<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Why Big Data Will Rule Cybersecurity in 2025 in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-why-big-data-will-rule-cybersecurity-in-2025/ta-p/999018</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_Dec-19_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64814i88FBF995322CB9B9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector_Dec-19_palo-alto-networks.jpg" alt="Threat Vector_Dec-19_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this episode of Threat Vector, David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, talks with &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Nir Zuk&lt;/STRONG&gt;&lt;/FONT&gt;, &lt;EM&gt;Founder and CTO&lt;/EM&gt; of Palo Alto Networks. They talk about Palo Alto Networks predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Nir sheds light on how having more data leads to smarter threat analysis and why big players have the edge over startups. They also discuss quantum computing and whether its potential to break encryption is realistic or overhyped. This conversation offers practical advice for decision-makers on how to prepare for what's next in cybersecurity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Want to read all of Palo Alto Networks 2025 Predictions? Read "&lt;EM&gt;&lt;A href="https://www.paloaltonetworks.com/why-paloaltonetworks/cyber-predictions" target="_self"&gt;The Convergence of Cybersecurity and AI: 7 Game-Changing Predictions for 2025&lt;/A&gt;".&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Curious about Nir’s interview in Computerworld from 2010? Revisit “&lt;A href="https://www.computerworld.com/article/1515006/how-i-got-here-nir-zuk-cto-palo-alto-networks.html" target="_self"&gt;&lt;EM&gt;How I Got Here: Nir Zuk, CTO, Palo Alto Networks&lt;/EM&gt;&lt;/A&gt;”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW3780358065" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 19 Dec 2024 22:53:06 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2024-12-19T22:53:06Z</dc:date>
    <item>
      <title>Threat Vector | Why Big Data Will Rule Cybersecurity in 2025</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-why-big-data-will-rule-cybersecurity-in-2025/ta-p/999018</link>
      <description>&lt;P&gt;In this episode of Threat Vector, David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, talks with &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Nir Zuk&lt;/STRONG&gt;&lt;/FONT&gt;, &lt;EM&gt;Founder and CTO&lt;/EM&gt; of Palo Alto Networks. They talk about Palo Alto Networks predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_Dec-19_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64816i1883DEC0498C2B14/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector_Dec-19_palo-alto-networks.jpg" alt="Threat Vector_Dec-19_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 22:53:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-why-big-data-will-rule-cybersecurity-in-2025/ta-p/999018</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2024-12-19T22:53:06Z</dc:date>
    </item>
  </channel>
</rss>

