<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Inside AI Runtime Defense in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-inside-ai-runtime-defense/ta-p/1237577</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69168i7CE09610AE8BB08F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of &lt;/SPAN&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;SPAN&gt;, host&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;STRONG&gt;David Moulton&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;, Director of Thought Leadership for Unit 42, speaks with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/spencer-thellmann-444b80113/" target="_blank"&gt; &lt;STRONG&gt;Spencer Thellmann&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;, Principal Product Manager at Palo Alto Networks. Spencer brings a background in AI policy from the University of Cambridge and now leads development of real-time AI runtime security solutions. Together, they explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Topics include prompt injection, model scanning, red teaming, agent posture control, and how AI changes cloud security architecture. Listeners will take away key mental models and practical guidance for building resilient, trustworthy AI systems.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Explore More on AI Security and Strategy&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/ebooks/defending-in-the-ai-era" target="_blank"&gt;&lt;SPAN&gt;Defending in the AI Era&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: Learn how to protect your enterprise from the new threat landscape shaped by AI.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine" target="_blank"&gt;&lt;SPAN&gt;Cybersecurity Perspectives Magazine&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: Stay ahead of the trends reshaping enterprise defense, including AI, cloud, and workforce security.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier" target="_blank"&gt;&lt;SPAN&gt;Unit 42 Threat Frontier&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: Explore cutting-edge threat intelligence and research from Unit 42.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Want more Threat Vector?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-ai-in-the-enterprise" target="_blank"&gt;&lt;I&gt;&lt;SPAN&gt;Securing AI in the Enterprise&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; with Tanya Shastri and Navneet Singh&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; explores how to architect AI securely from the start.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-enhancing-ethical-hacking-with-ai?utm_source=chatgpt.com" target="_blank"&gt;&lt;I&gt;&lt;SPAN&gt;Enhancing Ethical Hacking with AI&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt; with Ryan Barger dives into offensive applications of AI in red teaming.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Twitter:&lt;/STRONG&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; ⁠⁠⁠⁠&lt;/A&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW1571041526" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 10 Sep 2025 16:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-09-10T16:00:00Z</dc:date>
    <item>
      <title>Threat Vector | Inside AI Runtime Defense</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-inside-ai-runtime-defense/ta-p/1237577</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69168i7CE09610AE8BB08F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of &lt;/SPAN&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;SPAN&gt;, host&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;STRONG&gt;David Moulton&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;, Director of Thought Leadership for Unit 42, speaks with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/spencer-thellmann-444b80113/" target="_blank"&gt; &lt;STRONG&gt;Spencer Thellmann&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;, Principal Product Manager at Palo Alto Networks. Spencer brings a background in AI policy from the University of Cambridge and now leads development of real-time AI runtime security solutions. Together, they explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Topics include prompt injection, model scanning, red teaming, agent posture control, and how AI changes cloud security architecture. Listeners will take away key mental models and practical guidance for building resilient, trustworthy AI systems.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Explore More on AI Security and Strategy&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/ebooks/defending-in-the-ai-era" target="_blank"&gt;&lt;SPAN&gt;Defending in the AI Era&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: Learn how to protect your enterprise from the new threat landscape shaped by AI.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine" target="_blank"&gt;&lt;SPAN&gt;Cybersecurity Perspectives Magazine&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: Stay ahead of the trends reshaping enterprise defense, including AI, cloud, and workforce security.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier" target="_blank"&gt;&lt;SPAN&gt;Unit 42 Threat Frontier&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: Explore cutting-edge threat intelligence and research from Unit 42.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Want more Threat Vector?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-ai-in-the-enterprise" target="_blank"&gt;&lt;I&gt;&lt;SPAN&gt;Securing AI in the Enterprise&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; with Tanya Shastri and Navneet Singh&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; explores how to architect AI securely from the start.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-enhancing-ethical-hacking-with-ai?utm_source=chatgpt.com" target="_blank"&gt;&lt;I&gt;&lt;SPAN&gt;Enhancing Ethical Hacking with AI&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt; with Ryan Barger dives into offensive applications of AI in red teaming.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Twitter:&lt;/STRONG&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; ⁠⁠⁠⁠&lt;/A&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW1571041526" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 10 Sep 2025 16:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-inside-ai-runtime-defense/ta-p/1237577</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-09-10T16:00:00Z</dc:date>
    </item>
  </channel>
</rss>

