Page 33 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 33
When it comes to detecting and preventing truly unknown threats, legacy strategies and
technology isolate threat data each organization receives and generates, creating silos and
reducing the possibility of prevention. To meet the requirements of the final stage of the IoT
security lifecycle, security teams need new capabilities and insights that draw from crowdsourced
threat intelligence. This last step will also uncover potential threats missed in earlier stages
thereby creating a cyclical process for continual improvement.
To learn more about IoT security best practices, read The Enterprise Buyer’s Guide to IoT Security, from
Palo Alto Networks.
About the Author
Mitchell Bezzina is the technology team leader with over 19 years of
experience in information security and endpoint forensics. Over the past
five years he has been focused on bringing new cybersecurity
technologies and services to market. In 2018 he drove the XDR market
revolution and industry creation while helping release Cortex XDR, the
first product in this space. Mitchell is currently focused on emerging
technologies like IoT Security and new innovations in Cloud-delivered
Security Subscriptions.
Mitchell Bezzina can be reached online at
[email protected] and at our company website
https://www.paloaltonetworks.com/
33