公式動画ピックアップ

AAPL   ADBE   ADSK   AIG   AMGN   AMZN   BABA   BAC   BL   BOX   C   CHGG   CLDR   COKE   COUP   CRM   CROX   DDOG   DELL   DIS   DOCU   DOMO   ESTC   F   FIVN   GILD   GRUB   GS   GSK   H   HD   HON   HPE   HSBC   IBM   INST   INTC   INTU   IRBT   JCOM   JNJ   JPM   LLY   LMT   M   MA   MCD   MDB   MGM   MMM   MSFT   MSI   NCR   NEM   NEWR   NFLX   NKE   NOW   NTNX   NVDA   NYT   OKTA   ORCL   PD   PG   PLAN   PS   RHT   RNG   SAP   SBUX   SHOP   SMAR   SPLK   SQ   TDOC   TEAM   TSLA   TWOU   TWTR   TXN   UA   UAL   UL   UTX   V   VEEV   VZ   WDAY   WFC   WK   WMT   WORK   YELP   ZEN   ZM   ZS   ZUO  

  公式動画&関連する動画 [Attackers Aren’t Hacking Anymore – They’re Logging In]

In this episode of CISO Unscripted, Mitch Mayne sits down with Chris George, Managing Director of Global Customer Support at Unit 42, to break down the biggest findings from the 2026 Incident Response Report. From identity-first attacks to SaaS supply chain risk and the rise of non-human identities, the conversation explores how modern threat actors are exploiting the way companies actually operate today. They dig into the reality that identity is now the frontline of security, why SaaS integrations can quietly expand your attack surface, and how AI agents and service accounts are creating a new class of identity risks. The discussion also covers why the browser has become one of the most consistent attack entry points and what security leaders can do to regain visibility and control. If you're a CISO, security leader, or anyone responsible for defending modern cloud environments, this episode is packed with practical insights into how attackers are really getting in — and what you should be focusing on next. 00:00 Transitive risk and the hidden blast radius of supply chains 00:14 Welcome to CISO Unscripted 00:45 Why the 2026 Unit 42 Incident Response Report matters right now 01:06 Introducing Chris George from Unit 42 01:21 Identity as the new security perimeter 02:44 Why attackers prefer logging in instead of hacking in 03:41 The supply chain risk hiding inside SaaS integrations 04:36 Transitive trust and fourth- and fifth-level vendor risk 05:39 AI and the explosion of non-human identities 06:23 Securing APIs, service accounts, and autonomous agents 08:10 Why the browser is becoming a major attack entry point 09:45 Browser-based attack activity in incident response cases 10:03 Enterprise browsers and zero trust strategies 11:00 Why modern intrusions use multiple attack paths 12:04 Where to find the 2026 Unit 42 Global Incident Response Report ✅Subscribe to our channel to stay up-to-date with the latest in cybersecurity and threat intelligence: @PaloAltoNetworksUnit42 ✅Subscribe to the Threat Bulletin https://unit42.paloaltonetworks.com/#:~:text=Subscribe%20for%20email%20updates%20to%20all%20Unit%2042%20threat%20research Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/unit42 Research Center: https://unit42.paloaltonetworks.com/ Facebook: / lifeatpaloaltonetworks LinkedIn: / unit42 YouTube: / @paloaltonetworksunit42 X: / unit42_intel Thank you for watching. If you found this clip insightful, please give it a thumbs up and subscribe to our Channel for more valuable content. To stay updated with the latest web application and API security, check out our website at https://www.paloaltonetworks.com/unit42. PALO ALTO NETWORKS Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com
 222      7