AI is changing threat detection: Palo Alto Networks' CEO says the focus must shift
Palo Alto Networks CEO Nikesh Arora says what many teams feel every day: AI has raised the stakes. Attackers can scale social engineering, mutate payloads, and abuse identity systems faster than your playbooks update.
Prevention matters, but it's not enough. The priority now is detection that sees behavior, not just signatures-and response that acts before damage spreads.
Why detection needs a rethink
- Content-at-scale: AI generates convincing phishing, deepfake audio, and support tickets that trick humans and help desks.
- Polymorphic malware: Code mutates on the fly, lowering IOC shelf life.
- Identity abuse: Session hijacking, MFA fatigue, and OAuth token theft move faster than traditional controls.
- AI feature risk: Prompt injection, model exfiltration, data leakage, and supply chain issues through plugins and third-party APIs.
What this means for your security strategy
- Shift from static rules to behavior-based detections across endpoint, identity, network, and SaaS.
- Treat identity as the new perimeter. Invest in identity threat detection and response, not just IAM.
- Unify telemetry. Centralize logs into a data platform where detections can correlate at scale.
- Adopt automated containment with human-in-the-loop. Speed matters, judgment still wins.
- Instrument AI features: log prompts, outputs, model versions, and data access paths.
- Run routine red-team exercises that include AI-enabled attack paths.
For IT and development teams
- Add structured, high-signal logging to every service. Include user, session, device, and data object IDs.
- Secure model endpoints and LLM gateways. Enforce auth, rate limits, payload size checks, and output filtering.
- Threat-model AI features: prompt injection, data leakage, training data exposure, and dependency risk.
- Scan dependencies and containers continuously; pin versions and verify checksums.
- Protect secrets. Rotate tokens, bind them to audience and scope, and watch for abnormal token reuse.
- Use canary tokens and honey prompts to detect scraping and automation abuse.
For security leaders and management
- Balance budget so detection and response are funded on par with preventive controls.
- Build a detection engineering function. Treat detections like product: backlogs, testing, and SLAs.
- Set policy for AI use (internal and third-party). Define data classification, allowed models, and review gates.
- Tabletop AI-specific incidents: deepfake CEO fraud, model leakage, and OAuth token abuse.
- Consolidate overlapping tools to reduce alert fatigue and improve correlation.
- Invest in skills: analysts who understand identity, data flow, and AI attack patterns.
Metrics that actually move risk
- Mean time to detect (MTTD) and respond (MTTR) by attack class.
- Detection coverage mapped to known techniques (e.g., initial access, lateral movement, data exfil).
- Identity compromise dwell time and percentage of privileged sessions verified.
- False positive rate per detection and analyst-to-alert ratio.
- Model/LLM abuse events detected vs. blocked; prompt injection attempts observed.
Architecture checklist
- Unified telemetry: EDR/XDR, identity logs, network egress, SaaS audit trails, data access logs.
- Identity threat detection layered with strong MFA, session binding, and device trust.
- Data security posture management (DSPM) to map sensitive data and watch egress.
- Egress controls with DNS/HTTP inspection and token-aware DLP.
- LLM gateway or proxy for prompt logging, policy enforcement, and redaction.
- Playbooks that auto-isolate endpoints, revoke tokens, and quarantine SaaS users on high-confidence alerts.
Policy and standards to anchor your program
Don't guess. Align to known frameworks and threat models that now include AI-specific risks.
- NIST AI Risk Management Framework for governance, measurement, and controls.
- MITRE ATLAS for tactics and techniques against machine learning systems.
Career and team enablement
Skills are the force multiplier. Upskill analysts, engineers, and product teams on AI security patterns and incident handling.
Bottom line
AI changes how attacks start, spread, and hide. Nikesh Arora's point is simple: invest in detection that sees behavior and response that moves fast.
Keep shipping features. Just ship telemetry, controls, and playbooks with them.
Your membership also unlocks: