Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:12)
Welcome to threatvector, the Palo Alto Networks podcast, where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, Senior director of thought leadership for unit 42.
A (0:26)
There is huge importance in looking at things across the board. The most visibility you can, shifting left with everything you can to reduce the risk for that, for that environment, but also being able to protect on the right and prevent from bad things from happening. That holistic view is crucial for proper security strategy for any company.
B (1:11)
You know, the word proactive gets thrown around a lot in security, but what does it actually mean when you're dealing with cloud environments that change by the hour? AI that accelerates both innovation and attack speed, and teams stretched thinner than ever. In this episode, I had a chance to sit with Elad Karan, a security leader who spends every day bridging the gap between engineering realities and customer challenges. We talk about why reactive models can't keep up with modern complexity, how to unify peacetime and wartime security, and what it takes to shift left in a way that truly empowers developers. Glad brings a pragmatic view rooted in what's really happening inside organizations today. And we explore how proactive security isn't just about prevention, it's about acceleration. So if you've ever wondered how to get ahead of the next threat instead of chasing the last one, this conversation's for you. Welcome to Threat Vector. I've been looking forward to this conversation. We've struggled to get this one recorded as our schedules keep passing each other, but you made time today. Thanks for coming on the podcast.
A (2:25)
Oh, thank you, David. I was really looking forward to this one and I was really making the time today because I think this is an important piece that all of our listeners should hear.
B (2:37)
Ilad, let's start with this question of urgency. Why is the current threat landscape making reactive security models increasingly less effective?
A (2:48)
So there's an interesting paradigm that's been going around for a while is if you have your environment properly configured, posture a hygiene a, you'll be good. But this is not true. And we are seeing that becoming more and more complex. Right? The cloud is becoming more and more complex with more services added almost on a daily basis by cloud services service providers. It's their way of doing money. It's just the way the world works, right? Capitalism. The problem is that it adds complexity. And as it adds complexity, I haven't found a single Organization that was able to maintain this amazing posture and even if they could achieve it, maintaining it for a while, it's impossible. And add to that the fact that there's someone on the other side constantly working to identify those gaps that zero days really any potential exploit to be able to then leverage that to steal data to create potential damage. And when you add those together, you identify that the threat that we have now, it's real. It's real and it's becoming more and more real. And as more sensitive data is going to the cloud, because the cloud makes it much more available and easy and approachable, accessible. At the end, what you get is risk is higher, availability of attack surface to attackers higher, and your level of protection getting lower. You need better protection. This is why we've been, we've been looking at everything that led us to this point in the cloud and we essentially got to the conclusion that you cannot just rely on that posture piece. You cannot just rely on making sure that you have everything well configured in your environment because you can be amazing in this. But the result would still be that your data is stolen because someone got in and you missed it. You didn't have the right protection tools. That is the key to why we've been thinking about it differently. Right. And I think this is, it's highly required.
