Get to know # Josh Zelonis Field CTO, Cortex, Palo Alto Networks *** ** * ** *** Blogs by Josh Zelonis Sort By: Recent Recent Popular *** ** * ** *** [![How to Deal with HAFNIUM-Like Internet Emergencies](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/04/Picture1.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/how-to-deal-with-hafnium-like-internet-emergencies/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ### [How to Deal with HAFNIUM-Like Internet Emergencies](https://www2.paloaltonetworks.com/blog/security-operations/how-to-deal-with-hafnium-like-internet-emergencies/) In this blog, we'll explore three major internet emergencies and how each of these issues has created a mandate for external attack surface management (EASM). Apr 18, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![Understanding Drift In Your Internet Attack Surface](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/04/Gazing-1.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/understanding-drift-in-your-internet-attack-surface/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ### [Understanding Drift In Your Internet Attack Surface](https://www2.paloaltonetworks.com/blog/security-operations/understanding-drift-in-your-internet-attack-surface/) Your footprint on the internet is constantly changing, both expanding and contracting. Understand the imperative that has led to over 1.5 billion dollars in security acquisitions in the past few years. Apr 06, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![Can’t I Just Do Attack Surface Discovery With Shodan?](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/02/Thinking-LI.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cant-i-just-do-attack-surface-discovery-with-shodan/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ### [Can't I Just Do Attack Surface Discovery With Shodan?](https://www2.paloaltonetworks.com/blog/security-operations/cant-i-just-do-attack-surface-discovery-with-shodan/) Open tools require you to trade speed for accuracy and data completeness which hampers your ability to use them effectively to solve attack surface management (ASM) objectives. Feb 02, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![Empower Your Security Team With Cortex](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/01/Woman-Working-at-Computer.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cortex-empowers-security-teams/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ### [Empower Your Security Team With Cortex](https://www2.paloaltonetworks.com/blog/security-operations/cortex-empowers-security-teams/) Learn how Palo Alto Networks is working to empower your security team by shifting technology left so humans can focus on later parts of the cyberattack lifecycle Jan 26, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![Building a Security Data Strategy Requires Purpose](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/01/In-All-Seriousness-3.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/building-a-security-data-strategy-requires-purpose/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ### [Building a Security Data Strategy Requires Purpose](https://www2.paloaltonetworks.com/blog/security-operations/building-a-security-data-strategy-requires-purpose/) Develop a strategy tying your SOC processes to specific objectives from the data you collect, how it is used for detection, and how your organization responds to detections. Jan 19, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** Load more *** ** * ** *** Blogs by Josh Zelonis Sort By: Popular Popular Recent *** ** * ** *** [![Moving Beyond Traditional EDR](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/10/Cortex-XDR-Future-EDR-blog-400x300-1.png)](https://www2.paloaltonetworks.com/blog/2020/10/secops-beyond-traditional-edr/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) ### [Moving Beyond Traditional EDR](https://www2.paloaltonetworks.com/blog/2020/10/secops-beyond-traditional-edr/) Traditional EDR lays the foundation for protecting organizations, but addressing today's security challenges requires the unified view provided by XDR Oct 28, 2020 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![Empower Your Security Team With Cortex](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/01/Woman-Working-at-Computer.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cortex-empowers-security-teams/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ### [Empower Your Security Team With Cortex](https://www2.paloaltonetworks.com/blog/security-operations/cortex-empowers-security-teams/) Learn how Palo Alto Networks is working to empower your security team by shifting technology left so humans can focus on later parts of the cyberattack lifecycle Jan 26, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![EDR Security | Move Beyond Traditional Endpoint Detection and Response](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Woman-Smiling.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/edr-security-move-beyond-traditional-endpoint-detection-and-response/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ### [EDR Security | Move Beyond Traditional Endpoint Detection and Response](https://www2.paloaltonetworks.com/blog/security-operations/edr-security-move-beyond-traditional-endpoint-detection-and-response/) Traditional EDR security lays the foundation for protecting organizations, but addressing today's security challenges requires the unified view provided by XDR May 18, 2021 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![Data Expertise Is the Foundation of Good Threat Detection](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/07/Hmmmm-2.jpg)](https://www2.paloaltonetworks.com/blog/2022/07/the-foundation-of-good-threat-detection/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ### [Data Expertise Is the Foundation of Good Threat Detection](https://www2.paloaltonetworks.com/blog/2022/07/the-foundation-of-good-threat-detection/) When relying on a product's threat protection, understand the types of log data the technology leverages for threat detection and outcomes for them. Jul 13, 2022 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** [![You Need an Enabler](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/01/Young-Man.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/you-need-an-enabler/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ### [You Need an Enabler](https://www2.paloaltonetworks.com/blog/security-operations/you-need-an-enabler/) ASM products are so focused on mapping out your attack surface that it seems they forgot that someone has to manage it. You Need An Enabler. Jan 11, 2023 By [Josh Zelonis](https://www.paloaltonetworks.com/blog/author/josh-zelonis/?ts=markdown "Posts by Josh Zelonis") *** ** * ** *** Load more {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language