[![Background](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/pan-unit42.svg)](https://www.paloaltonetworks.com/?ts=markdown "Palo Alto") Related Resources Menu RESOURCES * ![Research](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-sec-ebook/sticky_nav/images/thumbnail-unit-42-esg-ir-strategies-spotlight.jpg) [Research](https://start.paloaltonetworks.com/esg-operationalizing-incident-response-readiness-strategies.html "Webinar") * ![Whitepaper](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-sec-ebook/sticky_nav/images/whitepaper.png) [Whitepaper](https://www.paloaltonetworks.com/resources/whitepapers/hardenstance-preparing-for-new-incident-reporting-requirements?ts=markdown "Whitepaper") * ![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-sec-ebook/sticky_nav/images/podcast.png) [Podcast](https://www.youtube.com/watch?v=w2_G4JNtknk&list=PLaKGTLgARHpO1zjPmTlWuYsYEKR0SKUPa&index=4 "Podcast") * ![Incident response report](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-sec-ebook/sticky_nav/images/incident-response-report.png) [Incident response report 2024](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown "Incident response report 2022") * ![Unit 42 attack surface threat report](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/unit42-threat-frontier.jpg) [Unit 42 Threat Frontier report](https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier?ts=markdown "Unit 42 Threat Frontier report") * ![Unit 42 Ransomware and extortion report](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-sec-ebook/sticky_nav/images/unit-42-ransomware-and-extortion-report.png) [Unit 42 Ransomware and extortion report](https://start.paloaltonetworks.com/2023-unit42-ransomware-extortion-report "Unit 42 Ransomware and extortion report") Cyber Defense in the AI Era: Four Actionable Takeaways from the Unit 42 Threat Frontier Report === [Start now](#accordion-list) ## GenAI is unlocking new opportunities for everyone - including attackers Organizations are integrating generative AI (GenAI) into their business processes and building internal GenAI tools. And attackers are working to undermine and exploit these mechanisms. Safely adopting effective, beneficial AI takes understanding how this powerful technology can both propel your organization forward and expose it to new risks. The Unit 42 Threat Frontier Report gives you an in-depth look at AI as a concept and what it offers to organizations and attackers alike. Here are the 4 key takeaways to help you achieve the full potential of AI and optimize protection against dynamic AI-powered threats. [Start now](#accordion-list) [1. Are conventional cybersecurity tactics outdated?](#timeline-1) [2. How quickly is AI growing?](#timeline-2) [3. Is shadow AI a serious problem?](#timeline-3) [4. What can I do to secure AI for my organization?](#timeline-4) ### 1. Conventional cybersecurity tactics are still relevant Foundational concepts like network segmentation, Zero Trust network architecture and identity and endpoint protection remain effective in defending against even novel threats. Don't underestimate the level of defense these tactics provide. Instead, continue your efforts toward Zero Trust architecture. Patch your systems more quickly and more comprehensively. And read the [Recommendations for Defenders](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report#Defenders) in our [incident response reporting](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report) to learn what security measures are most effective versus today's attackers. ![radar image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/radar-grey.svg) ### 2. AI adoption is happening faster than any previous enterprise technology. A lot faster. Attackers are among the users driving this rapid rate of adoption. They're already hard at work using GenAI to make their attacks faster, larger scale, more efficient and highly sophisticated. So, while conventional cybersecurity tactics are still vital for your defenses, [adding AI-specific defenses](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment#service-features) is mission-critical preparation for the future. Why? Because... Existing applications are already becoming AI-enabled with natural language processing. And new AI-first apps will be built with AI capabilities integrated from the start, not added on later. [Unit 42 research](https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier) shows that attackers use GenAI to exploit software and API vulnerabilities, write malware and create elaborate phishing campaigns. ### Time to Reach a Billion Users The internet 00 years Mobile technology 00 years Gen AI The next 00 years ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/orbits-mobile.png) The internet 00 years Mobile technology 00 years Gen AI The next 00 years ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/orbits-mobile.png) ### 3. Shadow AI is probably already in your workplace Your employees are almost certainly using AI tools. Raise your hand if you're one of them. (Go on. No one's looking.) Now, the questions leaders need to ask are: "How can I be aware of the tools that are being used and what controls do I have in place?" Here's what we recommend: ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/logo-create.svg) ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/logo-socialize.svg) ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit42-scroll/logo-publish.svg) Create, socialize and publish rules of engagement that your organization must follow for using AI tools. Then customize those rules to the context of your existing data security requirements. Like SaaS and IaaS cloud transformation, you should expect resistance on some familiar aspects: * How do I get an exception to the policy? * We already pushed to production. * What is the process for approval? * This is going to slow down innovation (or revenue, or raise costs, or, or, or...) ### 4. What can I do to secure AI for my organization? Let's pretend you asked an AI model trained by Unit 42 for some recommendations about securing AI. Here's what that conversation might look like. Here are ways to adopt and use AI safely and effectively... Track and monitor all AI usage in real-time Secure the AI app dev lifecycle Protect ALL sensitive data What else? * Create and manage [granular access control](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment#service-features) * [Inventory](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment) your AI-related assets and analyze risk * [Automate](https://www.paloaltonetworks.com/cortex/cortex-xsiam) for lightning-fast threat response Great. So, where do I start? ## Want to learn more? Check out the Unit 42 Threat Frontier Report to learn how to leverage the benefits of GenAI while mitigating risks and fortifying your organization against the current and future threats of the AI era. [Read the full report](https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier?ts=markdown) {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language