I don’t always DJ, but when I do…
My first DJ set (ever) was a combo album listening party turned 6-hour mixed set with 2 VJs, a 12x17 foot LED wall, audio-reactive LED strips and video effects running between 4 networked computers sending tempo, notes and audio from my machine, to the VJs, then sent to our 4th computer running the interactive LED wall with touch-reactive LiDAR effects. This was the most complicated and extensive collection of tech magic I’ve ever assembled. Thank you @lake_heckaman for building this with me and being there to make it all look easy. Rrrreally couldn’t have done it without you!
Thanks @prismatic.visuals and @jasonbeyers & thanks @sethescoville for help on the LEDs. Cheers to all my friends @ Palo Alto Networks @threat_vector_host@animo.et.fide@emilyrodenhuis and as always @touchdesigner
Security's most dangerous gap?
According to Elad Koren @paloaltontwks it's orchestration literacy.
I got a chance to ask him one quick off schedule question as we wrapped up recording for Threat Vector. In a world of agents, understanding how to orchestrate will be a massively valuable skill.
Your VPN Won't Save You on Public WiFi
Cybersecurity expert Arjun Bhatnagar breaks down what really happens when you connect to public WiFi. Hint: the password on the network doesn't protect you as much as you think. From Threat Vector, the cybersecurity podcast by Palo Alto Networks.
Listen to the whole episode now at /resources/podcasts/threat-vector-a-hackers-insights-on-your-privacy
Thinking 'We Don't Hire Remote' Keeps You Safe? Think Again.
The most common assumption organizations make about the DPRK IT worker threat is also the most dangerous one. Evan Gordenker, Director of AI Security and DPRK Ops at Unit 42, explains exactly how operatives get into hybrid and in-person roles.
Full episode at /resources/podcasts/threat-vector-the-billion-dollar-hiring-scam-funding-north-korea
#DPRK #InsiderThreat #CyberSecurity
North Korean Operatives Are Changing Their Accents in Real Time
Deepfake video was just the beginning. Evan Gordenker, Director of AI Security and DPRK Ops at Unit 42, explains how North Korean operatives are now using AI to modify their accents live during interviews — and why this capability isn't going away.
Full episode at /podcasts/threat-vector
#Deepfake #DPRK #CyberSecurity
If your organization holds sensitive data that must stay protected for 20 years or more, this is the moment to pay attention. The biggest quantum risk isn’t tomorrow’s computers. It’s the long shelf life of the information you’re protecting today. If that data can’t fall into the wrong hands, the threat is real right now.
Full episode with Richu Channakeshava on Threat Vector. /resources/podcasts/threat-vector-is-the-quantum-threat-closer-than-you-think
Quantum computers are not the future version of your laptop. They’re built for one thing. Ultra-complex problems that classical supercomputers would need millions or billions of years to solve. That’s where quantum shines, and why it matters for security. A completely different class of machine, powered by quantum mechanics, built for a tiny slice of computations that change everything.
Full episode with Richu Channakeshava on Threat Vector. /resources/podcasts/threat-vector-is-the-quantum-threat-closer-than-you-think
In this Threat Vector clip, Elad Koren explains a growing problem. Businesses are racing ahead with cloud, DevOps, and modern architectures, but security teams are still tied to legacy practices and tools. The result is a widening gap. The organization accelerates. Security tries to keep up. And the mismatch slows real progress.
Want more? Listen to David and Elad dig into how security teams can modernize, close the gap, and move at the speed of the business on Threat Vector.
In this Threat Vector clip, Richu Channakeshava explains why cryptographic migration is slow, painful, and measured in decades — not quarters. RSA took roughly 25 years to stabilize. Post-quantum algorithms will follow a similar arc. If your data needs to stay secure for the next 5 to 20 years, you can’t wait until quantum capability arrives. Global research signals real movement toward quantum-capable computation, and the safe move is to secure your most sensitive data now and phase in broader migration over time.
Want the full conversation?
Listen to the entire episode
/resources/podcasts/threat-vector-is-the-quantum-threat-closer-than-you-think
For more insights, listen to David and Richu talk through timelines, vulnerabilities, and what organizations should be doing in the next two to five years on Threat Vector.