<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | How Do Security Teams Keep AI from Becoming a UX Nightmare? in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-how-do-security-teams-keep-ai-from-becoming-a-ux/ta-p/1226860</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_UX Nightmare_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67185iBF7CF9BEF7FAB4A1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector_UX Nightmare_palo-alto-networks.jpg" alt="Threat Vector_UX Nightmare_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AI is transforming cybersecurity at a rapid pace, but how do we ensure security without compromising usability? In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton sits down with Christopher DeBrunner, &lt;EM&gt;VP of Security Operations&lt;/EM&gt; at CBTS, and Ryan Hamrick, &lt;EM&gt;Manager of Security Consulting Services&lt;/EM&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;They explore how AI-driven security is improving threat detection, the risks of over-reliance on automation, and the challenges of maintaining data privacy in AI-enabled environments. The conversation dives into the future of AI governance, how organizations can balance security and user experience, and the role of ethical AI use in cybersecurity. Tune in for expert insights on keeping security effective and seamless.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW3451083492" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 17 Apr 2025 22:11:53 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-04-17T22:11:53Z</dc:date>
    <item>
      <title>Threat Vector | How Do Security Teams Keep AI from Becoming a UX Nightmare?</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-how-do-security-teams-keep-ai-from-becoming-a-ux/ta-p/1226860</link>
      <description>&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton sits down with Christopher DeBrunner, &lt;EM&gt;VP of Security Operations&lt;/EM&gt; at CBTS, and Ryan Hamrick, &lt;EM&gt;Manager of Security Consulting Services&lt;/EM&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_UX Nightmare_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67187i424B52BDA67A341A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector_UX Nightmare_palo-alto-networks.jpg" alt="Threat Vector_UX Nightmare_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 22:11:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-how-do-security-teams-keep-ai-from-becoming-a-ux/ta-p/1226860</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-04-17T22:11:53Z</dc:date>
    </item>
  </channel>
</rss>

