DiscoverThreat Vector by Palo Alto NetworksHow Cybercriminals Leverage Disruption for Maximum Impact
How Cybercriminals Leverage Disruption for Maximum Impact

How Cybercriminals Leverage Disruption for Maximum Impact

Update: 2024-10-24
Share

Description

In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the evolving threat landscape, where cybercriminals focus on disrupting businesses and leveraging end-consumer pressure to extract higher ransoms. The conversation covers critical topics such as AI-driven attacks, ransomware trends, and the growing role of operational resilience. Wendi offers practical advice for organizations to adapt their defenses and reduce downtime, safeguarding their operations. This episode is packed with insights that help cybersecurity professionals stay ahead of modern threats.


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How Cybercriminals Leverage Disruption for Maximum Impact

How Cybercriminals Leverage Disruption for Maximum Impact

Palo Alto Networks and N2K Networks