Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Cybersecurity has become an ongoing war
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Cybersecurity has become an ongoing war
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cybersecurity ExecutivesExpert OpinionsThreat Intelligence

Cybersecurity has become an ongoing war

Tony Glover
April 15, 2025 at 6:48 AM
By Tony Glover Tony Glover
Share
NIKESH ARORA, CEO OF PALO ALTO NETWORKS
SHARE
Nikesh Arora, Palo Alto Networks' CEO
Nikesh Arora, Palo Alto Networks’ CEO

In an exclusive interview with Cyber Intelligence, Palo Alto Networks CEO Nikesh Arora explains the growing importance of real-time threat intelligence and why cybersecurity security advisers must act as wartime consiglieres.

Cyber Intelligence: Palo Alto Networks has its own research arm, Unit 42. Why was it set up, and can you explain the importance of having a dedicated threat intelligence team at your disposal?

Nikesh Arora: In our business, assessing risk is crucial. There is a constantly evolving threat landscape, and cybercriminals are constantly introducing new techniques and developing existing ones. And as online connectivity grows, so does every organization’s overall attack surface. Unit 42 are constantly conducting research examining the full scope of the ever-expanding attack surface and constantly testing existing defenses. They play the role of cybercriminals, acting as white-hat hackers, if you like, in order to detect potential weaknesses. This research is conducted across the board and also directed at each client-specific attacks surface. And when there is a breach, Unit 42 is there to detect and control it. They effectively act as wartime consiglieres – remember that the ongoing Russia/Ukraine conflict started in cyberspace. They must also act immediately to mitigate any breach that does occur. Constant research and testing of defenses are vital. We have to be right every time, but the cybercriminal gangs only have to be right once to effect a breach and perform a successful attack.

Cyber Intelligence: Can you outline the risks inherent in the increasingly widespread use of QR matrix bar codes in the corporate and consumer environments?

Nikesh Arora: QR codes are a mechanism to quickly accomplish a task or provide information, such as the code that frequently appears at the bottom of a restaurant menu. For a bad actor, this is an excellent opportunity to begin an attack. As all QR codes look pretty much the same to the naked eye, all the cybercriminal needs to do is to print a malignant QR code and then stick it over the genuine one in a restaurant, hotel, or wherever. The user’s browser can then be directed to a weaponized site. To combat this threat, you need a browser that is intelligent – one that can identify such a site before it is too late. The right place to protect against QR attacks is in the browser itself. For this reason, Palo Alto Networks acquired Talon’s Enterprise Browser two years ago. This provides additional layers of protection against malicious browser extensions, phishing attacks, and web-based attacks. Talon also offers extensive controls to help ensure that sensitive data does not escape the confines of the browser, regardless of whether the enterprise manages the device.

Cyber Intelligence: Zero Trust is a recent buzzword, but the desired result can be hard to achieve. Can you explain how to combine operational resilience with the simplicity of use needed to make Zero Trust accessible and easy to grasp for ordinary staff members?

Nikesh Arora: On a very fundamental level, don’t trust anything. Many provide an environment where some staff are in the office, while others may be working from home and others may be travelling. The key is to trust everyone and no one at the same time. It is important to try to instigate consistent security protocols throughout the organization that are adopted by the entire staff.

Cyber Intelligence:  Nikesh, your own personal career has played a transformative role in developing current online technology and mobile communications. Did you ever foresee the security hazards we face today?

Nikesh Arora: When I was a senior executive at Google, I was called in at the weekend once in 2009, which was unusual, and I had my first brush with cybercrime. We had to urgently examine what happened and monitor our teams in a specific country. I learned then that cybercrime is an inevitable consequence of the increasingly widespread use of mobile communications. Seven years ago, just before I came to head up Palo Alto Networks, I realized that the cybersecurity industry was a new industry, it is only 25 years old and was born at the beginning of this century, and, like every new industry, would rapidly go through a period of consolidation where it would inevitably be dominated by several large players and I was determined to make Palo Alto Networks such a player.

Cyber Intelligence: The rapid adoption of artificial intelligence (AI) across all sectors by corporate and individual staff members has created numerous security threats. What steps should companies now take to shore up their defenses?

Nikesh Arora: AI is now a worldwide phenomenon, and we all want to use it. But AI inevitably has unpredictable outcomes and is developing a brain of its own. In the hands of a bad actor, it can prove to be a devastating weapon. And it has already moved out of the laptop and smartphone space into other areas, such as self-driving cars, making a vast array of devices and applications vulnerable to a takeover by bad actors. In the case of its use for self-driving cars, it could even be deployed to effect an assassination attempt by causing a car accident.

Cyber Intelligence: Thank You

TAGGED: artificial intelligence, cyber warfare, cybercrime, Cybersecurity, geopolitics, Nikesh arora, palo alto networks, qr code, talon's enterprise browser, threat intelligence, unit 42, vulnerability, zero-trust
Tony Glover May 7, 2025 April 15, 2025
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Only a Global Force Can Combat Cybercrime
Next Article Deepfake news lures new victims
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsOne Minute RoundupOne Minute Roundup

Japan Pushes Proactive Cyber Laws – June 17th

Japan Prime Minister Shigeru Ishiba implements a new cybersecurity defense law ahead of national elections to take proactive measures against cyber threats. The legislation allows the government to monitor online communications and requires private companies to report cyberattacks. 

June 17, 2025
AINews

Criminal use of AI enters new and dangerous phase

Cybercriminals have just added what may be the most dangerous weapon yet to their arsenal of illegal software, a Dark Web version of legitimate artificial intelligence (AI) platforms. Tel Aviv-based network security company, Cato Networks, has uncovered an emerging criminal platform called Nytheon AI that it says is “a fully-fledged illicit AI platform”. While there have been other attempts to offer criminal versions of popular AI models, Nytheon AI is the first truly comprehensive multilingual offering. Threat actors can now use the platform to conduct a variety of attacks including tailored spear-phishing campaigns, deepfake documents, and polymorphic malware capable of constantly mutating its appearance.

June 17, 2025
NewsOne Minute RoundupOne Minute Roundup

Geopolitical Tensions are Changing the Cybersecurity Landscape – June 13th

Political tensions are prompting nations to re-strategize cybersecurity. Countries that once sought international cooperation and joint strategies are now prioritizing domestic cyber capacities and national interests as a result of geopolitical instabilities.

June 13, 2025
NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?