公式動画ピックアップ
AAPL
ADBE
ADSK
AIG
AMGN
AMZN
BABA
BAC
BL
BOX
C
CHGG
CLDR
COKE
COUP
CRM
CROX
DDOG
DELL
DIS
DOCU
DOMO
ESTC
F
FIVN
GILD
GRUB
GS
GSK
H
HD
HON
HPE
HSBC
IBM
INST
INTC
INTU
IRBT
JCOM
JNJ
JPM
LLY
LMT
M
MA
MCD
MDB
MGM
MMM
MSFT
MSI
NCR
NEM
NEWR
NFLX
NKE
NOW
NTNX
NVDA
NYT
OKTA
ORCL
PD
PG
PLAN
PS
RHT
RNG
SAP
SBUX
SHOP
SMAR
SPLK
SQ
TDOC
TEAM
TSLA
TWOU
TWTR
TXN
UA
UAL
UL
UTX
V
VEEV
VZ
WDAY
WFC
WK
WMT
WORK
YELP
ZEN
ZM
ZS
ZUO
公式動画&関連する動画 [Attackers Aren’t Hacking Anymore – They’re Logging In]
In this episode of CISO Unscripted, Mitch Mayne sits down with Chris George, Managing Director of Global Customer Support at Unit 42, to break down the biggest findings from the 2026 Incident Response Report. From identity-first attacks to SaaS supply chain risk and the rise of non-human identities, the conversation explores how modern threat actors are exploiting the way companies actually operate today.
They dig into the reality that identity is now the frontline of security, why SaaS integrations can quietly expand your attack surface, and how AI agents and service accounts are creating a new class of identity risks. The discussion also covers why the browser has become one of the most consistent attack entry points and what security leaders can do to regain visibility and control.
If you're a CISO, security leader, or anyone responsible for defending modern cloud environments, this episode is packed with practical insights into how attackers are really getting in — and what you should be focusing on next.
00:00 Transitive risk and the hidden blast radius of supply chains
00:14 Welcome to CISO Unscripted
00:45 Why the 2026 Unit 42 Incident Response Report matters right now
01:06 Introducing Chris George from Unit 42
01:21 Identity as the new security perimeter
02:44 Why attackers prefer logging in instead of hacking in
03:41 The supply chain risk hiding inside SaaS integrations
04:36 Transitive trust and fourth- and fifth-level vendor risk
05:39 AI and the explosion of non-human identities
06:23 Securing APIs, service accounts, and autonomous agents
08:10 Why the browser is becoming a major attack entry point
09:45 Browser-based attack activity in incident response cases
10:03 Enterprise browsers and zero trust strategies
11:00 Why modern intrusions use multiple attack paths
12:04 Where to find the 2026 Unit 42 Global Incident Response Report
✅Subscribe to our channel to stay up-to-date with the latest in cybersecurity and threat intelligence: @PaloAltoNetworksUnit42
✅Subscribe to the Threat Bulletin https://unit42.paloaltonetworks.com/#:~:text=Subscribe%20for%20email%20updates%20to%20all%20Unit%2042%20threat%20research
Join the conversation on our social media channels:
Website: https://www.paloaltonetworks.com/unit42
Research Center: https://unit42.paloaltonetworks.com/
Facebook: / lifeatpaloaltonetworks
LinkedIn: / unit42
YouTube: / @paloaltonetworksunit42
X: / unit42_intel
Thank you for watching. If you found this clip insightful, please give it a thumbs up and subscribe to our Channel for more valuable content. To stay updated with the latest web application and API security, check out our website at https://www.paloaltonetworks.com/unit42.
PALO ALTO NETWORKS
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.
http://paloaltonetworks.com
222
7