<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Why Proactive Security Can't Wait in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-why-proactive-security-can-t-wait/ta-p/1242089</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69869iC94082945EC752E4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of &lt;/SPAN&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;SPAN&gt;, host&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Senior Director of Thought Leadership for Unit 42, speaks with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/eladkoren" target="_blank"&gt; &lt;SPAN&gt;Elad Koren&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Vice President of Product Management for Cortex Cloud at Palo Alto Networks. With the 2025 Unit 42 Incident Response Report showing that adversaries can move from initial compromise to data theft in less than five hours, Elad explains why reactive security models can no longer keep up.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;He outlines how complexity in cloud environments, rising attacker speed, and the use of AI-driven automation have reshaped the threat landscape, leaving defenders little time to respond. The conversation dives into why posture and configuration alone are not enough, how uniting vulnerability management and threat detection eliminates blind spots, and why "peacetime" and "wartime" security must finally converge.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Listeners will learn how to build trust between security and development teams, what it takes to truly shift left, and how unifying data and context enables faster and smarter decision-making. For security leaders ready to evolve from firefighting to forewarning, this episode offers a clear roadmap to proactive and resilient defense.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Twitter:&lt;/STRONG&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; ⁠⁠⁠⁠&lt;/A&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW2845960752" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 20 Nov 2025 17:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-11-20T17:00:00Z</dc:date>
    <item>
      <title>Threat Vector | Why Proactive Security Can't Wait</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-why-proactive-security-can-t-wait/ta-p/1242089</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69869iC94082945EC752E4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of &lt;/SPAN&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;SPAN&gt;, host&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Senior Director of Thought Leadership for Unit 42, speaks with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/eladkoren" target="_blank"&gt; &lt;SPAN&gt;Elad Koren&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Vice President of Product Management for Cortex Cloud at Palo Alto Networks. With the 2025 Unit 42 Incident Response Report showing that adversaries can move from initial compromise to data theft in less than five hours, Elad explains why reactive security models can no longer keep up.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;He outlines how complexity in cloud environments, rising attacker speed, and the use of AI-driven automation have reshaped the threat landscape, leaving defenders little time to respond. The conversation dives into why posture and configuration alone are not enough, how uniting vulnerability management and threat detection eliminates blind spots, and why "peacetime" and "wartime" security must finally converge.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Listeners will learn how to build trust between security and development teams, what it takes to truly shift left, and how unifying data and context enables faster and smarter decision-making. For security leaders ready to evolve from firefighting to forewarning, this episode offers a clear roadmap to proactive and resilient defense.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Twitter:&lt;/STRONG&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; ⁠⁠⁠⁠&lt;/A&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank"&gt;https://twitter.com/PaloAltoNtwks&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW2845960752" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-why-proactive-security-can-t-wait/ta-p/1242089</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-11-20T17:00:00Z</dc:date>
    </item>
  </channel>
</rss>

