{{item.title}}
{{item.text}}
{{item.text}}
The latest frontier AI models have crossed a line. They're often exceptionally good at finding software flaws, chaining lower-severity issues into critical exploit paths, and surfacing logic vulnerabilities that traditional tools can miss. They can reason across the overall application stacks, including SaaS and public-facing platforms, at a depth that previously may not have been possible. Each model generation finds more, faster, and the gap between what frontier AI can surface, and what conventional defenses can absorb keeps widening.
These capabilities won't stay with frontier labs. Open source is closing the gap fast. Models built outside any guardrail won't be far behind. Within months, the same caliber of capability available to defenders today will be available to adversaries at scale, and the generation after that will likely be more capable.
While frontier models reshape what attackers can find, organizations are reshaping what's there to be found. AI-assisted development is democratizing asset creation, extending coding, configuration, and integration work far beyond traditionally trained engineers. More people are shipping more code, more APIs, and more cloud and SaaS configurations than ever before, often without a security review in the loop.
The result is a generation of new exposures that Palo Alto Networks and PwC are exploring in the field:
Defenders currently have an advantage that may not last. Advanced frontier models are available to security teams today. The organizations that act now can know where their exposures are, fix what matters, and harden what they can't fix in time. The organizations that wait will likely discover their vulnerabilities after attackers do.
Are your defenses ready for AI-enabled attacks? That's the question Palo Alto Networks Unit 42 Frontier AI Defense, soon to be offered with PwC, plans to answer. It’s a three-step approach that plans to use frontier AI on your side of the fence, then turn the findings into remediation and defense-in-depth activation.
A frontier AI-ready security program requires two things working together: an offensive AI capability that knows how to ask the necessary questions, and a path to turn what it finds into operational change. PwC and Palo Alto Networks is aiming to bring both to the defender's side of the line now.
You don't need to scrap what you've built. You should run frontier AI through the program you've already invested in, before someone else runs it through your environment from the outside.
For CISOs and their boards, that can mean:
AI is one of the biggest security challenges since enterprises moved to the cloud. Within months, frontier capabilities can be in the hands of attackers at scale. The organizations that move first are often the ones that know they're exposed, have activated containment, and operate at frontier-model tempo. The organizations that wait will likely have to respond under maximum pressure with no notice.
{{item.text}}
{{item.text}}