<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Shifting Left in Security Design in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-shifting-left-in-security-design/ta-p/1233766</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template (8).jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68439i32A073C7D9D8D1E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template (8).jpg" alt="Threat Vector Template (8).jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, David Moulton talks with Dimitry Shvartsman, &lt;EM&gt;Co-Founder&lt;/EM&gt; and &lt;EM&gt;Chief Product Officer&lt;/EM&gt; of Prime Security, about transforming security into a proactive business enabler. Drawing on decades of experience, Dimitry explains why integrating security at the design stage—not after deployment—is key to reducing risk and improving outcomes. The conversation highlights the challenges of scaling secure development and the role of automation in modern application security.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;If you're interested in aligning product, design, and security teams to build more resilient software, this episode delivers clear insight and practical advice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="nofollow noopener noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW2913138166" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 26 Feb 2026 12:50:41 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2026-02-26T12:50:41Z</dc:date>
    <item>
      <title>Threat Vector | Shifting Left in Security Design</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-shifting-left-in-security-design/ta-p/1233766</link>
      <description>&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, David Moulton talks with Dimitry Shvartsman, &lt;EM&gt;Co-Founder&lt;/EM&gt; and &lt;EM&gt;Chief Product Officer&lt;/EM&gt; of Prime Security, about transforming security into a proactive business enabler.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template (8).jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68440i39EAF96D8693ADBB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template (8).jpg" alt="Threat Vector Template (8).jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 12:50:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-shifting-left-in-security-design/ta-p/1233766</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2026-02-26T12:50:41Z</dc:date>
    </item>
  </channel>
</rss>

