;SPAN&gt;Securing the Future of AI Agents&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-ai-runtime-defense" target="_blank"&gt;&lt;SPAN&gt;Inside AI Runtime Defense&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-ai-in-the-enterprise" target="_blank"&gt;&lt;SPAN&gt;Securing AI in the Enterprise&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW2744362425" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-four-horsemen-of-agentic-risk/ta-p/1250932</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2026-03-26T15:00:00Z</dc:date>
    </item>
  </channel>
</rss>

