[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) Podcast # Human in the Loop for AI Security Sep 18, 2025 ![podcast default icon](https://megaphone.imgix.net/podcasts/7bea6056-a85d-11ef-a34c-93d631656254/image/350ea4ae052afc0841fdb507b3113796.png) ![podcast default icon](https://megaphone.imgix.net/podcasts/7bea6056-a85d-11ef-a34c-93d631656254/image/350ea4ae052afc0841fdb507b3113796.png) Threat Vector | Human in the Loop for AI Security Seek Slider 15s 30s volume-slider *00:00* *00:00* *** ** * ** *** **Discover how to secure generative AI beyond the model itself** in this episode of Threat Vector. Host David Moulton welcomes **Brett Kinsella, SVP of FueliX at TELUS International** and founder of Voicebot.ai and Synthedia. Brett brings deep expertise in enterprise AI and synthetic media. He explores the hidden dangers of shadow AI---where employees use consumer AI tools with sensitive data---and explains the risks of data leakage, vectorized document stores, and hallucination. Brett recommends system-level testing, human-in-the-loop governance, guardrails, and scalable frameworks to manage AI safely. Learn why it's not enough to test only the model, and how a holistic approach helps professionals stay resilient in a changing threat landscape. *** ** * ** *** *Protect yourself from the evolving threat landscape -- [more episodes of Threat Vector are a click away](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown)* *** ** * ** *** **Transcript** \[ Music \] **David Moulton**: Welcome to Threat Vector, the Palo Alto Network's podcast where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, Senior Director of Thought Leadership for Unit 42. **Bret Kinsella**: You don't need to test the model. You need to test the system. Because it's not just the model. It's not just the provisioning cloud provider. It's all those other things you connect to it. And the more things you connect to it, the more problems you can have just with scalability, production doesn't work consistently, you know, aware of the bugs exist. But you also introduce a lot more places where you're going to have risk from security or safety standpoint. \[ Music \] **David Moulton**: Today I'm joined by Bret Kinsella. He's the General Manager of Fuel iX at TELUS Digital. Bret has led marketing strategy and product growth at scale across both startups and major enterprises. He's also a widely published author and speaker, with work featured in Harvard Business Review, USA Today, and Wired. And he's hosted over 400 podcasts on AI innovation. Today, we're going to talk about securing generative AI systems, the real risks behind shadow AI, and what leaders need to know about hallucinations, data leakage, and testing the full system, not just the model. Bret, welcome to Threat Vector. I'm really excited to have you here today. **Bret Kinsella**: David, I'm excited to be here. I've been listening to the show for a while. I caught a couple of your recent ones. In fact, one of my friends was on the show who I've known for many years. And like, it's an honor to be sitting here across from you. **David Moulton**: Let's open up and talk about your journey a little bit. How did you end up leading Fuel iX and then becoming this leading voice in AI and synthetic media? **Bret Kinsella**: There was no grand design. I've been in new technology for a long time. And if you're in new technology and develop a passion for it, you wind up working in a number of different technologies and across a number of different industries. Because new technologies typically aren't limited to industries. So, you know, I worked in consulting. I wound up in software companies. I transformed a services business into a software business over the years. Worked with a lot of software companies, particularly SAS back in the day. But one of them, in late 2012, launched a very innovative AI product, and that was my first introduction. And then I wound up working with a number of startups in that space and then realized that I wasn't -- I didn't have the type of information I needed in order to make good decisions about what's going on in the market, how things were being adopted, what technology mattered. And so I started doing some work along that, wrote a couple articles, and then just by accident started a research business and publication for several years that I did as well. And then I got to know a lot of people in the AI space, obviously. In fact, I've hosted about 400 podcasts myself, like just interviewing AI innovators over the last decade. And not too long ago, I guess a year and a half ago, the President of TELUS Digital called me up and said, "Hey, I've got something that I want you to take a look at. We've developed some really interesting technology, but we're using it internally. Our customers are asking us if they could use it. So you've done a lot of software, Bret, you've done a lot of AI. Could you come in and take a look at it?" And that's basically how it started. **David Moulton**: Before we kick off, I want to come back to the conversation that we started off mic. We were talking about ultra marathons is something that you enjoy doing. And I'm curious, can you talk to me about that first spark that got you into ultra marathons? **Bret Kinsella**: Well, it actually was quite a bit before I actually even thought about signing up for one, I remember reading an article about Leadville 100-miler. And that's in the mountains. The whole race is above 10,000 feet. There's a lot of vertical gain and things like that. And I said, that looks amazing. That sounds like really interesting. And then I didn't think of it again. Seemed like just something that sounded cool, but other people do it. And then when I was living in Massachusetts, I had some friends there who ran a lot, so I started running a lot. And, you know, did a half marathon, did a couple marathons. And then at some point was like, oh, it'd be really interesting to do an ultra marathon. And there just happened to be one that the North Face was sponsoring, first year, down the street from me, like, five miles from where I lived. And I was like, oh, I'm going to sign up for that. But a hurricane came in, so they canceled it. Which usually they don't cancel ultras. Me and this other guy were the only two people that showed up. The weather was terrible, but it was super fun. And we wound up doing not the full 50 miles, but we did probably 25 that day. But it was a great story. But then he had done dozens of ultra marathons. And then I just started running with him every Saturday for years. And then once you're in it, you're just like, oh, I do this next one. Because the one was canceled, I signed up for a 40-miler the next month, because I was already trained, that type of thing. It's like, might as well get one in. And then it's just one thing leads to another. **David Moulton**: Bret, do you see any parallels between running an ultra marathon or ultra running in general and cybersecurity? **Bret Kinsella**: I'm not sure that -- like, I bet a lot of people who work in cybersecurity would relate to the fact that their life is about pain and problem solving and an occasional sense of victory and relying on others and problem solving again and dealing with new conditions every day. I mean, I think there's a lot of parallels. **David Moulton**: You know, Bret, enterprises are increasingly adopting AI. I don't think I've had a conversation in the last weeks or months that doesn't land on, how are you using AI to go faster or unlock a new capability, and/or, how are attackers using AI to speed up their attacks. I'm curious if you can talk about the hidden risks that are introduced when employees use consumer AI tools for work tasks without good IT oversight. **Bret Kinsella**: So I think when we think about shadow AI, it is the same type of thing. And so if you think about like -- you think over half of people who are in large companies are using some sort of AI assistant, generative AI. About two-thirds of those also admit that they've put sensitive company information into the chatbot. And so like what does that mean? This is not going to surprise anybody that's listening to this, I don't think. What are they doing? They're putting customer data in there. Well, why are they doing that? Because they want to do their job better. It's not because they want to like disseminate customer data. They want to do some analysis on it, and the AI tools are just better than the tools that they've had in the past. They're putting company proprietary information. They're putting, like your code base for some sort of proprietary firmware that you have that runs all of your machines and your manufacturing plants or something like that, to try to find a bug. They're putting company financial information in there, which could be before it's announced to the market. And, you know, where is that going? You know, I think people think about this and say, okay, so the data, like it's going, so people could intercept the data. But maybe it's not encrypted. Maybe it's stored, all these other things. Could be used to train the model. These are things that every IT organization, every CISO, has to be aware of. And the fact is, these tools are so much better than what we've had in the past. People are going to use them. They might even use them if you provide something. If you provide something to them -- this is where you go back to this other thing -- if it's not as good as what they're used to using at home, they might just use it. And they might just use it anyway, just even if it isn't as good because it's just a habit and you have to break that. So you can do things like policy. But, you know, you think you can't really hold back the tide. You can't just whitelist and blacklist certain websites and just hope that's going to solve all your problems. Because it doesn't, we've seen it. People just use what they have, because most people want to do their jobs better, or worry about losing their job, or want to get home sooner. **David Moulton**: Are there specific security vulnerabilities that you think leaders at these organizations should be focused on first, and/or specific behaviors that they should try to encourage their staffs or their organization to adopt? **Bret Kinsella**: Well, I think in general leaders should be encouraging their organization, not just the people but their organization, to adopt AI tools. Because they are really so much better than the things that we've had. Everybody's recognized this. You don't have to spend too much time with these tools to realize that they fill a gap, often a gap that people didn't know they had, but certainly a gap. So that's the first thing, they should be pushing the organization to do it. They should set up some policy about what's okay to do and what's not okay to do. But then they have to provide some tools, because people are going to start using things anyway. Now, within those tools, I think the things that they would be most concerned about is, first of all, data leakage, like data loss protection, we all know about that. It's just a new, very broad funnel to get things out there. And it's not just the chats, it's not just stuff that they copy in there or they write about or anything like that. Many people have heard the term "RAG" (retrieval augmented generation). It's a vector database. Like if you take large data stores -- let's say you've got 50, 500, 5,000 documents, it's very hard to find information in there. Traditional search, semantic search, gets you part of the way there. What if you have to concatenate things from several different parts? Like you become an information archeologist. That's what search as we know it is. It tells you where to find something, and then good luck. And then you put it all together, right? And the AI tools are really good at this. They just like will find things that are similar in different parts of documents, different documents, all these things, and put it all together. Give you a nice synthesis. It just takes seconds. It's better than things you would normally even be able to do. And guess what just happened? You just uploaded and vectorized, you know, 5,000 of your documents, or 50 of your documents, or your customer documents, or your contract documents, right? Your IP research, all those things, and then those are potentially available to anybody that can access that database -- the vendor that does the vectorization, the model maker that does the embedding model, the model maker that you use to do the retrieval, I mean, there's just all these different points. So those are all the things that I think you want to think about. And if you just recognize the first principle is that people are going to use these anyway, try to give them something that you at least have some control over, some governance that you can apply to. **David Moulton**: Yeah. A couple months ago, I was at south by \[phonetic\] and the researchers out of Carnegie Mellon were presenting. And I realized that the data leakage issue is a huge concern. They were actually talking about the data return from the LLMs having a 40 to 70% of the time hallucination. Which is such great branding for outright lying or inaccurate, you know, made-up new things. And I thought, what a wild thing to go into this clearly better tool but not have the expertise in the topic and it returns with confidence something that has, let's say, on the low end, a 40% of the time that something's inaccurate, 70% of the time it's inaccurate, either way, that's a lot of running down and trying to verify that information. And, you know, do we have the discipline to do that? And then that becomes part of the lore, part of the conversation, part of the fact set of an organization. So while you're slipping data out through the system, new and fantastical fantasies are coming in at an incredible rate. And it's one of those areas where I'm like, I don't know if that's a security vulnerability in the traditional sense, but it's certainly one of those areas of massive concern. Maybe it's, you know, brand and reputation issues when you go out to the world and you say very confidently, you know, up is down, and everyone scratches their head and goes, nope. But you didn't know better. You know, you had this confident tool that took your data out for you, and gave you new things that don't make any sense. **Bret Kinsella**: Yeah, human error. It's hard to get rid of human error. It still exists. I would say there's a interesting study. I think it was COHERE that did it. And one of the things they were thinking about -- they're one of the big model makers, if people aren't familiar with them. But one of the things that they were looking at was, what makes a user like a response? And this was, I think this was done probably close to a year ago, nine months ago now, so things change. So but at the time, at least, this was true. People like longer answers. So that was one of the things that increased the perception of the user in terms of the answer. And that makes a lot of sense. Because when you get search, what do you get? You get links or even the snippet boxes that we used to have. It's like, okay. It's like, all the sudden, it's like, wow, you're giving me a lot of things. This is like, much more robust. I like that. The other big determinant, the only other thing that really made a big difference was the confidence or the decisiveness in which the information was returned. And even when the user knew the information was wrong or was told the information was wrong, they still liked the decisive answers more \[laughter\]. And I kind of understand that. Like that's what people -- people want that, they want certainty in their world. But that's what they liked, so you've got to be careful. **David Moulton**: Yeah. I would go one step further. It seems like lately, there's a bit of flattery that has shown up in the pattern of, you know, oh, Bret, that is a brilliant idea. You caught something, you sharpshooter. And as a former designer, I'm looking at a couple of those things of, you know, longer answers, a level of confidence that isn't warranted, flattery. And I'm going, you know, we used to call that an "anti-pattern," and yet it seems to be pervasive as these, you know, these tools try to figure out where they are in your stack and how to get more users. And you know, you don't want to run somebody off with no flattery, lack of confidence, and a short answer, if, in fact, your next growth model depends on those things. And it's a real weird push and pull. \[ Music \] Let's shift gears to AI chat security vulnerabilities. The -- what emerging vulnerability patterns are you seeing and AI chat implementations that security teams seem to be overlooking? **Bret Kinsella**: When you think about layered defense, you have your model makers, you have maybe the provider, the cloud provider or somebody else. They all have different types of layers of defense. Your guardrails would be another layer of defense. Your prompt engineering would be a layer of defense. But the question is like, how do you know where your problems are? And I think this is the place that's often overlooked, and that's, how do you identify the vulnerabilities, and how do you do that at scale? Today, it's a needle in the haystack problem. You've got a few, a very small number of skilled red teamers, who have some tools that are basically new and somewhat immature, I think in a lot of ways, some more mature than others, and they're just trying to find the problems. So I think that the prevention side is actually much harder right now. Intervention side, I'd say, with guardrails, is okay, needs to be better. But the prevention side, it has been a gap. And that's something that I've personally and I've got a team that's worked a lot on that problem. Because we were doing red teaming, and it's like, oh, this takes too long to get through all these requirements. And then people would want us to do blue teaming. We're like, well, where do we start? Well, where do you start? You start with where your vulnerabilities are. So how do I figure out my vulnerabilities faster, right? And so that's -- when I think about the different patterns today -- relying on third parties, then to guard rails, maybe a little bit of prompt engineering, and then sort of best efforts on the vulnerability detection. **David Moulton**: What role should human monitoring play versus automated detection in identifying malicious prompt patterns? **Bret Kinsella**: This is going to be really important. I think, like, AI, as we've seen across the years, is actually better than humans at finding a lot of things, particularly pattern recognition, needle in the haystack stuff, where you have just a lot of information. But we see this, I've got research teams, and the things that we're doing is we are working with, you know, what you would have called "classifiers," but using LLMs now for them. "Judges," we would call them in this case. And they're very good. But all these judging systems that you're using are probabilistic. So what you're going to do is you're going to have certain things you know it's going to be important, and you're going to intervene. If it's a guardrail, then you might be more aggressive at intervening, because, like, certain risk you want to get rid of. But you're still going to have all these things which are sort of mid level, low level probability that are going to get through. You might even get some high probability things you need to look at, and then you can start to put those things together. And I think this is one of the key things, when we think about it from a human standpoint. One is you have to like use the technology for what it's good at, which is identifying things, giving you probabilities, clustering, you know, for different things that are alike. But then you still really benefit from a human taking a look at some of that. And this is one of the things I think that gets overlooked. A lot of people just want the AI to do the work for them, or they want a human to do the work for them. Well, the human can't look at enough data to be consistent across humans, to see enough to like really understand all the patterns, signal and noise. We know that for a fact. And the AI does miss things as well, because it also tends to look for certain types of things that, you know, may or may not be something you want to do. That's why we do reinforcement learning with human feedback, right? So we're really big on this idea of AI elevating human capability and ingenuity. That's where we start with. All the things that we build, the things we build for internal users, the thing we build for customers. And you know, that's the first thing. We think that there is a lot of low hanging fruit about just helping humans be better, more consistent, have more reach. Adding automation on top of that then can take care of some things so they don't have to take care of them. But a lot of that comes back, and you want the human in their loop either to verify it or to look at it and review it. This is, I think it's an important question. I think you still need to look at logs. Anybody who's used AI, who's used other systems like -- come on, we've got a lot of cybersecurity people here. If you don't look at the logs, you miss stuff. **David Moulton**: So it sounds like your philosophy is use the AI to make humans even more human, and to get the unique capabilities that ingenuity, I think, is the word that you mentioned out of humans. Because they're not bogged down with the hunt. They're not bogged down with the fact that they have not seen the data, or they've seen too much. And that's that's really interesting. Because I think on the flip side, humans are really good at pattern matching. And eventually adversaries will figure out, here's the patterns that actually get past the AI, no matter how good it is, because it's new and novel. And that will be that moment where we do need to have those skills and those capabilities, and that time to go in and look and say, like, why did this get through and figure out, how do we adjust? How do we continue to strengthen our defense? **Bret Kinsella**: Yeah, that's a really good point, that systems are much more consistent than people. Therefore it's easier to identify patterns that systems will or will not identify, that then you can try to use that to the systems -- to the disadvantage of whatever you're trying to attack. Whereas humans are much harder to predict what they're going to do. And that's, I think, as you're indicating, that might be a weakness, but it's really a strength very often. **David Moulton**: So let's shift gears a little bit and talk about cross-platform AI risks. What governance frameworks should be established for managing data flow between different AI systems? **Bret Kinsella**: This is actually an important thing for people to understand, where we are now with generative AI in the enterprise, and where we are rapidly heading. So today, most of the use of generative AI is that open text box. It's doing transformation steps, like rewriting that email, or it's doing a summarization of a document, or it's doing something like search, right? Okay, great. In most of those cases, you are really limiting access, or you're providing access to like public sources, or something like that. What we're starting to see with like the emergence of new protocols, like Model Context Protocol (MCP) -- if people are familiar with that -- some of the direct integrations as well. The next thing that's coming is people are starting to experiment a lot with agents. And when you look at like model xcontext protocol, you look at agents. Very often what they're trying to do is they're trying to figure out, based on what you've asked for, what is available that they could provide back to you to meet your need. And with the agents, you're going to not just have like a user doing one or two tool calls at a time. You might have them calling two or three agents which are calling other agents which are calling multiple systems simultaneously. So all those we want standardized security protocols, standardized communication protocols, all of these things that we've seen some movement on over the last six months. But what you've just done is you've created a lot more risk because you just have touch points, a lot more systems. Any one of which could fail. And this is something that I think we should leave everybody with, or I want everyone to leave this with, is that you don't need to test the model. You can test the model. You need to test the system. Because it's not just the model. It's not just the provisioning, cloud provider. It's all those other things you connect to it. And the more things you connect to it, the more problems you can have just with scalability, production, doesn't work consistently, where the bugs exist. But you also introduce a lot more places where you're going to have risk from security or safety standpoint. **David Moulton**: Based on the experience that you have at TELUS Digital and your work with Fuel iX, what emerging AI security threats should organizations be preparing for now that aren't really widely discussed? **Bret Kinsella**: You know, first, I think that things that people deal with today, I think you really have to think about information that's coming out of your system that is in violation of how you want your system to operate. So a violation of code of conduct, that's sort of the first thing. The next thing that's going to be -- people are going to be dealing with more and more is going to be some of this data poisoning things. Where there's something going on in the data store, it gets put in there somehow, and it's causing problems for you down down the road. In parallel with that but requires a little more sophistication, they should be looking at things which you think of as like model exfiltration. Sort of trying to understand how the model works, so that they can develop more and better attacks. When I move on from there, I say, the next things that I think are the biggest concerns is operational systems. Anytime you're hitting them just directly, or you're allowing agents to have access to those. And then you have to differentiate between sort of human in the loop, human on the loop, or human out of the loop. But those are the ones that I think are going to cause the most consternation, rightfully so, but probably the most enthusiasm. Because people like the idea, and I like the idea, of having bots out there just solving problems that I never even have to know about, right? Because they're designed to do that, and they have some autonomy and authority to do those types of things. But at the same time, every one of those, it's like you could create a scenario where you just basically have a bunch of super users that just happen to be bots. And that means you've got to test your system, which includes the agents, but you should be testing your agents independently as well. And there aren't really -- I mean, you can use some existing techniques, but there aren't really tools for that right now. So those are going to have to going to have to be developed as well. **David Moulton**: And so when you say, "test those agents independently," is that a outside party test them for you? Or is that? **Bret Kinsella**: It could be, it could be. Well, I think first, like your developers or your IT team that does the implementation, whatever, they should be testing. So when you think about an agent-based system, I think you should do unit testing on the agents as well as system testing in concert with the agents. So both of those things. Because it might pass unit testing, but you might have a problem in the system testing and vice versa, right? So I think we all know that. It could be that you do want a third party to do validation, depending on what you're doing. And we do that at TELUS. We have third party audits as well. We do -- so if you look at what TELUS has done and like, TELUS has been, I guess, legitimately, a pioneer in this, has won a number of awards, but developed a purple teaming approach. Where you've got end users, red teamers, and blue teamers all working together, kind of a purple team approach, running through a standard set of protocols, you know, which can reach into the hundreds each, and then reviewing all the outputs and coming together. That's like the human policy standpoint. And that's the type of thing that is really important. Because mostly testers who are developers miss a lot of the outliers because they're not users. They don't think about how the users actually would come into a problem with bugs. But this is the same thing with, you know, it's the lack of imagination in terms of how a malicious actor might go. So I think that there is a process for policy, for people, for developers, for third parties, and then for automated test suites that would do both unit testing and system testing through different configurations. **David Moulton**: You know, Bret, one of the things I've said for years is that our technology reflects our humanity, and we build things in a way that reflects our culture norms, our expectations, and how you're going to use whatever that technology is. And then when people don't use it in the way that we expect, I think that's where we run into security issues, right? Like we expected that you would never do this. And then people do and, you know, whatever -- whatever the technique is, and, or whatever the social engineering effect is. And then we're left with, like, okay, how do we clean that up? And when you talked about this idea of, like, a user using something in a way that the tester didn't expect, you know, I just had shuttered and went back to my design days, where I was like, oh yes, I put this together in a way that is so obvious. And then we'd watch a user use it, and I'd go, oh no, we are so off. Like we had these assumptions, we're off, we've got to fix that. All right, most important thing for a listener to remember from today's conversation? **Bret Kinsella**: A couple things I would say. If you're thinking about AI security and AI safety and security, because they're both, it's different than -- you have to think about it with a framework which is different than what you have in the past, where you had procedural systems, it was easy to trace, not always easy, but more deterministic and tracing what's happening, what the sequence events is. So the first thing is like you have to understand that this is different; that there is more risk because of probabilistic systems, open ended on both ends. And you really should be doing tests -- system testing, not just model testing, but system testing, in order to identify vulnerabilities, like extensive. And use people, use users, use developers, use automated tools. But do that. Use that in concert with intervention tools such as guardrails, and you're going to be in pretty good shape to get started. And then as we move forward, just understanding that every time we introduce a new tool or agent or something like that, or a new connection to a third party, we might have existing standards and how we handle that, but we might need new tools in order to understand what the capabilities are, what the exploits are. Because our expectations don't have enough imagination to understand how they might actually be compromised. \[ Music \] **David Moulton**: Bret, thanks for a great conversation today. I really appreciate you sharing your insights on shadow IT and enterprise risk in general. **Bret Kinsella**: Well, thank you very much. I appreciate what you do for the industry and providing insights for so many thought leaders that I've learned from over the years, and just exposing that so everybody doesn't have to learn the hard lessons themselves. They can learn from the people who have been there before them. **David Moulton**: You know, one thing that really struck me about today's conversation with Bret was his point that we can't just test AI models in isolation; we have to test the entire system. It reminded that in cybersecurity, we often get so focused on the new shiny technology that we forget or skip the fundamentals. It's not that the individual component creates risk, it's how everything connects together. Bret put it perfectly when he said that people are going to use AI tools whether we want them to or not, because, frankly, they're just better than what we had before. So instead of fighting that tide, we need to get ahead of it with smarter governance and testing frameworks. Because in the end, shadow IT isn't really about the shadow, it's about the light that we're not shining on our systems. That's it for today. If you like what you've heard, please subscribe wherever you listen, and leave us a review on Apple podcast or Spotify. Your reviews and feedback really does help me understand what you want to hear about. I want to thank our executive producer, Michael Heller, our content and production teams, which include Kenne Miller, Joe Bettencourt and Virginia Tran. Elliott Peltzman edits the show and mixes the audio. We'll be back next week. Until then, stay secure, stay vigilant. Goobye for now. \[ Music \] ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon-grey.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon-grey.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon-grey.svg)](mailto:?subject=Human%20in%20the%20Loop%20for%20AI%20Security&body=Discover%20how%20to%20secure%20generative%20AI%20beyond%20the%20model%20itself%20in%20this%20episode%20of%20Threat%E2%80%AFVector%20at%20https%3A//www.paloaltonetworks.com/resources/podcasts/threat-vector-human-in-the-loop-for-ai-security) Related Resources Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports [See all resources](https://www.paloaltonetworks.com/resources?ts=markdown) {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language