<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Building Cybersecurity Strategies: A Game of Digital Mahjong in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/building-cybersecurity-strategies-a-game-of-digital-mahjong/m-p/1240902#M125431</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/334180043"&gt;@eender405&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Lately, I’ve been thinking about how designing a strong cybersecurity strategy feels a lot like playing a complex game of Mahjong: every move matters, timing is crucial, and one wrong tile can shift the entire outcome.&lt;/P&gt;
&lt;P&gt;With AI-driven automation and increasingly dynamic threat landscapes, our “tiles” — firewalls, threat intelligence, and endpoint defenses — are getting harder to align.&lt;/P&gt;
&lt;P&gt;How do you balance speed, adaptability, and reliability in your security infrastructure without creating blind spots or unnecessary complexity?&lt;/P&gt;
&lt;P&gt;Would love to hear insights from others who’ve been dealing with similar challenges.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/334180043"&gt;@eender405&lt;/a&gt;&amp;nbsp; -- Kinda a cool topic. I think it comes down to not complicating your firewall design/policy, using native feature functionality where at all possible and using AI/automation where it makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Consuming an OEM's native threat services and leveraging them to the highest degree possible.&amp;nbsp; A recent example in the Palo/Strata product.&amp;nbsp; We had a recent test where C2 call back was leveraged and the tester expected that callback to be successful, but it wasn't.&amp;nbsp; The C2 callback being a "low" threat, it's default action is "alert" proactively setting these types of events to a blocking action is needed into today's cyber threat landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having a secure network is more than just deploying to security tool or feature you need to understand it and tune it to your environment.&amp;nbsp; However deploying some overly complex design or a something that's hard to maintain will likely mean things will be overlooked and that's where intrusions occur.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Oct 2025 13:08:13 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2025-10-29T13:08:13Z</dc:date>
    <item>
      <title>Building Cybersecurity Strategies: A Game of Digital Mahjong</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/building-cybersecurity-strategies-a-game-of-digital-mahjong/m-p/1240876#M125428</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Lately, I’ve been thinking about how designing a strong cybersecurity strategy feels a lot like playing a complex game of Mahjong: every move matters, timing is crucial, and one wrong tile can shift the entire outcome.&lt;/P&gt;
&lt;P&gt;With AI-driven automation and increasingly dynamic threat landscapes, our “tiles” — firewalls, threat intelligence, and endpoint defenses — are getting harder to align.&lt;/P&gt;
&lt;P&gt;How do you balance speed, adaptability, and reliability in your security infrastructure without creating blind spots or unnecessary complexity?&lt;/P&gt;
&lt;P&gt;Would love to hear insights from others who’ve been dealing with similar challenges.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 01:52:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/building-cybersecurity-strategies-a-game-of-digital-mahjong/m-p/1240876#M125428</guid>
      <dc:creator>eender405</dc:creator>
      <dc:date>2025-10-29T01:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Building Cybersecurity Strategies: A Game of Digital Mahjong</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/building-cybersecurity-strategies-a-game-of-digital-mahjong/m-p/1240902#M125431</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/334180043"&gt;@eender405&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Lately, I’ve been thinking about how designing a strong cybersecurity strategy feels a lot like playing a complex game of Mahjong: every move matters, timing is crucial, and one wrong tile can shift the entire outcome.&lt;/P&gt;
&lt;P&gt;With AI-driven automation and increasingly dynamic threat landscapes, our “tiles” — firewalls, threat intelligence, and endpoint defenses — are getting harder to align.&lt;/P&gt;
&lt;P&gt;How do you balance speed, adaptability, and reliability in your security infrastructure without creating blind spots or unnecessary complexity?&lt;/P&gt;
&lt;P&gt;Would love to hear insights from others who’ve been dealing with similar challenges.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/334180043"&gt;@eender405&lt;/a&gt;&amp;nbsp; -- Kinda a cool topic. I think it comes down to not complicating your firewall design/policy, using native feature functionality where at all possible and using AI/automation where it makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Consuming an OEM's native threat services and leveraging them to the highest degree possible.&amp;nbsp; A recent example in the Palo/Strata product.&amp;nbsp; We had a recent test where C2 call back was leveraged and the tester expected that callback to be successful, but it wasn't.&amp;nbsp; The C2 callback being a "low" threat, it's default action is "alert" proactively setting these types of events to a blocking action is needed into today's cyber threat landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having a secure network is more than just deploying to security tool or feature you need to understand it and tune it to your environment.&amp;nbsp; However deploying some overly complex design or a something that's hard to maintain will likely mean things will be overlooked and that's where intrusions occur.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 13:08:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/building-cybersecurity-strategies-a-game-of-digital-mahjong/m-p/1240902#M125431</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2025-10-29T13:08:13Z</dc:date>
    </item>
  </channel>
</rss>

