{"id":3383,"date":"2025-06-24T06:00:00","date_gmt":"2025-06-24T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=3383"},"modified":"2025-08-15T14:58:29","modified_gmt":"2025-08-15T21:58:29","slug":"my-first-10000-days-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/","title":{"rendered":"My First 10,000 Days in Cybersecurity"},"content":{"rendered":"\n<p>A couple of months ago, I did the math. I\u2019ve been in the cybersecurity industry for roughly 10,000 days \u2014 a milestone that sounds immense until you realize how quickly the days turn into decades. This reflection inspired me to look back at the journey, not just for myself, but for our entire industry. While the core threats we face \u2014 malware, denial-of-service, meddler-in-the-middle attacks \u2014 remain stubbornly familiar, the landscape around them has been completely terraformed. What has changed is the speed, scale and sophistication of our adversaries; the evolution of our role as defenders; and the strategic imperative to change how we think about security itself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tough Lessons, but a Foundational Experience<\/h2>\n\n\n\n<p>My own journey began with an unintentional act of campus-wide chaos. In the mid-90s, as a computer science student at Purdue, I was given an assignment on interprocess communication. The goal was to write a program that could self-replicate across different processes. I became so engrossed in the challenge that I decided to take it a step further: What if I could make it replicate across multiple machines on the network?<\/p>\n\n\n\n<p>In what I thought was a moment of cleverness, I created a program that did just that. It wasn\u2019t malicious; it didn\u2019t steal data or delete files. As a learning experiment, I even added a harmless pop-up message \u2014 \u201cHello, Earthlings\u201d \u2014 to confirm it had been executed. You can probably guess what happened next. The program began propagating across almost every computer lab on campus. Machines crashed under the unexpected load, and within hours, the IT department had to shut down the entire network.<\/p>\n\n\n\n<p>After I confessed, the university, to its great credit, didn\u2019t punish me. Instead, they worked with me to build a kill switch and understand the vulnerability. That experience was foundational. It taught me that, just because you <em>can<\/em> do something, it doesn\u2019t mean you <em>should<\/em> do it. More importantly, it taught me the critical need for guardrails, for control, and for having a good set of brakes when you\u2019re moving fast. It\u2019s a lesson that developers, even 10,000 days later, are still learning as we work to embed security into the beginning of the development lifecycle, instead of treating it as a speed bump on the road to innovation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The CISO: From Technical Operator to Business Executive<\/h2>\n\n\n\n<p>When I began my career, there was no such thing as a CISO. We were security managers, focused almost exclusively on the network and the endpoint. Today, the CISO has become a cornerstone of digital transformation, a shift that accelerated dramatically post-COVID when the business turned to us first to enable secure, remote work.<\/p>\n\n\n\n<p>The modern CISO can no longer be just a technologist whose knee-jerk reaction is to buy the latest and greatest tool. I\u2019ve seen the most successful leaders evolve across four key areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strategic shift:<\/strong> They\u2019ve moved from being a technical operator to a business executive, capable of having board-level conversations and quantifying risk in business terms.<\/li>\n\n\n\n<li><strong>Scope expansion:<\/strong> Their focus has expanded beyond the organization\u2019s walls to include third-party risk management, privacy and compliance integration. They understand that you are only as strong as your weakest supplier.<\/li>\n\n\n\n<li><strong>Investment optimization:<\/strong> They are the gurus of the budget, focused on ROI measurement and technology portfolio optimization rather than simply acquiring new products.<\/li>\n\n\n\n<li><strong>Leadership and crisis management:<\/strong> The best CISOs I know are cross-functional workhorses. They can speak the language of DevOps, finance and legal, championing security across the enterprise. They are also experts in crisis management, drilled and ready for the inevitable incident.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">This Isn\u2019t Just Consolidation, It\u2019s Platformization<\/h2>\n\n\n\n<p>For years, organizations have tried to solve the problem of complexity by stitching together dozens of best-of-breed products. I saw this firsthand in my previous roles. The intention was to create a \u201cplatform,\u201d but the reality was a tangled mess of disparate tools that failed to integrate on a policy, control or visibility level. It didn\u2019t work because it mirrored the problem instead of solving it.<\/p>\n\n\n\n<p>When our CEO, Nikesh Arora, coined the term \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/why-paloaltonetworks\/platformization\">platformization<\/a>,\u201d it crystallized a concept that the industry desperately needed. This type of <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/platformization-is-nothing-without-ai-mastering-the-cybersecurity-balance\/\">platformization<\/a> doesn\u2019t just mean consolidation; consolidation is merely one of its many outcomes.<\/p>\n\n\n\n<p>A true platform approach is about streamlining operations through a <em>single, natively integrated system<\/em>. It\u2019s about leveraging the same rich, accurate and comprehensive data across your entire security posture to deliver better outcomes. The benefits are clear:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unified security and operational efficiency:<\/strong> You eliminate the complexity of managing dozens of vendors and siloed tools.<\/li>\n\n\n\n<li><strong>Superior analytics:<\/strong> You gain correlated insights from machine learning that is trained on a complete dataset, enabling predictive capabilities that can anticipate and prevent threats.<\/li>\n\n\n\n<li><strong>Demonstrable business impact:<\/strong> You can show the board faster response times, reduced vendor overhead and simplified compliance, proving that security is a business enabler, not a cost center.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Next 10,000 Days<\/h2>\n\n\n\n<p>Predicting the future is impossible, but I can tell you what the CISO of tomorrow \u2014 or perhaps the Chief AI Security Officer \u2014 will need. That\u2019s a flexible mindset. The future of the SOC should be 100% automated. We are already seeing the emergence of personal AI agents that can manage our calendars and communications; it\u2019s not a stretch to imagine one dedicated to our personal security.<\/p>\n\n\n\n<p>Ultimately, whether used by attackers or defenders, AI is only as effective as the data it\u2019s trained on. That is the fundamental truth. To stay ahead, we must have the best, richest and most accurate cybersecurity data to power our defensive AI models.<\/p>\n\n\n\n<p>To future-proof our strategies, we must foster a culture of security awareness where every employee plays a role. Any digital transformation initiative that doesn\u2019t have cybersecurity embedded as its first step is destined to fail. From that panicked night in a Purdue computer lab to today\u2019s boardrooms, the core lesson remains the same: Building without brakes is far from innovation, but rather an accident waiting to happen. The challenge for the next 10,000 days is to build with resilience and purpose at the core.<\/p>\n\n\n\n<p>Tune in to the <a href=\"https:\/\/www.paloaltonetworks.com\/podcasts\/threat-vector\">Threat Vector podcast<\/a> to learn more.<\/p>\n\n\n\n<p>Curious to know what else Haider has to say? Check out his perspectives in <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/author\/haider-pasha\/\">his other posts<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.<\/p>\n","protected":false},"author":1,"featured_media":3384,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,17,15],"tags":[],"coauthors":[42],"class_list":["post-3383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-transformation","category-platformization","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>My First 10,000 Days in Cybersecurity - Perspectives<\/title>\n<meta name=\"description\" content=\"From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"My First 10,000 Days in Cybersecurity - Perspectives\" \/>\n<meta property=\"og:description\" content=\"From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T21:58:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Haider Pasha\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"My First 10,000 Days in Cybersecurity\",\"datePublished\":\"2025-06-24T13:00:00+00:00\",\"dateModified\":\"2025-08-15T21:58:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\"},\"wordCount\":1045,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg\",\"articleSection\":[\"Business Transformation\",\"Platformization\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\",\"name\":\"My First 10,000 Days in Cybersecurity - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg\",\"datePublished\":\"2025-06-24T13:00:00+00:00\",\"dateModified\":\"2025-08-15T21:58:29+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"My First 10,000 Days in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"My First 10,000 Days in Cybersecurity - Perspectives","description":"From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"My First 10,000 Days in Cybersecurity - Perspectives","og_description":"From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.","og_url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/","og_site_name":"Perspectives","article_published_time":"2025-06-24T13:00:00+00:00","article_modified_time":"2025-08-15T21:58:29+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg","type":"image\/jpeg"}],"author":"Haider Pasha","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"My First 10,000 Days in Cybersecurity","datePublished":"2025-06-24T13:00:00+00:00","dateModified":"2025-08-15T21:58:29+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/"},"wordCount":1045,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg","articleSection":["Business Transformation","Platformization","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/","name":"My First 10,000 Days in Cybersecurity - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg","datePublished":"2025-06-24T13:00:00+00:00","dateModified":"2025-08-15T21:58:29+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"From campus chaos to platformization: A CSO\u2019s 10,000-day reflection.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/06\/my-first-10000-days-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/my-first-10000-days-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/"},{"@type":"ListItem","position":2,"name":"My First 10,000 Days in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/3383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/comments?post=3383"}],"version-history":[{"count":6,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/3383\/revisions"}],"predecessor-version":[{"id":3827,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/3383\/revisions\/3827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media\/3384"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media?parent=3383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/categories?post=3383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/tags?post=3383"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/coauthors?post=3383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}