<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Shifting Security Left in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-shifting-security-left/ta-p/1240614</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69676i000F0F087394D599/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of Threat Vector,&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; speaks with two cybersecurity leaders from Palo Alto Networks:&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/sarit/" target="_blank"&gt; &lt;SPAN&gt;Sarit Tager&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Vice President of Product Management, and&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/krithivasanmecheri" target="_blank"&gt; &lt;SPAN&gt;Krithivasan Mecheri&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion explores the rise of Application Security Posture Management (ASPM), how organizations can move from reactive patching to proactive prevention, and the growing security crisis fueled by AI-generated code. With decades of combined experience in product security, cloud security, and DevSecOps, Sarit and Krithi share strategies for managing security backlogs, aligning executives and developers, and addressing the economics of technical debt. For decision-makers grappling with the balance between speed and resilience, this episode offers essential insights into securing the future of software development.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Twitter:&lt;/STRONG&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; ⁠⁠⁠⁠&lt;/A&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW6689063581" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 23 Oct 2025 17:10:43 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-10-23T17:10:43Z</dc:date>
    <item>
      <title>Threat Vector | Shifting Security Left</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-shifting-security-left/ta-p/1240614</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69676i000F0F087394D599/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of Threat Vector,&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; speaks with two cybersecurity leaders from Palo Alto Networks:&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/sarit/" target="_blank"&gt; &lt;SPAN&gt;Sarit Tager&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Vice President of Product Management, and&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/krithivasanmecheri" target="_blank"&gt; &lt;SPAN&gt;Krithivasan Mecheri&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion explores the rise of Application Security Posture Management (ASPM), how organizations can move from reactive patching to proactive prevention, and the growing security crisis fueled by AI-generated code. With decades of combined experience in product security, cloud security, and DevSecOps, Sarit and Krithi share strategies for managing security backlogs, aligning executives and developers, and addressing the economics of technical debt. For decision-makers grappling with the balance between speed and resilience, this episode offers essential insights into securing the future of software development.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Twitter:&lt;/STRONG&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; ⁠⁠⁠⁠&lt;/A&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW6689063581" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 23 Oct 2025 17:10:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-shifting-security-left/ta-p/1240614</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-10-23T17:10:43Z</dc:date>
    </item>
  </channel>
</rss>

