<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article How to Defend Against Adversarial AI and Deepfakes in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/how-to-defend-against-adversarial-ai-and-deepfakes/ta-p/585361</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat-Vector_How-to-Defend-Against-Adversarial-AI-Deepfake_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59356i1DCAA4CF50E29DE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat-Vector_How-to-Defend-Against-Adversarial-AI-Deepfake_palo-alto-networks.jpg" alt="Threat-Vector_How-to-Defend-Against-Adversarial-AI-Deepfake_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The emerging threats of adversarial AI and deepfakes in the cybersecurity landscape necessitate being fully prepared. The latest episode of &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;/FONT&gt; uncovers the hidden risks and defensive strategies against these advanced cyber threats. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, Billy Hewlett, &lt;EM&gt;Senior Director of AI Research&lt;/EM&gt; at Palo Alto Networks, and Tony Huynh, a &lt;EM&gt;specialized Security Engineer in AI and deepfakes&lt;/EM&gt;, for the critical next part of our series "AI’s Impact in Cybersecurity.". &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Learn how organizations can equip themselves with knowledge and tools to bolster their defenses in an AI-driven world. Dive into the discussion to explore the blend of technology and human oversight needed to protect against sophisticated cyber attacks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42⁠" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/⁠" target="_blank" rel="noopener"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/⁠" target="_blank" rel="noopener"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/⁠" target="_blank" rel="noopener"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks⁠" target="_blank" rel="noopener"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm/?e=CYBW5942758829" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 30 Apr 2024 15:29:45 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2024-04-30T15:29:45Z</dc:date>
    <item>
      <title>How to Defend Against Adversarial AI and Deepfakes</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/how-to-defend-against-adversarial-ai-and-deepfakes/ta-p/585361</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The emerging threats of adversarial AI and deepfakes in the cybersecurity landscape necessitate being fully prepared. The latest episode of Threat Vector uncovers the hidden risks and defensive strategies against these advanced cyber threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat-Vector_How-to-Defend-Against-Adversarial-AI-Deepfake_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59360iBFE6DFC0E314078E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat-Vector_How-to-Defend-Against-Adversarial-AI-Deepfake_palo-alto-networks.jpg" alt="Threat-Vector_How-to-Defend-Against-Adversarial-AI-Deepfake_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 15:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/how-to-defend-against-adversarial-ai-and-deepfakes/ta-p/585361</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2024-04-30T15:29:45Z</dc:date>
    </item>
  </channel>
</rss>

