{"id":4898,"date":"2026-03-08T06:00:00","date_gmt":"2026-03-08T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=4898"},"modified":"2026-03-09T09:27:16","modified_gmt":"2026-03-09T16:27:16","slug":"from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/","title":{"rendered":"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience"},"content":{"rendered":"\n<p>When a CISO is invited into a board meeting, oftentimes, the lights dim, a scary heatmap of thwarted attacks appears on the screen, and the Audit Committee asks something like: \u201cAre we safe?\u201d<\/p>\n\n\n\n<p>It is a necessary ritual, but it is also, frankly, a waste of an asset.<\/p>\n\n\n\n<p>While the board obsesses over the perimeter, they ignore the fact that a mature, unified security platform is sitting on a goldmine of business intelligence. And because it sits at the intersection of every user, every application and every data stream, the security platform is the only system that sees an organization\u2019s behavior.<\/p>\n\n\n\n<p>If you stop looking at your security stack as a shield and start treating it as a sensor, it reveals three critical truths about your business that some CFOs and COOs might be missing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. True Velocity of Innovation \u2014 And What\u2019s Destroying It<\/h2>\n\n\n\n<p>Let\u2019s admit it: Every CEO believes their organization is agile. After all, they have the numbers, personnel and slide decks to prove it. But the security platform holds the data on the real friction within the machinery.<\/p>\n\n\n\n<p>Consider the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/06\/genais-impact-surging-adoption-rising-risks\/\">shadow AI<\/a> phenomenon. We know that <strong>78% of enterprises<\/strong> are actively using\u00a0AI.<sup><a href=\"#foot-note\">1<\/a><\/sup> Yet, only <strong>6% have a mature strategy<\/strong> for it.<sup><a href=\"#foot-note\">2<\/a><\/sup> A traditional view sees this as a risk to block.<\/p>\n\n\n\n<p>A platform view sees this as market research.<\/p>\n\n\n\n<p>When a <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/the-year-ahead-what-will-become-the-3-pillars-of-trust-in-an-ai-first-world\/\">unified security platform<\/a> correlates web traffic with endpoint activity, it does more than catch malware. It maps user intent and reveals which AI tools your developers are smuggling into their workflows to write code faster. Plus, it shows which large language models your marketing team is using to bypass agency costs.<\/p>\n\n\n\n<p>This behavior goes beyond a simple compliance violation. It marks a signal of unmet demand. The platform reveals where your employees are desperate to innovate but are underserved by corporate IT. Also, it reveals the \u201cdrag coefficients\u201d \u2014 the specific policy bottlenecks where compliant projects go to die.<\/p>\n\n\n\n<p>A CISO looking at this data can tell the board: \u201cWe aren\u2019t losing speed because of hackers. We\u2019re losing speed because our architecture forces our smartest people to work in the dark.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. The \u201cInterest Rate\u201d on Your Technical Debt<\/h2>\n\n\n\n<p>In mergers and acquisitions, due diligence is typically a financial and legal colonoscopy. Analysts scour the books for hidden liabilities. But they rarely check the \u201ccyber balance sheet,\u201d which is where the concept of <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/beyond-the-backlog-escaping-application-security-debt-with-aspm\/\">security debt<\/a> moves from a metaphor to a metric.<\/p>\n\n\n\n<p>The average enterprise is currently stitching together <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/01\/growing-need-cybersecurity-platformization\/#:~:text=Businesses%20are%20facing%20a%20significant,streamlined%20and%20effective%20is%20real.\">83 different security tools from 29 vendors<\/a>. In a fragmented state, this is just \u201cIT clutter.\u201d But through the lens of a unified platform, this fragmentation reveals the organization\u2019s operational fragility.<\/p>\n\n\n\n<p>A platform audit acts like an MRI for M&amp;A risk. It quantifies the cost of complexity. It reveals how many hours are wasted manually correlating data between incompatible systems. It exposes the \u201cinterest payments\u201d the company is making in the form of high turnover (burnout) and slow remediation times.<\/p>\n\n\n\n<p>If you are acquiring a company, you\u2019re buying their revenue and you\u2019re inheriting their architecture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. The Reality of Resilience<\/h2>\n\n\n\n<p>Recent research from Unit 42 shows that agentic AI can compress what was once a multiday ransomware campaign into roughly <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/05\/unit-42-develops-agentic-ai-attack-framework\/\">25 minutes<\/a>. This security statistic is terrifying, but it\u2019s also a profound operational metric. It reveals that the speed of business disruption now exceeds the speed of human reaction.<\/p>\n\n\n\n<p>A mature platform is perhaps the truest tangible way to measure the resilience of your revenue streams. By correlating uptime data with threat activity, the platform provides a real-time view of <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/better-security-outcomes-start-in-the-boardroom-why-platformization-is-essential\/#:~:text=AI%20and%20the%20Evolution%20of%20Security%20Operations,-One%20of%20the&amp;text=Palo%20Alto%20Networks%20alone%20blocks,of%20an%20organization's%20security%20landscape.\">business continuity risk<\/a>. It moves the metric from mean time to detect (a technical stat) to revenue at risk per minute (a business stat).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Pivot from Cost Center to Growth Engine<\/h2>\n\n\n\n<p>The data required to steer a modern enterprise through the AI economy is already flowing through your SOC. But because we have mentally siloed security as \u201cprotection,\u201d we treat this data as exhaust \u2014 something to be analyzed for threats and then discarded.<\/p>\n\n\n\n<p>The CISO of 2026 is not just the Chief \u201cNo\u201d Officer. If they are leveraging a mature, unified platform, they are also the keeper of their organization\u2019s data fabric. They know which departments are innovating, which processes are broken, and where the next acquisition target is hiding their skeletons.<\/p>\n\n\n\n<p>The question the board should ask is no longer \u201cAre we safe?\u201d It is: \u201cWhat does the security data tell us about who we are?\u201d Only the right questions can lead to the right solutions.\u00a0<\/p>\n\n\n\n<p>Curious about what else Ben has to say? Check out his other articles on <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/author\/ben-hasskamp\/\">Perspectives<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" id=\"foot-note\"\/>\n\n\n\n<p class=\"has-small-font-size\"><sup>1<\/sup>\u201c<a href=\"https:\/\/www.hostinger.com\/tutorials\/how-many-companies-use-ai\">How many companies use AI in 2026? Key statistics and industry trends<\/a>,\u201d Hostinger, January 13, 2026.<br><sup>2<\/sup>\u201c<a href=\"https:\/\/kpmg.com\/us\/en\/media\/news\/kpmg-generative-ai-2023.html\">KPMG U.S. survey: Executives expect generative AI to have enormous impact on business, but unprepared for immediate adoption<\/a>\u201d, KPMG, June 2023.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is not a shield. It is a sensor for business velocity.<\/p>\n","protected":false},"author":7,"featured_media":4900,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,20,21],"tags":[],"coauthors":[183],"class_list":["post-4898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-business-transformation","category-cyber-as-a-boardroom-topic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience - Perspectives<\/title>\n<meta name=\"description\" content=\"Security is not a shield. It is a sensor for business velocity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Security is not a shield. It is a sensor for business velocity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-08T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T16:27:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Hasskamp\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\"},\"author\":{\"name\":\"Ben Hasskamp\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\"},\"headline\":\"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience\",\"datePublished\":\"2026-03-08T13:00:00+00:00\",\"dateModified\":\"2026-03-09T16:27:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\"},\"wordCount\":814,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg\",\"articleSection\":[\"AI\",\"Business Transformation\",\"Cyber as a Boardroom Topic\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\",\"name\":\"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg\",\"datePublished\":\"2026-03-08T13:00:00+00:00\",\"dateModified\":\"2026-03-09T16:27:16+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\"},\"description\":\"Security is not a shield. It is a sensor for business velocity.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917\",\"name\":\"Ben Hasskamp\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Ben Hasskamp\"},\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/bhasskamp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience - Perspectives","description":"Security is not a shield. It is a sensor for business velocity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience - Perspectives","og_description":"Security is not a shield. It is a sensor for business velocity.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/","og_site_name":"Perspectives","article_published_time":"2026-03-08T13:00:00+00:00","article_modified_time":"2026-03-09T16:27:16+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg","type":"image\/jpeg"}],"author":"Ben Hasskamp","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/"},"author":{"name":"Ben Hasskamp","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917"},"headline":"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience","datePublished":"2026-03-08T13:00:00+00:00","dateModified":"2026-03-09T16:27:16+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/"},"wordCount":814,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg","articleSection":["AI","Business Transformation","Cyber as a Boardroom Topic"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/","name":"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg","datePublished":"2026-03-08T13:00:00+00:00","dateModified":"2026-03-09T16:27:16+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917"},"description":"Security is not a shield. It is a sensor for business velocity.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/02\/New-Economics-of-Cyber-Resilience-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/from-insurance-policy-to-growth-engine-the-new-economics-of-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"From Insurance Policy to Growth Engine: The New Economics of Cyber Resilience"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/23c0a559114fafbbe5a2bba90d5d6917","name":"Ben Hasskamp","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Ben Hasskamp"},"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/bhasskamp\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=4898"}],"version-history":[{"count":2,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4898\/revisions"}],"predecessor-version":[{"id":4917,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4898\/revisions\/4917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/4900"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=4898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=4898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=4898"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=4898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}