{"id":3458,"date":"2025-07-02T06:00:00","date_gmt":"2025-07-02T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=3458"},"modified":"2025-06-25T09:40:38","modified_gmt":"2025-06-25T16:40:38","slug":"beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/","title":{"rendered":"Beyond the Ivory Tower: The Blueprint for AI Research That Works"},"content":{"rendered":"\n<p>Even after a career spent at the forefront of AI research and development, I can say with confidence that we are in an unprecedented moment. While AI is undoubtedly the most disruptive technology of our generation, in the world of cybersecurity, hype doesn\u2019t stop threats. Turning the immense promise of generative AI, deep learning and machine learning into tangible security outcomes requires more than just access to new models; it demands a disciplined and purposeful research philosophy.<\/p>\n\n\n\n<p>Our philosophy rejects the traditional, isolated \u201civory tower\u201d of academic research and corporate R&amp;D. Instead, it is relentlessly focused on real-world outcomes that are deeply embedded within the teams building the products, secure by its design and openly collaborative. This blueprint guides our work and is built upon four core principles that I believe are essential for making AI work for security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. <strong>Research in the Trenches<\/strong><\/h2>\n\n\n\n<p>This philosophy begins with a foundational decision about structure. Instead of isolating researchers, we embed them directly within our product organizations for a simple reason: In cybersecurity, proximity to the place where security problems are solved is everything.<\/p>\n\n\n\n<p>This structure ensures our researchers are focused on solving real-world problems, not abstract ones. Researchers sit alongside the engineers who build our products and the product managers who live and breathe our customers\u2019 challenges. This proximity makes the transfer of technology seamless and organic. It fosters a constant dialogue that ensures our long-term, high-risk research projects remain grounded in what will ultimately make our customers safer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Better Security Outcomes: The Only Metric That Matters&nbsp;<\/h2>\n\n\n\n<p>Many research organizations measure success by the number of academic papers they publish. We don\u2019t. Our primary metric is the tangible improvement our research delivers to our products and, by extension, to our customers\u2019 security.<\/p>\n\n\n\n<p>This focus has two critical implications. First, it means that we train and evaluate our models on real-world security system data, not on sanitized \u201ctoy problems.\u201d This ensures our AI is effective in the complex, messy reality of a live security environment. Second, it gives our teams the freedom to fail. We encourage a \u201cfail-fast\u201d mentality, enabling us to quickly discard ideas that don\u2019t show promise and double down on those that do, without the pressure of a publication quota. Our goal is to build a portfolio of proven, effective AI for security, not to build a library of papers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Security for AI, Not Just AI for Security<\/h2>\n\n\n\n<p>As the leader in cybersecurity, we have a dual responsibility: to build AI that promotes security, and to ensure the AI we \u2014&nbsp;and our customers \u2014 build is itself secure. Our customers entrust us with their most sensitive system data, and protecting it is our highest priority.<\/p>\n\n\n\n<p>This principle extends to our entire research operation. Our models are developed in highly secure environments, protected by our own best-in-class security products and secure-by-design frameworks. We meticulously vet our AI security and protect against model theft, prompt injections and other emerging threats. This may seem obvious, but secure AI is impossible without first having a strong understanding of AI security. Our commitment to this principle extends beyond our own walls; it is the core of our promise to our customers. The same security platform that protects our research is the one we offer to the industry, ensuring everyone can benefit from the lessons we learn on the frontlines of AI innovation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Create a Community, Not a Fortress<\/h2>\n\n\n\n<p>Finally, we believe the best ideas come from collaboration. We actively avoid a \u201cnot invented here\u201d mentality. Our teams are empowered to leverage the best innovations from the broader research community. These innovations include using LLM coding agents to make our own researchers more productive and generating synthetic data to make our models more robust.<\/p>\n\n\n\n<p>We are committed to being active participants in the global conversation. We encourage our researchers to attend conferences, <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\">organize workshops<\/a>, and continuously learn from what others have done. Progress in this field is a collective effort, and our goal is to contribute to and benefit from the shared knowledge of the entire ecosystem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Safer, Secure Future<\/h2>\n\n\n\n<p>Ultimately, these principles create a research engine that is both innovative and accountable. It\u2019s an approach designed to turn cutting-edge science into real-world security, ensuring that the power of Precision AI delivers on its most important promise: a safer digital future for everyone.<\/p>\n\n\n\n<p>To see these principles in action and explore our deep research into securing this next wave, read our full paper, <em><a href=\"https:\/\/www.schmidtsciences.org\/wp-content\/uploads\/2025\/06\/Achieving_a_Secure_AI_Agent_Ecosystem-3.pdf\">Achieving a Secure AI Agent Ecosystem<\/a><\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A breakthrough blueprint for outcome-driven AI security research.<\/p>\n","protected":false},"author":1,"featured_media":3459,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,20,15],"tags":[],"coauthors":[179],"class_list":["post-3458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-business-transformation","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beyond the Ivory Tower: The Blueprint for AI Research That Works - Perspectives<\/title>\n<meta name=\"description\" content=\"A breakthrough blueprint for outcome-driven AI security research.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond the Ivory Tower: The Blueprint for AI Research That Works - Perspectives\" \/>\n<meta property=\"og:description\" content=\"A breakthrough blueprint for outcome-driven AI security research.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-02T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dr. Aaron Isaksen\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"Beyond the Ivory Tower: The Blueprint for AI Research That Works\",\"datePublished\":\"2025-07-02T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\"},\"wordCount\":762,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg\",\"articleSection\":[\"AI\",\"Business Transformation\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\",\"name\":\"Beyond the Ivory Tower: The Blueprint for AI Research That Works - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg\",\"datePublished\":\"2025-07-02T13:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"A breakthrough blueprint for outcome-driven AI security research.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beyond the Ivory Tower: The Blueprint for AI Research That Works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/image\/e2b49059a6075757f9c0e2a0b4bc2979\",\"url\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond the Ivory Tower: The Blueprint for AI Research That Works - Perspectives","description":"A breakthrough blueprint for outcome-driven AI security research.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/","og_locale":"en_US","og_type":"article","og_title":"Beyond the Ivory Tower: The Blueprint for AI Research That Works - Perspectives","og_description":"A breakthrough blueprint for outcome-driven AI security research.","og_url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/","og_site_name":"Perspectives","article_published_time":"2025-07-02T13:00:00+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg","type":"image\/jpeg"}],"author":"Dr. Aaron Isaksen","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"Beyond the Ivory Tower: The Blueprint for AI Research That Works","datePublished":"2025-07-02T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/"},"wordCount":762,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg","articleSection":["AI","Business Transformation","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/","url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/","name":"Beyond the Ivory Tower: The Blueprint for AI Research That Works - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg","datePublished":"2025-07-02T13:00:00+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"A breakthrough blueprint for outcome-driven AI security research.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/06\/beyond-the-ivory-tower-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/beyond-the-ivory-tower-the-blueprint-for-ai-research-that-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Beyond the Ivory Tower: The Blueprint for AI Research That Works"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/#\/schema\/person\/image\/e2b49059a6075757f9c0e2a0b4bc2979","url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/posts\/3458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/comments?post=3458"}],"version-history":[{"count":5,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/posts\/3458\/revisions"}],"predecessor-version":[{"id":3481,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/posts\/3458\/revisions\/3481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/media\/3459"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/media?parent=3458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/categories?post=3458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/tags?post=3458"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.ca\/perspectives\/wp-json\/wp\/v2\/coauthors?post=3458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}