* [Blog](https://www.paloaltonetworks.com/blog) * [Security Operations](https://www.paloaltonetworks.com/blog/security-operations/) * [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/) * Security Pro-Tip: Boost y... # Security Pro-Tip: Boost your Analytical \& Communication Skills by Training Your Visual Intelligence [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fsecurity-pro-tip-boost-your-analytical-communication-skills-by-training-your-visual-intelligence%2F) [](https://twitter.com/share?text=Security+Pro-Tip%3A+Boost+your+Analytical+%26amp%3B+Communication+Skills+by+Training+Your+Visual+Intelligence&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fsecurity-pro-tip-boost-your-analytical-communication-skills-by-training-your-visual-intelligence%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fsecurity-pro-tip-boost-your-analytical-communication-skills-by-training-your-visual-intelligence%2F&title=Security+Pro-Tip%3A+Boost+your+Analytical+%26amp%3B+Communication+Skills+by+Training+Your+Visual+Intelligence&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/security-operations/security-pro-tip-boost-your-analytical-communication-skills-by-training-your-visual-intelligence/&ts=markdown) \[\](mailto:?subject=Security Pro-Tip: Boost your Analytical \& Communication Skills by Training Your Visual Intelligence) Link copied By [David Posocco](https://www.paloaltonetworks.com/blog/author/david-posocco/?ts=markdown "Posts by David Posocco") Jul 23, 2021 5 minutes [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [cybersecurity](https://www.paloaltonetworks.com/blog/tag/cybersecurity/?ts=markdown) [Personal Development](https://www.paloaltonetworks.com/blog/tag/personal-development/?ts=markdown) [Training](https://www.paloaltonetworks.com/blog/tag/training/?ts=markdown) [Visual Intelligence](https://www.paloaltonetworks.com/blog/tag/visual-intelligence/?ts=markdown) I recognize that a generic skill set is hard to quantify or measure. So, let's look at a cross functional skill that can be used not only to estimate some of those abilities, but that can also be learned and trained by anyone looking to improve their investigative and analytical process. I'm talking about visual intelligence. One might assume it's an inherent way of learning or a personality trait, but I assure you it is a skill that can be learned and developed to improve your analytical and communication skills through observation. Previously, I wrote about the [benefits of generalists](https://www.paloaltonetworks.com/blog/security-operations/building-your-cybersecurity-team/?ts=markdown) in the cybersecurity field and the perspectives they bring to the table. Visual intelligence is one of those cross-functional skills they may have to offer. Visual, Visual-Spatial, or sometimes just Spatial Intelligence was part of a theory first introduced by American psychologist Howard Gardner in 1983. According to Wikipedia, Gardner defined it as "a human computational capacity that provides the ability or mental skill to solve spatial problems of navigation, visualization of objects from different angles and space, faces or scenes recognition, or to notice fine details." That's a broad definition, but I think it can best be summed up as one's ability to observe. ### **At First Glance** Amy Herman, a lawyer and art historian, developed a seminar in 2000 that used the concepts of visual intelligence to develop medical students' observational and communication skills with patients. She later wrote the book "Visual Intelligence: Sharpen Your Perception, Change Your Life," and in 2018, gave the TED talk "A Lesson On Looking." Herman uses works of art to improve the observation, analysis, and communication skills of her clients. Take, for example, "A Bar at the Folies-Bergere" by Edouard Manet: ![painting of A Bar at the Folies-Bergère” by Edouard Manet](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/07/word-image-2.jpeg) *Image linked from* [*WIkiArt*](https://www.wikiart.org/en/edouard-manet/a-bar-at-the-folies-bergere-1882-1)*: "A Bar at the Folies-Bergère" by Edouard Manet* What did you see when you looked at this image? A woman standing behind a bar? That would be a good start, but did you also see that she is waiting on a customer? I'm sure at this point you see that she is standing in front of a mirror reflecting not only the customer and counter, but an entire crowded hall. Perhaps now you see the various styles of hats in the crowd and can deduce some theories about the time period or culture. By observing the image, rather than just looking at it, you pick up fine details that would otherwise be missed. Practicing this skill translates into any role that requires you to consume data and make judgements about it. This is particularly helpful to cybersecurity investigators faced with the manual review of large data sets, such as log files, network traffic, raw intelligence, etc. Having a strong visual intelligence might be the difference between picking out the one entry that solves your case or noticing that one bit of information that proves your analysis correct. In addition to keeping your brain from switching to autopilot and overlooking important details, visual intelligence can also improve your communication skills. Let's look at "Time Transfixed" by Renee Magritte: ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/07/word-image-3.jpeg) *Image linked from* [*WikiArt*](https://www.wikiart.org/en/rene-magritte/time-transfixed-1938)*: "Time transfixed" by Rene Magritte* What did you see here? More importantly, how would you describe this to someone who hasn't seen the image? In this example, simply describing what you see doesn't accurately portray the image. Your description needs to include what's missing as well. For example, there is a fireplace, but it doesn't have any contents or fire. There is a train coming out of the fireplace, but it's not on tracks; it's floating. Everyone's perception is a product of their own reality. So, by thinking about how to describe what you're seeing to someone else will force you into another perspective. This is directly applicable to many roles in the cybersecurity field where you're interfacing with or providing a product to a customer or client that isn't as technically knowledgeable. Take a complex system or network log file, for example: which generic description would be more valuable to someone who didn't look at the file? "We looked through the log file but didn't find anything," or "We looked for X in the log file that contained Y but didn't find any instances of it?" ### **Looking Ahead** Whether you work in the cybersecurity field or not, if you agree with the benefits and want to improve your visual intelligence, you can do so with minimal effort. Simply taking five or ten minutes a few times a week to observe an image will produce a noticeable difference in how you see everything from the world around you, including the repetitive log files or network traffic you might be analyzing. If you're looking to improve your communication skills as well, then consider how you would describe the image to someone so that they have an accurate idea of the source without ever seeing it. To get started, there is an endless list of coffee table books featuring the works of famous artists, but there are also online options like [WikiArt](https://www.wikiart.org/)and [Google Arts \& Culture](https://artsandculture.google.com/). The observation of works of art isn't the only way to improve your visual intelligence. Certainly, that's not something that everyone would find interesting or enjoyable. An intricate jigsaw puzzle with a complex image that contains lots of small details is another option. If you're a comic book fan, you can simply slow down reading the story and take the time to observe each image. Every page is a work of art. The list could go on, but the idea is all the same. Working to improve your visual intelligence, no matter what method works best for you, will change how you see the world and improve your objective analysis and ability to communicate. If you want to get a sense of how strong someone's visual intelligence is, simply show them a picture and have them describe it. *** ** * ** *** ## Related Blogs ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### Teaming for the Cybersecurity Professional, a Brief Overview](https://www.paloaltonetworks.com/blog/security-operations/teaming-for-the-cybersecurity-professional-a-brief-overview/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### Securing Shadow AI with Cortex Xpanse](https://www.paloaltonetworks.com/blog/security-operations/securing-shadow-ai-with-cortex-xpanse/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### Breaking Down Security Silos: How XDL Powers Advanced Threat Operations](https://www.paloaltonetworks.com/blog/security-operations/breaking-down-security-silos-how-xdl-powers-advanced-threat-operations/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### From ILOVEYOU to AI Defenders -- 25 Years of Email Evolution](https://www.paloaltonetworks.com/blog/security-operations/from-iloveyou-to-ai-defenders-25-years-of-email-evolution/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [#### What's New in Cortex](https://www.paloaltonetworks.com/blog/security-operations/whats-new-in-cortex/) ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [#### Tracking Down Malicious Communication with Advanced XDR Detection Tactics](https://www.paloaltonetworks.com/blog/security-operations/tracking-down-malicious-communication-with-advanced-xdr-detection-tactics/) ### Subscribe to Security Operations Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language