Page 33 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 33

When  it  comes  to  detecting  and  preventing  truly  unknown  threats,  legacy  strategies  and
                   technology  isolate  threat  data  each  organization  receives  and  generates,  creating  silos  and
                   reducing the  possibility of  prevention.  To meet the  requirements  of the final  stage  of the  IoT
                   security lifecycle, security teams need new capabilities and insights that draw from crowdsourced
                   threat  intelligence.  This  last  step  will  also  uncover  potential  threats  missed  in  earlier  stages
                   thereby creating a cyclical process for continual improvement.



            To learn more about IoT security best practices, read The Enterprise Buyer’s Guide to IoT Security, from
            Palo Alto Networks.





            About the Author

            Mitchell  Bezzina  is  the  technology  team  leader with  over  19 years  of
            experience in information security and endpoint forensics. Over the past
            five  years  he  has  been  focused  on  bringing  new  cybersecurity
            technologies and services to market.  In 2018 he drove the XDR market
            revolution and industry creation while helping release Cortex XDR, the
            first  product  in this  space.   Mitchell  is  currently focused  on  emerging
            technologies like IoT Security and new innovations in Cloud-delivered
            Security Subscriptions.

            Mitchell     Bezzina      can      be      reached      online      at
            [email protected]  and  at  our  company  website
            https://www.paloaltonetworks.com/

































                                                                                                              33
   28   29   30   31   32   33   34   35   36   37   38