<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | From Policy to Cyber Interference in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-from-policy-to-cyber-interference/ta-p/1236644</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68998i1B150599E9247B7F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;In this episode of Threat Vector, guest-host &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/mikesiko/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Michael Sikorski&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; speaks with &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/tombossert/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Thomas P. Bossert&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense that “interferes with attackers mid-operation.” Tom shares insights on how companies can shift from chasing ephemeral indicators to engaging with threat actors in encrypted traffic using active threat interference. We dive deep into the disconnect between policy rhetoric and real-world tech, why defensive action matters now, and how commercial cyber deterrence can work. Cyber leaders can expect a practical discussion on reshaping defense for today’s threat landscape.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW8171435304" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 28 Aug 2025 16:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-08-28T16:00:00Z</dc:date>
    <item>
      <title>Threat Vector | From Policy to Cyber Interference</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-from-policy-to-cyber-interference/ta-p/1236644</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68998i1B150599E9247B7F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;In this episode of Threat Vector, guest-host &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/mikesiko/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Michael Sikorski&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; speaks with &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/tombossert/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Thomas P. Bossert&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense that “interferes with attackers mid-operation.” Tom shares insights on how companies can shift from chasing ephemeral indicators to engaging with threat actors in encrypted traffic using active threat interference. We dive deep into the disconnect between policy rhetoric and real-world tech, why defensive action matters now, and how commercial cyber deterrence can work. Cyber leaders can expect a practical discussion on reshaping defense for today’s threat landscape.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW8171435304" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 28 Aug 2025 16:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-from-policy-to-cyber-interference/ta-p/1236644</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-08-28T16:00:00Z</dc:date>
    </item>
  </channel>
</rss>

