A graphic containing the words “Zero Trust”.

There are two truths about Zero Trust, it’s a fundamental architectural approach to securing an environment, and no one really understands it. I absolutely share the blame here because in my time at Forrester we tried to map everything to Zero Trust to the point we even had to create…


Do you trust your Endpoint Detection and Response (EDR) Vendor to modify your network infrastructure? …I’ll hold your beer while you think about it.

Mosquito trapped in amber, a reference to the movie Jurassic Park.

“Your Scientists Were So Preoccupied With Whether They Could…”

EDR is an interesting place to begin exploration into what automated response capabilities we should expect from Extended Detection and Response (XDR), especially as there’s so…


The MITRE ATT&CK Evaluation is published as a scientific data set to enable you to interpret information about specific products such as their product strategy and efficacy. A consequence of this is that it also opens the possibility for marketers to run wild with claims of having “won” the evaluation.


Business strategy regarding cybersecurity risk management is something that can feel rightly infuriating as a cyber professional, especially in the post-mortem from a breach. In this blog, I’m going to attempt to explain why cybersecurity risk is different from common types of risk we’re familiar with, why market valuation is…


Concentric ripples on a pond showing interaction with the surface of the water.
Photo by Snappy Shutters on Unsplash

The concept of Indicators of Consequent is something familiar to some, but impacts detection engineering efforts in a way that I think requires a level of formality by adding this to our collective understanding of detection. I’ll introduce the subject with a metaphor of planetary discovery. In the 1840’s, astronomers…


An image of pressure gages entitled “Under Pressure” which aligns to the title and article.
“Under Pressure” by Éole is licensed under CC BY-NC-SA 2.0

In 2014, while I was busy founding an EDR startup, I was regularly challenged with two pieces of critical feedback while speaking to prospects and investors. First, I was told there was no room for a second endpoint agent in an enterprise environment; that organizations simply wouldn’t accept the management…


An interesting question I’ve been asked throughout my career is how to calculate the return on a cybersecurity investment. For a vendor to be able to show their offering actually saves the client money over time is like grabbing the brass ring on your favorite carousel. This challenge isn’t limited…


It’s been almost a month since I joined Palo Alto Networks and now that I’m settled in, I felt it was time for me to kick off my new blog… and what better start then sharing the story of why I felt it was time for me to go to…

Josh Zelonis

Josh Zelonis is a Field CTO and Evangelist for Palo Alto Networks, former Forrester analyst and cybersecurity tech founder.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store