AI and the End of Traditional Cybersecurity: A Conversation with Barak Schoster

AI and the End of Traditional Cybersecurity: A Conversation with Barak Schoster

Cybersecurity is at a turning point, largely driven by rapid advancements in artificial intelligence (AI). My recent conversation with Barak Schoster—a renowned cybersecurity expert and entrepreneur—highlighted AI’s profound impact on the field. Schoster, who founded Bridgecrew (now part of Palo Alto Networks), has extensive experience in advanced threat protection and innovative security solutions.


AI’s Role in Cybersecurity
Schoster put it simply: “The boundaries have been broken.” Traditional security methods, such as endpoint protection and perimeter-based defenses, are no longer enough in an era dominated by cloud computing and fast-moving data. By 2025, Gartner predicts that 85% of enterprises will primarily operate in cloud environments, demanding proactive and adaptive security models.


Emerging Challenges
Organizations are increasingly using cloud platforms and SaaS applications, introducing new risks. AI-driven productivity tools, while boosting efficiency, also heighten vulnerabilities—through unintended data leaks and unsecured exchanges. Employees frequently use tools outside corporate oversight, raising serious security concerns. Schoster noted that open-source adoption accelerates software distribution but requires strategic monetization. “We moved from single-player mode, where developers benefited individually, to multiplayer mode, which brought real enterprise value,” he explained.


AI’s Double-Edged Impact
AI both expands the attack surface and enhances defense capabilities. Schoster pointed out that deepfakes and automated phishing campaigns have significantly lowered the cost and complexity for cybercriminals. However, AI-powered security tools can automate complex tasks, improving efficiency and resilience.

The urgency is clear: AI-driven phishing attacks have increased by over 2,000% in the past year alone, according to Team8. This escalation highlights the need for real-time security interventions. Bridgecrew leveraged AI for instant monitoring and security enforcement, shifting cybersecurity from reactive threat detection to proactive prevention.


The Future of Cybersecurity
This transformation reflects a larger industry shift. AI can dramatically reduce vulnerabilities, minimize false positives, and enhance productivity by automating critical security tasks—allowing experts to focus on strategic objectives. Schoster predicts that static defenses and perimeter-based models will soon be obsolete. “Execution, speed, and adaptability have become more important than traditional moats like IP or patents,” he asserted.

Organizations must embrace AI-powered security strategies or risk being replaced by more agile competitors. As Schoster warned, “Those that fail to adapt quickly enough will inevitably be replaced by innovative, AI-driven newcomers.” The future of cybersecurity depends on agility, automation, and a forward-thinking approach.

Episoder(1145)

Ep1137: Zac Staples on AI for Naval Readiness

Ep1137: Zac Staples on AI for Naval Readiness

A childhood love of tractors and a Navy career shaped Zac Staples’s path to founding Fathom5, the first company to deploy AI on a naval warship. In this episode, he shares how he's tackling the overlooked world of industrial machines—building platforms that bring AI to legacy systems powering national security and daily life. With a focus on trust, machine resilience, and sustainability, Zac offers a grounded, thoughtful perspective on modernizing critical infrastructure in an AI-driven age.#AIinDefense #MachineTrust #CriticalInfrastructure

10 Apr 22min

AI Revolution in Browser Security: Insights from Ofer Ben-Noon, CTO of SASE at Palo Alto Networks

AI Revolution in Browser Security: Insights from Ofer Ben-Noon, CTO of SASE at Palo Alto Networks

By Michael Matias, CEO of Clarity and Forbes 30 Under 30 alumCybersecurity is at a pivotal crossroads, transformed by AI and the realities of hybrid work. In my recent conversation with Ofer Ben-Noon—founder of Talon Cyber Security and former CEO of Argus Cyber Security—it became clear that traditional cybersecurity strategies must evolve, especially as the browser becomes the primary gateway to enterprise data.With a background in Israel’s elite Unit 8200 and as a pioneer in automotive cybersecurity, Ben-Noon now leads Talon in redefining how organizations secure today’s decentralized workforce. His focus? The secure browser.“Control the browser, and you control the data,” he said. That simple yet powerful insight underpins a massive shift in cybersecurity thinking. As workers increasingly access corporate systems from personal or unmanaged devices, legacy defenses like firewalls and VPNs fall short. Ben-Noon, now also CTO of SASE at Palo Alto Networks, pointed out that 90% of enterprises allow access from unmanaged devices—and 85% of ransomware attacks stem from them.This challenge is compounded by SaaS sprawl. While companies officially use about 1,500 apps, they often have up to 8,500 unsanctioned ones operating in the shadows. This explosion of shadow IT, paired with the rise of AI, introduces massive vulnerabilities. Every day, Palo Alto Networks sees 7.7 million new malicious URLs and countless AI-generated malware strains. “AI dramatically accelerates both the complexity and volume of threats,” Ben-Noon warned.Yet, AI is also a powerful ally. Talon’s secure browser integrates AI-driven security directly into everyday workflows—no more clunky, bolt-on tools. This innovation transforms the browser from a weak point into a flexible, secure productivity hub. “The browser itself becomes the center of secure productivity—empowering users rather than limiting them,” he explained.I couldn’t agree more. Today’s workforce values autonomy and speed. A secure browser gives teams both, while protecting critical data in real time. Ben-Noon emphasizes proactive AI-driven defenses over reactionary ones: detecting breaches after the fact isn’t enough anymore—prevention is key.In closing, Ben-Noon shared, “We’ve made significant bets on three trends: distributed workforces, web-based applications, and the Chromium browser as the dominant digital workspace.” These trends, rapidly accelerated by AI, demand a fresh cybersecurity mindset.The organizations that embrace this shift—integrating AI and secure browsers into their DNA—will be the ones best equipped to thrive in an increasingly complex digital world.

26 Mar 37min

Ep1136: Harel Ram: Building the Negev Innovation Hub

Ep1136: Harel Ram: Building the Negev Innovation Hub

From overcoming startup challenges to driving regional innovation, Harel Ram shares his journey from entrepreneur to ecosystem leader. He unpacks the transformation of Beersheba into a global tech hub, the power of strategic partnerships, and the lessons learned in balancing vision, investment, and execution to create lasting value for startups, investors, and the wider tech industry.#TechInnovation #StartupEcosystem #BeershebaTechHub

24 Mar 25min

Ep1135: Itamar Friedman: Safeguarding AI Code Integrity

Ep1135: Itamar Friedman: Safeguarding AI Code Integrity

From military service to deep tech startups, Itamar Friedman has always been drawn to solving complex problems. Now, as the founder of Codo, he sees AI-driven code integrity as his life’s mission. In this conversation, he unpacks the rapid evolution of AI in software development, the future of automated code testing and review, and the critical role AI will play in ensuring software aligns with ethical and security standards. With insights on the intersection of AI, infrastructure, and the next wave of technological breakthroughs, this discussion offers a thought-provoking look at how AI is reshaping the way we build, verify, and trust code.

18 Mar 32min

Ep1134: Eric O’Neill on the Future of Cybersecurity: Trust Over Data

Ep1134: Eric O’Neill on the Future of Cybersecurity: Trust Over Data

Trust is the new currency in cybersecurity. Former FBI counterintelligence operative Eric O’Neill reveals how cybercriminals exploit AI, deep fakes, and social engineering to infiltrate even the most secure organizations. With insights from his career tracking spies and securing critical infrastructure, he unpacks the evolving threats businesses face and the urgent need to rethink digital security. From real-world espionage cases to the vulnerabilities of global enterprises, he explores why protecting data isn’t enough—safeguarding trust is the real challenge of the digital age.

13 Mar 19min

Ep1133: Inna Tokarev Sela: Context is Enterprise AI's Missing Link

Ep1133: Inna Tokarev Sela: Context is Enterprise AI's Missing Link

Inna Tokarev Sela has been at the forefront of data and AI, from her early days at SAP to leading innovation in enterprise analytics. She shares her journey of bridging the disconnect between technical and business teams, the challenges of AI adoption in enterprises, and how Elumex is transforming generative AI into a seamless tool for decision-making. With insights on AI governance, automation, and the future of application-free workflows, she paints a compelling vision of how businesses can harness AI for smarter, faster, and more intuitive data-driven operations.

11 Mar 25min

Ep1132: Building Security at the Design Stage with Michael Nov

Ep1132: Building Security at the Design Stage with Michael Nov

Michael Nov’s journey—from the Israeli military to enterprise software and entrepreneurship—shaped his approach to product security. He shares how AI can bridge the gap between engineering and security teams, ensuring security is embedded at the design stage rather than becoming a last-minute hurdle. Drawing from his experience at OwnBackup and now as co-founder of Prime Security, he discusses the challenges of scaling security in fast-moving enterprises, the evolving role of AI in risk management, and why proactive security is key to business velocity.

7 Mar 20min

Ep1131: Get Off the X: Michele Rigby Assad on Moving Beyond Comfort Zones

Ep1131: Get Off the X: Michele Rigby Assad on Moving Beyond Comfort Zones

In the chaos of Baghdad during her CIA tour, Michelle Rigby Assad discovered that working harder wasn't enough—working on the right things was crucial. Drawing from intelligence vetting techniques, she explains how questioning established processes and being intentionally curious can transform both personal growth and organizational success. Her book "Get Off the X" explores moving beyond comfort zones toward purposeful action, emphasizing that meaningful progress often comes from small, consistent daily steps.#20MinuteLeaders #GetOffTheX #EmbraceTheUnknown #PurposefulAction

2 Mar 20min

Populært innen Business og økonomi

stopp-verden
dine-penger-pengeradet
e24-podden
rss-penger-polser-og-politikk
rss-borsmorgen-okonominyhetene
pengepodden-2
tid-er-penger-en-podcast-med-peter-warren
finansredaksjonen
utbytte
livet-pa-veien-med-jan-erik-larssen
rss-sunn-okonomi
morgenkaffen-med-finansavisen
stormkast-med-valebrokk-stordalen
lederpodden
aksjesladder
okonomiamatorene
stinn-av-gryn
aksjepodden
pengesnakk
boligbobla