{"id":1527,"date":"2025-02-24T13:22:44","date_gmt":"2025-02-24T13:22:44","guid":{"rendered":"https:\/\/develop.paloaltonetworks.com\/perspectives\/?p=1527"},"modified":"2025-06-03T13:05:54","modified_gmt":"2025-06-03T20:05:54","slug":"your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/","title":{"rendered":"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role?"},"content":{"rendered":"\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/www.paloaltonetworks.com\/perspectives\/wp-content\/uploads\/2025\/02\/Perspectives-Podcasts-5.wav\"><\/audio><\/figure>\n\n\n\n<p>Artificial intelligence has become a defining force in reshaping industries, from healthcare to finance to logistics. But perhaps nowhere is AI\u2019s transformative potential \u2014&nbsp;and its inherent peril \u2014&nbsp;more apparent than in the field of cybersecurity. It is here that AI has emerged as both a shield and a sword in the silent but unrelenting war against cyber adversaries.&nbsp;<\/p>\n\n\n\n<p>Yet, as organizations rush to embrace AI as the cornerstone of their cybersecurity strategies, a critical question looms: Are we truly ready to harness its power effectively, or are we inadvertently creating vulnerabilities as quickly as we close them?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A New Arsenal for Defenders<\/strong><\/h2>\n\n\n\n<p>AI\u2019s capabilities are breathtaking in their speed and precision. Generative AI (GenAI) models, once praised for their ability to create human-like text, are now integral to threat detection, quickly analyzing oceans of data to flag suspicious behavior.<sup>1<\/sup> Predictive AI, with its knack for identifying patterns, scans the horizon for potential vulnerabilities, while causal AI examines the interplay of factors that might indicate a brewing threat.<\/p>\n\n\n\n<p>At Palo Alto Networks, we\u2019ve developed <a href=\"https:\/\/www.paloaltonetworks.com\/precision-ai-security\">Precision AI<\/a>, a sophisticated proprietary system that blends multiple forms of GenAI, machine learning, and deep learning. Precision AI predicts and blocks attacks in real time, evolving alongside adversaries. It is a solution that promises not just to defend but to preempt \u2014&nbsp;an essential capability in a world where the velocity of threats is matched only by their variety.<\/p>\n\n\n\n<p>For CISOs and cybersecurity teams, these tools are a lifeline. Faced with growing attack surfaces and limited resources, AI offers a way to extend their reach, automate repetitive tasks, and focus on high-priority threats. It\u2019s a force multiplier for overtaxed teams, capable of addressing the challenges of alert fatigue and integrating seamlessly into broader cybersecurity platforms.<\/p>\n\n\n\n<p>But even as defenders celebrate these advances, adversaries are not sitting idle. They, too, have access to many of these same technologies \u2014&nbsp;often at shockingly low costs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>AI in the Hands of Adversaries<\/strong><br><\/h2>\n\n\n\n<p>On the dark web, the democratization of AI has given cybercriminals a new arsenal. It is now routine for attackers to deploy AI to probe defenses, exploit vulnerabilities, and embed sophisticated exploits that evade detection for weeks. The tools once reserved for innovators and well-funded nation-state actors are now being wielded by even novice bad actors, who use GenAI to craft convincing phishing campaigns or create deepfakes that mimic corporate executives.<\/p>\n\n\n\n<p>The numbers are sobering. According to Gartner, AI-driven malicious attacks ranked as the top emerging risk for three consecutive quarters in 2024.<sup>2<\/sup> Meanwhile, 57% of cybersecurity professionals believe adversaries already have an edge in leveraging AI to their advantage.<sup>3<\/sup><\/p>\n\n\n\n<p>This stark reality raises an uncomfortable truth: The same technology that fortifies defenses also accelerates attacks. The race is no longer about who can build the better firewall, but who can outthink and outpace their opponent in an escalating game of digital chess.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Strategic Implications for Organizations<\/strong><\/h2>\n\n\n\n<p>For organizations, the implications are clear. AI cannot remain an isolated tool or a standalone product; it must become a foundational element of cybersecurity strategy. And that strategy must shift from responsive to proactive \u2014&nbsp;a change in mindset as much as in methodology.<\/p>\n\n\n\n<p>To achieve this, organizations need to confront several challenges:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Targeted Investment over Spending Sprees<\/strong><strong><br><\/strong>The solution isn\u2019t simply to throw money at AI tools. Instead, organizations must focus on investments that directly counter adversaries\u2019 tactics, such as adopting <a href=\"https:\/\/www.paloaltonetworks.com\/zero-trust\">Zero Trust <\/a>models, fortifying infrastructure, and bolstering security with <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/security-subscriptions\">cloud-delivered security services<\/a>.<\/li>\n\n\n\n<li><strong>Integration, Not Isolation<\/strong><strong><br><\/strong>AI\u2019s potential is maximized when integrated into broader cybersecurity platforms that simplify and unify defenses. As cybersecurity grows more complex, platformization becomes essential to reduce risk, improve efficiency, and achieve better security outcomes.<\/li>\n\n\n\n<li><strong>Operationalizing AI for Real-Time Resilience<\/strong><\/li>\n<\/ol>\n\n\n\n<p>AI must move beyond theoretical potential and become an operationalized component of daily cybersecurity workflows. This includes automating threat detection, response, and remediation while aligning AI-driven insights with business continuity plans.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Do We Win?<\/strong><\/h2>\n\n\n\n<p>The future of cybersecurity will not be won by those who simply adopt AI, but by those who embed it into their core strategy. And the urgency to do this has never been greater. In a world where adversaries evolve at the speed of innovation, complacency is not an option.<\/p>\n\n\n\n<p>AI\u2019s greatest strength lies in its duality. It is capable of uncovering vulnerabilities and preempting threats with unprecedented precision. As defenders race to integrate AI into their strategies, adversaries are wielding it just as effectively. The organizations that succeed in this digital arms race will be those that view AI not as a tool but as a unifying force across their security platforms, business practices, and leadership priorities.&nbsp;<\/p>\n\n\n\n<p>Therefore, this action calls for more than investment; it demands a bold and provocative vision. Boards and executives must champion AI as a cornerstone of their cybersecurity strategies, ensuring it is seamlessly integrated into the fabric of the organization. The goal is not just to mitigate risk but to ensure adaptability as the ultimate defense.<br>To read more about what Anand has to say, check out his additional articles <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/anand-oswal\/\">here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-small-font-size\"><strong>Footnotes<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"has-small-font-size\">\u201cGenerative AI in Cybersecurity: An Optimistic but Uncertain Future,\u201d Enterprise Strategy Group, April 2024.<\/li>\n\n\n\n<li class=\"has-small-font-size\">\u201cGartner Survey Shows AI-Enhanced Malicious Attacks as Top Emerging Risk for Enterprises for Third Consecutive Quarter,\u201d Gartner, November 2024.<\/li>\n\n\n\n<li class=\"has-small-font-size\">\u201cThe Life and Times of Cybersecurity Professionals, Volume VII,\u201d Enterprise Strategy Group, November 2024.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.<\/p>\n","protected":false},"author":2,"featured_media":2340,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,20],"tags":[],"coauthors":[13],"class_list":["post-1527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-business-transformation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Cybersecurity Strategies Need to Change: How Can AI Play a Role? - Perspectives<\/title>\n<meta name=\"description\" content=\"AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role? - Perspectives\" \/>\n<meta property=\"og:description\" content=\"AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T13:22:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T20:05:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"839\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anand Oswal\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\"},\"author\":{\"name\":\"Avinash\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7\"},\"headline\":\"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role?\",\"datePublished\":\"2025-02-24T13:22:44+00:00\",\"dateModified\":\"2025-06-03T20:05:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\"},\"wordCount\":904,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg\",\"articleSection\":[\"AI\",\"Business Transformation\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\",\"name\":\"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role? - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg\",\"datePublished\":\"2025-02-24T13:22:44+00:00\",\"dateModified\":\"2025-06-03T20:05:54+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7\"},\"description\":\"AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg\",\"width\":1920,\"height\":839},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7\",\"name\":\"Avinash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Avinash\"},\"description\":\"Lorem Ipsum is simply dummy text of the printing and typesetting industry.\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/akonangi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role? - Perspectives","description":"AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/","og_locale":"en_US","og_type":"article","og_title":"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role? - Perspectives","og_description":"AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/","og_site_name":"Perspectives","article_published_time":"2025-02-24T13:22:44+00:00","article_modified_time":"2025-06-03T20:05:54+00:00","og_image":[{"width":1920,"height":839,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg","type":"image\/jpeg"}],"author":"Anand Oswal","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/"},"author":{"name":"Avinash","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"headline":"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role?","datePublished":"2025-02-24T13:22:44+00:00","dateModified":"2025-06-03T20:05:54+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/"},"wordCount":904,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg","articleSection":["AI","Business Transformation"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/","name":"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role? - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg","datePublished":"2025-02-24T13:22:44+00:00","dateModified":"2025-06-03T20:05:54+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"description":"AI is reshaping cybersecurity \u2013\u00a0how to harness its power effectively.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role-1920-1.jpg","width":1920,"height":839},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/your-cybersecurity-strategies-need-to-change-how-can-ai-play-a-role\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Your Cybersecurity Strategies Need to Change: How Can AI Play a Role?"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7","name":"Avinash","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Avinash"},"description":"Lorem Ipsum is simply dummy text of the printing and typesetting industry.","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/akonangi\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/1527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=1527"}],"version-history":[{"count":25,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/1527\/revisions"}],"predecessor-version":[{"id":3222,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/1527\/revisions\/3222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/2340"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=1527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=1527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=1527"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=1527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}