{"id":65,"date":"2024-06-26T00:00:00","date_gmt":"2024-06-26T00:00:00","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=65"},"modified":"2025-02-19T12:38:35","modified_gmt":"2025-02-19T12:38:35","slug":"when-it-comes-to-cyber-resilience-and-ai","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/","title":{"rendered":"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination"},"content":{"rendered":"<p>In the aftermath of the tragic fire that killed three Apollo 1 astronauts in 1967, a US congressional hearing was convened to discuss the cause and what to do about it. Frank Borman, a highly respected astronaut, testified before the committee and was asked a straightforward question: \u201cWhat caused the fire?\u201d<\/p>\n<p>Instead of giving an answer laced with technical details, he responded simply and eloquently: \u201cA failure of imagination.\u201d<\/p>\n<p>What I\u2019d like to tell all my cybersecurity colleagues and their bosses is that we are in greater jeopardy than ever at compromising our cyber resilience\u2014our ability to rebound immediately and fully from a cyberattack with minimal operational impact\u2014unless we stretch our imaginations. And the inspiration for that effort is both a threat to us and a force multiplier for us: artificial intelligence (AI).<\/p>\n<p>On the one hand, AI has been leveraged extensively and expertly by cybercriminals, from rogue nation-states and malicious insiders to lone wolf hackers. Other than perhaps their own persistence, it is probably their strongest weapon. On the other hand, however, it is our greatest asset and our best hope to stay one step ahead of the attackers \u2026 if we use our imagination.<\/p>\n<h2>Threats to Our Resilience<\/h2>\n<p>Two years ago, I wrote about cybersecurity in a post-COVID world. Although the pandemic was not officially \u201cdone\u201d when I wrote those pieces, I stressed the need for CISOs and CIOs to put in place plans to ensure stronger cybersecurity and cyber resilience when we had finally blunted COVID. Why? It was clear that another viral threat could emerge in the future, and we had to make sure we could withstand its impact. After all, cyberattackers had learned things too.<\/p>\n<p>Then came generative AI.<\/p>\n<p>Think back a few short years, when rootkits could be easily obtained on the dark web, often triggered by phishing emails that were crude and amateurish. Now, hackers use broadly available and much more sophisticated GenAI tools like ChatGPT. Remember those phishing emails replete with spelling, grammar, punctuation, and syntax errors? Gone. All the hackers needed to do was ask ChatGPT to craft them a spotless email.<\/p>\n<p>Another important threat to our resilience is one we\u2019ve seen and experienced in the past, except now it\u2019s on hyperdrive. I\u2019m talking about presidential elections\u2014but not just here in the US. During 2024, there will be more than 60 elections around the world where a state leader will be selected. What a field day for political hackers who want to sow discord among populations with disinformation, deepfakes, and cherry-picked messaging tailored to the biases and fears of a single voter.<\/p>\n<p>I probably don\u2019t even need to bring up AI-inspired ransomware against our financial institutions. Even with the state-of-the-art cybersecurity defenses banks and other repositories of wealth and sensitive data have erected, the bad guys keep coming, thanks to their sophisticated and creative use of AI and ML algorithms.<\/p>\n<h2>What We Need to Do<\/h2>\n<p>For those of us\u2014CISOs, business executives, and cybersecurity industry leaders\u2014charged with ensuring our systems are up and running and our data is protected, it\u2019s essential to define what \u201cgood\u201d looks like when it comes to <a href=\"\/resources\/infographics\/build-your-cyber-resilience-in-3-steps\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:when-it-comes-to-cyber-resilience-and-ai: parbase:what we need to do\">cyber resilience<\/a>.<\/p>\n<p>One thing is clear: We must be able to block even the most sophisticated attacks without involving a single human being, if necessary. I\u2019m not saying we don\u2019t need great cyber sleuths and deeply committed security analysts; we certainly do. But we have to abandon the mindset that says we can\u2019t trust AI without direct human intervention. We have to trust the AI model. If AI tells us that a firewall indicates a problem, we must accept that and proactively block the potential attack. No time to do manual triage to tell us if it\u2019s a credible attack or a false positive. A second\u2019s delay can be catastrophic. Humans can and should augment AI models\u2014and, of course, train them\u2014but they can\u2019t be a bottleneck. Our goal must be to get as close to near-real time as possible, and we can\u2019t do that without AI.<\/p>\n<p>We also must reimagine our approach to managing business risk. It\u2019s not just where our organizations are today with an <a href=\"\/cortex\/cortex-xpanse\/attack-surface-management\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:when-it-comes-to-cyber-resilience-and-ai: parbase:what we need to do\">expanding attack surface<\/a>, dealing with runaway data proliferation, supporting the anywhere\/anytime workforce, managing complex supply chains, and meeting spiraling regulatory demands. It\u2019s that those are all going to be more complex and critical year after year.<\/p>\n<p>We also should reimagine our security frameworks. It\u2019s not just technologies or processes, but entire strategies for cybersecurity and resilience. Modernized, forward-thinking metrics are needed to properly measure security efficacy. If we can\u2019t tell ourselves\u2014let alone our C-suite colleagues and our board members\u2014whether our efforts are actually working, we\u2019re lost.<\/p>\n<p>Finally, <a href=\"\/resources\/datasheets\/unit42-managed-detection-and-response\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:when-it-comes-to-cyber-resilience-and-ai: parbase:what we need to do\">our threat response<\/a> has to be faster, more automated, more intelligent, and more contextdriven than ever. Do we want to chase down every alert as though it represented a direct threat to our survival or handle each alert with the same gravity?<\/p>\n<h2>AI Changes How We Do Security<\/h2>\n<p>The best way to understand what AI can do for our adversaries and our customers is to actually get your hands around it. We\u2019ve been engineering AI into our products at Palo Alto Networks for more than a decade. AI provides a tremendous boost for us\u2014both as a leading cybersecurity technology partner and as a large potential point of attack for criminals\u2014in several ways.<\/p>\n<p>It helps us and our customers supercharge security teams to be more effective and efficient\u2014a musthave capability as the pace of change in security threats accelerates. It also helps organizations block sophisticated attacks without human intervention.<\/p>\n<p>In order to do this, organizations must:<\/p>\n<ul>\n<li><b>Capture and manage the right data.<\/b> Having a ton of data isn\u2019t necessarily the answer; you need relevant, contextually appropriate data in order to make the most of AI for cybersecurity.<\/li>\n<li><b><a href=\"\/why-paloaltonetworks\/platformization\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:when-it-comes-to-cyber-resilience-and-ai: parbase:ai changes how we do security\">Adopt a platform approach<\/a>.<\/b> Again, \u201cmore technology\u201d isn\u2019t what we should be after. Instead, that technology should be engineered and deployed in a way that breeds efficiency, intelligence, and quick reaction\u2014not just a bunch of disparate tools stitched together.<\/li>\n<li><b>Exploit deep expertise.<\/b> That expertise must be in the form of human intelligence and, of course, artificial intelligence. The AI component is becoming clearer each day to CISOs, CIOs, and their business-side colleagues. But the human intelligence remains critical, and is unleashed from mundane tasks and drudge work by AI-driven automation tools that help our smart and dedicated staff do things that until recently seemed, well, unimaginable.<\/li>\n<\/ul>\n<p>We also should reimagine our security frameworks. It\u2019s not just technologies or processes, but entire strategies for cybersecurity and resilience. Modernized, forward-thinking metrics are needed to properly measure security efficacy. If we can\u2019t tell ourselves\u2014let alone our C-suite colleagues and our board members\u2014whether our efforts are actually working, we\u2019re lost.<\/p>\n<p>Finally, <a href=\"\/resources\/datasheets\/unit42-managed-detection-and-response\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:when-it-comes-to-cyber-resilience-and-ai: parbase:ai changes how we do security\">our threat response<\/a> has to be faster, more automated, more intelligent, and more contextdriven than ever. Do we want to chase down every alert as though it represented a direct threat to our survival or handle each alert with the same gravity?<\/p>\n<h2>Call to Action: An Executive Checklist for Deploying AI for Cyber Resilience<\/h2>\n<p>I like to think and act in a way that gives my colleagues and my teams real actionable steps to address problems and exploit opportunities. My very inelegant way of explaining that is, \u201cSo what?\u201d<\/p>\n<p>I\u2019ve just taken a few minutes of your day to give context to a problem I know you all live around the clock and to offer perspectives on why this needs to be addressed. Now, I\u2019ll give you my \u201cso what\u201d ideas on what your organization can do in using AI effectively and safely for cyber resilience.<\/p>\n<p><b>Step 1:<\/b> Document all your internal AI risks. This may be the one area where stretching your imagination may be the hardest to accomplish, but will pay the biggest dividends in cyber resilience. It\u2019s extremely difficult to account for all internal AI risks without a detailed methodology to handle this, and for everyone\u2019s buy-in. For instance, I imagine everyone reading this is using LLMs. But are you ensuring that you don\u2019t let public LLMs access your source code?<\/p>\n<p><b>Step 2:<\/b> Know the ins and outs of AI data. Do you know which browser plugins or tools use AI? Are you aware that Grammarly reads all emails using AI? (These are not rhetorical questions.)<\/p>\n<p><b>Step 3:<\/b> Develop an external register of AI risks. For instance, where does the Zoom AI meeting summary go? Does the HR chatbot have access to salary or health information? If you don\u2019t know, find out fast.<\/p>\n<p><b>Step 4:<\/b> Catalog all the AI services your enterprise should and should not be using. Creating this database is essential, but it doesn\u2019t stop there. How do you keep it up to date? After all, this is not a static asset.<\/p>\n<p><b>Step 5:<\/b> Develop an organization-wide AI policy. For all you weekend do-it-yourselfers, think of AI like a chainsaw. It\u2019s a great tool, but when it\u2019s not used properly, it can be incredibly dangerous. Everyone in your organization should understand what they can and can\u2019t do with AI, and why.<\/p>\n<p><b>Step 6:<\/b> Partner with a trusted cybersecurity leader. Your tools are only as good as the technology partners behind them. As I mentioned earlier, deploying an AI-enabled platform based on the principle of \u201cSimplify, Integrate, Scale\u201d for your AI usage is a smart bet.<\/p>\n<p>Frank Borman\u2019s prescient advice to the US space community more than 50 years ago took hold. The National Aeronautics and Space Administration (NASA) completely reimagined their definition and strategy toward risk, as well as the tools, systems, and philosophies they used to fight and defeat risk.<\/p>\n<p>We can all do the same with our strategic and innovative use of AI to create a more cyber-resilient mindset, and to fight off smarter attackers and a higher-stakes set of threat vectors.<\/p>\n<p>Let\u2019s just hope it doesn\u2019t take a tragedy on the scale of Apollo 1 to force us to use our imaginations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>6 practical steps to enhance cyber resilience and combat threats.<\/p>\n","protected":false},"author":1,"featured_media":350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,15],"tags":[],"coauthors":[42],"class_list":["post-65","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination - Perspectives<\/title>\n<meta name=\"description\" content=\"6 practical steps to enhance cyber resilience and combat threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination - Perspectives\" \/>\n<meta property=\"og:description\" content=\"6 practical steps to enhance cyber resilience and combat threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-26T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T12:38:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1889\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Haider Pasha\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination\",\"datePublished\":\"2024-06-26T00:00:00+00:00\",\"dateModified\":\"2025-02-19T12:38:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\"},\"wordCount\":1702,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg\",\"articleSection\":[\"AI\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\",\"name\":\"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg\",\"datePublished\":\"2024-06-26T00:00:00+00:00\",\"dateModified\":\"2025-02-19T12:38:35+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"6 practical steps to enhance cyber resilience and combat threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg\",\"width\":1889,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination - Perspectives","description":"6 practical steps to enhance cyber resilience and combat threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/","og_locale":"en_US","og_type":"article","og_title":"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination - Perspectives","og_description":"6 practical steps to enhance cyber resilience and combat threats.","og_url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/","og_site_name":"Perspectives","article_published_time":"2024-06-26T00:00:00+00:00","article_modified_time":"2025-02-19T12:38:35+00:00","og_image":[{"width":1889,"height":1000,"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg","type":"image\/jpeg"}],"author":"Haider Pasha","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination","datePublished":"2024-06-26T00:00:00+00:00","dateModified":"2025-02-19T12:38:35+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/"},"wordCount":1702,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg","articleSection":["AI","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/","name":"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg","datePublished":"2024-06-26T00:00:00+00:00","dateModified":"2025-02-19T12:38:35+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"6 practical steps to enhance cyber resilience and combat threats.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2024\/06\/when-it-comes-to-cyber-resilience-and-ai.jpg","width":1889,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/when-it-comes-to-cyber-resilience-and-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/"},{"@type":"ListItem","position":2,"name":"When It Comes to Cyber Resilience and AI, Be Sure to Stretch the Limits of Your Imagination"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/65","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":2,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/65\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/65\/revisions\/354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media\/350"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media?parent=65"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/categories?post=65"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/tags?post=65"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/coauthors?post=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}