{"id":4521,"date":"2026-01-05T06:00:00","date_gmt":"2026-01-05T14:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=4521"},"modified":"2026-01-05T09:07:07","modified_gmt":"2026-01-05T17:07:07","slug":"ai-cybersecurity-strategy-hard-choices-for-tech-leaders","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/","title":{"rendered":"Your 2026 AI Cybersecurity Strategy: Breaking Down the Hard Choices for Tech Leaders"},"content":{"rendered":"\n<p>A CIO\u2019s or CFO\u2019s ledger has a fundamental, if unspoken, equation: Resources must, at a minimum, match the scale of the risk. For 2026, however, this equation doesn\u2019t work. Today\u2019s AI supercharges and scales threats, which are multiplying at a rate no technology has ever seen. Meanwhile, many cybersecurity budgets remain stubbornly linear, forcing a series of hard choices about where to invest, what to automate and which risks to accept.<\/p>\n\n\n\n<p>We\u2019ve seen the effects of AI as a massive force multiplier for both attackers and defenders. It both accelerates the pace of attacks and promises new forms of automated defense. For leaders, the real test is how strategically they invest in AI to get the greatest return on security.<\/p>\n\n\n\n<p>This ambiguity \u2014 where risk and new technology collide \u2014 is familiar territory for <a href=\"https:\/\/www.forbes.com\/sites\/marksettle\/\">Mark Settle<\/a>. A seven-time CIO (most recently at Okta), an author and an advisor, he guides technology leaders through multiple cycles of disruption, from moving to the cloud to the pressures of downsizing.<\/p>\n\n\n\n<p>I sat down with Mr. Settle to discuss these critical tradeoffs. He reflected on the practical choices security and tech leaders must make as they plan for this new landscape. His insights offer a clear-eyed view for any leader tasked with managing exponential risk with finite resources.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How worried should we be about the pace of innovation on the offensive side of cybersecurity?<\/h4>\n\n\n\n<p>It cuts both ways. AI clearly creates new threat opportunities, but it\u2019s also the latest automation tool, after years of automating in cybersecurity. Many CISOs will tell you that criminals don\u2019t need AI yet, because people still make the same mistakes, like clicking on bad links, reusing weak passwords and leaving the door open. In that sense, attackers are still winning the old-fashioned way.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Security threats are multiplying, but budgets aren\u2019t keeping pace. How should tech leaders think about that tension as they approach planning for next year?<\/h4>\n\n\n\n<p>That\u2019s the reality they face. You can\u2019t defend on every front at once, and you can\u2019t expect headcount or budgets to suddenly expand. What you can do is recognize that the landscape itself is shifting \u2014 through vendor consolidation, category convergence and AI capabilities getting embedded into larger platforms.<\/p>\n\n\n\n<p>If you step back and look a bit beyond one budgeting cycle, those secular changes create opportunities to simplify and focus.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What are the biggest opportunities you see?<\/h4>\n\n\n\n<p>If I were going into a budget exercise for next year, I\u2019d be looking at three things.&nbsp;<\/p>\n\n\n\n<p>The first one is consolidation. Everybody complains about the size and complexity of their security tech stack. M&amp;As [mergers and acquisitions] are highly competitive in this space, with major platforms absorbing point solutions. If you look closely, you may find tools you bought two or three years ago that were \u201cmust-haves\u201d then but now overlap with what your primary platform vendor does well. Dropping some of those tools saves real money.<\/p>\n\n\n\n<p>Second, some categories are merging. Take vulnerability management, which used to require two separate tools \u2014 threat intelligence and vulnerability scanning. Now, you have continuous exposure management platforms that marry those together and add business context. You don\u2019t want to be the last person paying for a tool that\u2019s on its way out.<\/p>\n\n\n\n<p>And the third is AI. Every vendor is pushing AI capabilities right now. My advice would be to experiment aggressively, but with an objective. The one that appeals most to me is automation. Use AI to automate away routine work, reduce latency in responding to threats and eliminate some of the headcount pressure.&nbsp;<\/p>\n\n\n\n<p>The reality is that you\u2019re not going to get more people. Rather, you might be told to make cuts, so it\u2019s better to put these tools to work now.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How do you pull that off without falling into the trap of always pursuing every new tool and capability?<\/h4>\n\n\n\n<p>That\u2019s the bigger issue. Do you leverage the AI capabilities your existing vendors are rolling out, or do you also invest in new AI-native products? You can\u2019t really afford to do both, which is where the tradeoff comes in.<\/p>\n\n\n\n<p>My bias is to start with incumbent platforms that their vendors are embedding AI into. You can evaluate their capabilities with your concrete goals. For example, you might ask: Can they automate repetitive tasks? Can they shrink response times? Can they free up people? These areas, I believe, will have the fastest returns.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Once you\u2019ve made those tradeoffs, how do you protect the savings to ensure they\u2019re reinvested in security instead of disappearing into the broader budget?<\/h4>\n\n\n\n<p>If you find ways to cut vendor costs or labor dollars, don\u2019t wait for finance to spend the savings on marketing. Talk to the CFO up front and cut a deal. You might say: \u201cIf I save three dollars, I get to reinvest two dollars into reskilling and cloud security.\u201d That way, you have a gain-share model that lets you reinvest in security instead of losing out on those dollars.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">You\u2019ve talked about automation as the most compelling near-term use case for AI. What happens as AI agents start acting more independently? How does that change your risk calculus?<\/h4>\n\n\n\n<p>I don\u2019t believe it\u2019s here yet, but it\u2019s coming \u2014 and it\u2019s something I\u2019ve been researching closely. In a multiagent world, AI systems will commission actions on behalf of one another, often with little or no human involvement. That raises fundamental questions about authentication. Today, we think about authenticating a person. But what happens when it\u2019s an agent initiating a transaction on behalf of another agent? How do you establish trust at machine speed? That\u2019s going to reshape identity and access management in the next few years, and CIOs and CISOs will need to start preparing for it now.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">As leaders plan for 2026, what\u2019s the biggest change in mindset you would encourage them to make?<\/h4>\n\n\n\n<p>Before leaders become enticed by their existing vendors\u2019 new AI capabilities, they need to learn as much as they can about how cybercriminals are using AI to weaponize the threat vectors that matter most to their companies. They need to focus their AI investments on new defensive capabilities that can blunt those AI-turbocharged threats. Simply put, they need to use AI to fight AI.<\/p>\n\n\n\n<p>If you\u2019re curious about what else is on the horizon for 2026, check out <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/2026-cyber-predictions\">Palo Alto Networks Predictions<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A CIO\u2019s or CFO\u2019s ledger has a fundamental, if unspoken, equation: Resources must, at a minimum, match the scale of the risk. For 2026, however, this equation doesn\u2019t work. Today\u2019s AI supercharges&#8230;<\/p>\n","protected":false},"author":7,"featured_media":4523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,21,15],"tags":[],"coauthors":[183],"class_list":["post-4521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-cyber-as-a-boardroom-topic","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Cybersecurity Strategy: Hard Choices for Tech Leaders<\/title>\n<meta name=\"description\" content=\"Longtime CIO and author Mark Settle shares how leaders can balance AI-driven risks, automation, and shrinking budgets to strengthen defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Cybersecurity Strategy: Hard Choices for Tech Leaders\" \/>\n<meta property=\"og:description\" content=\"Longtime CIO and author Mark Settle shares how leaders can balance AI-driven risks, automation, and shrinking budgets to strengthen defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-05T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-05T17:07:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Hasskamp\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\"},\"author\":{\"name\":\"Ben Hasskamp\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\"},\"headline\":\"Your 2026 AI Cybersecurity Strategy: Breaking Down the Hard Choices for Tech Leaders\",\"datePublished\":\"2026-01-05T14:00:00+00:00\",\"dateModified\":\"2026-01-05T17:07:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\"},\"wordCount\":1089,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg\",\"articleSection\":[\"AI\",\"Cyber as a Boardroom Topic\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\",\"name\":\"AI Cybersecurity Strategy: Hard Choices for Tech Leaders\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg\",\"datePublished\":\"2026-01-05T14:00:00+00:00\",\"dateModified\":\"2026-01-05T17:07:07+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\"},\"description\":\"Longtime CIO and author Mark Settle shares how leaders can balance AI-driven risks, automation, and shrinking budgets to strengthen defenses.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg\",\"width\":1600,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your 2026 AI Cybersecurity Strategy: Breaking Down the Hard Choices for Tech Leaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\",\"name\":\"Ben Hasskamp\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Ben Hasskamp\"},\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/bhasskamp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Cybersecurity Strategy: Hard Choices for Tech Leaders","description":"Longtime CIO and author Mark Settle shares how leaders can balance AI-driven risks, automation, and shrinking budgets to strengthen defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/","og_locale":"en_US","og_type":"article","og_title":"AI Cybersecurity Strategy: Hard Choices for Tech Leaders","og_description":"Longtime CIO and author Mark Settle shares how leaders can balance AI-driven risks, automation, and shrinking budgets to strengthen defenses.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/","og_site_name":"Perspectives","article_published_time":"2026-01-05T14:00:00+00:00","article_modified_time":"2026-01-05T17:07:07+00:00","og_image":[{"width":1600,"height":700,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg","type":"image\/jpeg"}],"author":"Ben Hasskamp","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/"},"author":{"name":"Ben Hasskamp","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917"},"headline":"Your 2026 AI Cybersecurity Strategy: Breaking Down the Hard Choices for Tech Leaders","datePublished":"2026-01-05T14:00:00+00:00","dateModified":"2026-01-05T17:07:07+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/"},"wordCount":1089,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg","articleSection":["AI","Cyber as a Boardroom Topic","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/","name":"AI Cybersecurity Strategy: Hard Choices for Tech Leaders","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg","datePublished":"2026-01-05T14:00:00+00:00","dateModified":"2026-01-05T17:07:07+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917"},"description":"Longtime CIO and author Mark Settle shares how leaders can balance AI-driven risks, automation, and shrinking budgets to strengthen defenses.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/12\/AI-Cybersecurity-Strategy-featured.jpg","width":1600,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/ai-cybersecurity-strategy-hard-choices-for-tech-leaders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Your 2026 AI Cybersecurity Strategy: Breaking Down the Hard Choices for Tech Leaders"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917","name":"Ben Hasskamp","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Ben Hasskamp"},"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/bhasskamp\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=4521"}],"version-history":[{"count":6,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4521\/revisions"}],"predecessor-version":[{"id":4546,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4521\/revisions\/4546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/4523"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=4521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=4521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=4521"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=4521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}