<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Staying Ahead of Cloud Attacks with Nathaniel Quist in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-staying-ahead-of-cloud-attacks-with-nathaniel/ta-p/598377</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_Staying-Ahead-Cloud-Attacks_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/62347i73BBC213AFD8669E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat Vector_Staying-Ahead-Cloud-Attacks_palo-alto-networks.jpg" alt="Threat Vector_Staying-Ahead-Cloud-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Palo Alto Networks, speaks with Nathaniel Quist, &lt;EM&gt;Manager of Cloud Threat Intelligence&lt;/EM&gt; at Cortex &amp;amp; Unit 42. Nathaniel leads a team at the forefront of understanding the evolving cloud threat landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1345851370"&gt;&lt;SPAN&gt;&lt;STRONG&gt;What You'll Learn&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;This conversation dives deep into recent cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. Learn about the intricacies of cloud-native threats, how attackers exploit vulnerabilities in AWS, GCP, and Azure, and what organizations can do to enhance their defenses against the most sophisticated cloud threats. Whether you're dealing with multi-cloud environments or scaling your cloud security strategy, this episode offers critical insights for staying ahead of cybercriminals.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go deeper on this topic by reading the Unit 42 article Leaked Environment Variables Allow Large-Scale Extortion Operation in Cloud Environments&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm/?e=CYBW1555035038" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 26 Sep 2024 22:35:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2024-09-26T22:35:00Z</dc:date>
    <item>
      <title>Threat Vector | Staying Ahead of Cloud Attacks with Nathaniel Quist</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-staying-ahead-of-cloud-attacks-with-nathaniel/ta-p/598377</link>
      <description>&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Palo Alto Networks, speaks with Nathaniel Quist, &lt;EM&gt;Manager of Cloud Threat Intelligence&lt;/EM&gt; at Cortex &amp;amp; Unit 42. Nathaniel leads a team at the forefront of understanding the evolving cloud threat landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_Staying-Ahead-Cloud-Attacks_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/62345i171CAA4BEFEF9F45/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat Vector_Staying-Ahead-Cloud-Attacks_palo-alto-networks.jpg" alt="Threat Vector_Staying-Ahead-Cloud-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 22:35:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-staying-ahead-of-cloud-attacks-with-nathaniel/ta-p/598377</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2024-09-26T22:35:00Z</dc:date>
    </item>
  </channel>
</rss>

