<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | The Good, The Bad, and The Ugly in AI in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-good-the-bad-and-the-ugly-in-ai/ta-p/1241196</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69757i26A2F00DB6436BED/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;On this episode of Threat Vector, host&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; sits down with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/andypiazza/?utm_source=chatgpt.com" target="_blank"&gt; &lt;SPAN&gt;Andy Piazza&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Senior Director of Threat Intelligence at Unit 42, to unpack the good, the bad, and the ugly of AI in security. We explore how AI is accelerating detection and response, where it’s already saving thousands of analyst hours, and why human-in-the-loop still matters. We also examine the darker side: LLMs in command-and-control, deepfake-driven fraud, model drift, and data governance blind spots. For security leaders evaluating AI, Andy shares practical questions to cut through hype, real metrics that matter, and a blueprint for building trust. This conversation is essential for decision-makers aiming to secure AI everywhere while strengthening identity controls and SOC workflows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Join the conversation on our social media channels:&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Subscribe: &lt;A href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank"&gt;https://www.paloaltonetworks.com/podcasts/threat-vector&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Website: &lt;A href="http://www.paloaltonetworks.com/" target="_blank"&gt;&amp;nbsp;http://www.paloaltonetworks.com/&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Threat Research:&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Facebook:&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;LinkedIn:&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠ &lt;/A&gt;&lt;A href="https://www.linkedin.com/company/palo-alto-networks/" target="_blank"&gt;https://www.linkedin.com/company/palo-alto-networks/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;YouTube:&lt;A href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠ &lt;/A&gt;@paloaltonetworks&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Twitter:&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &amp;nbsp;⁠⁠&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW6260019901" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 06 Nov 2025 17:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-11-06T17:00:00Z</dc:date>
    <item>
      <title>Threat Vector | The Good, The Bad, and The Ugly in AI</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-good-the-bad-and-the-ugly-in-ai/ta-p/1241196</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69757i26A2F00DB6436BED/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;On this episode of Threat Vector, host&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; sits down with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/andypiazza/?utm_source=chatgpt.com" target="_blank"&gt; &lt;SPAN&gt;Andy Piazza&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Senior Director of Threat Intelligence at Unit 42, to unpack the good, the bad, and the ugly of AI in security. We explore how AI is accelerating detection and response, where it’s already saving thousands of analyst hours, and why human-in-the-loop still matters. We also examine the darker side: LLMs in command-and-control, deepfake-driven fraud, model drift, and data governance blind spots. For security leaders evaluating AI, Andy shares practical questions to cut through hype, real metrics that matter, and a blueprint for building trust. This conversation is essential for decision-makers aiming to secure AI everywhere while strengthening identity controls and SOC workflows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Join the conversation on our social media channels:&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Subscribe: &lt;A href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank"&gt;https://www.paloaltonetworks.com/podcasts/threat-vector&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Website: &lt;A href="http://www.paloaltonetworks.com/" target="_blank"&gt;&amp;nbsp;http://www.paloaltonetworks.com/&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Threat Research:&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Facebook:&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;LinkedIn:&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠ &lt;/A&gt;&lt;A href="https://www.linkedin.com/company/palo-alto-networks/" target="_blank"&gt;https://www.linkedin.com/company/palo-alto-networks/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;YouTube:&lt;A href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw" target="_blank"&gt; &amp;nbsp;⁠⁠⁠⁠ &lt;/A&gt;@paloaltonetworks&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-level="1"&gt;
&lt;P&gt;Twitter:&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &amp;nbsp;⁠⁠&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW6260019901" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-good-the-bad-and-the-ugly-in-ai/ta-p/1241196</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-11-06T17:00:00Z</dc:date>
    </item>
  </channel>
</rss>

