{"id":1318,"date":"2019-03-29T21:10:42","date_gmt":"2019-03-29T21:10:42","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1318"},"modified":"2020-05-06T10:26:59","modified_gmt":"2020-05-06T17:26:59","slug":"what-makes-the-infoblox-security-ecosystem-so-powerful","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/","title":{"rendered":"What Makes the Infoblox Security EcoSystem so Powerful?"},"content":{"rendered":"<p>Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing\u00a0as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.<\/p>\n<p>By leveraging not only the security and threat intelligence available from Infoblox, but also enabling alert based outbound commands to other parts of an enterprise security ecosystem, Infoblox supports the concept of an automated, rapid response to real-time threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1320\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/459519725-660x454-1.jpg\" alt=\"What Makes the Infoblox Security EcoSystem so Powerful?\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p><strong>Real World Example:<\/strong>\u00a0DNSbotBackground:<\/p>\n<p><strong>How is DNSbot delivered?<\/strong><\/p>\n<ul>\n<li>Attackers send phishing emails that include malicious documents to targets.<\/li>\n<li>The malicious documents include a MsgBox display that asks targets to update Microsoft service.<\/li>\n<li>Once the victims have double-clicked the image in order to unlock document service, the obfuscated JS file gets dropped onto the victims\u2019 systems.<\/li>\n<li>This file executes the JavaScript-based DNSbot.<\/li>\n<\/ul>\n<p>DNSbot is a multiprotocol backdoor which is used to exchange commands and push data to and from the compromised system.<\/p>\n<p>\u201cPrimarily, it operates over DNS traffic, but can also switch to encrypted channels such as HTTPS or SSL,\u201d researchers said.<\/p>\n<p><strong>How does Infoblox EcoSystem help with response and mitigation?<\/strong><\/p>\n<ul>\n<li><strong>Detection:<\/strong> Infoblox ThreatInsight (TI) will detect DNSbot by doing a Deep Packet Inspection on all DNS queries in your environment.<\/li>\n<li><strong>Response:<\/strong> TI will detect extra packets inside the DNS query and block it with RPZ.<\/li>\n<li><strong>Mitigation:<\/strong> So now that Infoblox has blocked the DNS query via RPZ it will then share this information via the Infoblox Security EcoSystem to your WebProxy and Firewall.<\/li>\n<\/ul>\n<p>Source:<a href=\"https:\/\/cyware.com\/news\/fin7-threat-actor-group-makes-a-come-back-with-sqlrat-and-dnsbot-27f1843f?es_p=8884873\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> CYWARE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing\u00a0as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem. By leveraging not [&hellip;]<\/p>\n","protected":false},"author":260,"featured_media":1320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[49],"class_list":{"0":"post-1318","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-mitigate-threats","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Makes the Infoblox Security EcoSystem so Powerful?<\/title>\n<meta name=\"description\" content=\"Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Makes the Infoblox Security EcoSystem so Powerful?\" \/>\n<meta property=\"og:description\" content=\"Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-29T21:10:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sif Baksh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sif Baksh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/\"},\"author\":{\"name\":\"Sif Baksh\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d78ba19c60e3345e0b057ecb0f990108\"},\"headline\":\"What Makes the Infoblox Security EcoSystem so Powerful?\",\"datePublished\":\"2019-03-29T21:10:42+00:00\",\"dateModified\":\"2020-05-06T17:26:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/\"},\"wordCount\":276,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"keywords\":[\"mitigate threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/\",\"name\":\"What Makes the Infoblox Security EcoSystem so Powerful?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"datePublished\":\"2019-03-29T21:10:42+00:00\",\"dateModified\":\"2020-05-06T17:26:59+00:00\",\"description\":\"Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\\\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"What Makes the Infoblox Security EcoSystem so Powerful?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-makes-the-infoblox-security-ecosystem-so-powerful\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Makes the Infoblox Security EcoSystem so Powerful?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d78ba19c60e3345e0b057ecb0f990108\",\"name\":\"Sif Baksh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_260_1582930725-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_260_1582930725-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_260_1582930725-96x96.jpg\",\"caption\":\"Sif Baksh\"},\"description\":\"Sif is a Principal Sales Engineer at Infoblox where he provides technical expertise regarding Infoblox solutions with a focus on Network Automation and Cybersecurity. He has been with Infoblox for over 7 years, starting in the Professional Services org where he performed NetMRI deployments at many of the largest companies in the world. Outside of work, Sif can be found at the local hackerspace where he volunteers as a leading cybersecurity educator. Online he can be found @sifbaksh running the regex daily channel.\",\"sameAs\":[\"https:\\\/\\\/sifbaksh.com\\\/\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/sif-baksh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Makes the Infoblox Security EcoSystem so Powerful?","description":"Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/","og_locale":"en_US","og_type":"article","og_title":"What Makes the Infoblox Security EcoSystem so Powerful?","og_description":"Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/","og_site_name":"Infoblox Blog","article_published_time":"2019-03-29T21:10:42+00:00","article_modified_time":"2020-05-06T17:26:59+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","type":"image\/jpeg"}],"author":"Sif Baksh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sif Baksh","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/"},"author":{"name":"Sif Baksh","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d78ba19c60e3345e0b057ecb0f990108"},"headline":"What Makes the Infoblox Security EcoSystem so Powerful?","datePublished":"2019-03-29T21:10:42+00:00","dateModified":"2020-05-06T17:26:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/"},"wordCount":276,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","keywords":["mitigate threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/","name":"What Makes the Infoblox Security EcoSystem so Powerful?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","datePublished":"2019-03-29T21:10:42+00:00","dateModified":"2020-05-06T17:26:59+00:00","description":"Infoblox Security EcoSystem was designed to support responses to attacks that use DNS, which can further move to HTTPS\/SSL. There is not one solution to \u2018do it all\u2019, so our goal is to enable sharing as much Cyber Threat Intelligence with other security vendors in the proper context to create a Security EcoSystem.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","width":660,"height":454,"caption":"What Makes the Infoblox Security EcoSystem so Powerful?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-makes-the-infoblox-security-ecosystem-so-powerful\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What Makes the Infoblox Security EcoSystem so Powerful?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d78ba19c60e3345e0b057ecb0f990108","name":"Sif Baksh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_260_1582930725-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_260_1582930725-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_260_1582930725-96x96.jpg","caption":"Sif Baksh"},"description":"Sif is a Principal Sales Engineer at Infoblox where he provides technical expertise regarding Infoblox solutions with a focus on Network Automation and Cybersecurity. He has been with Infoblox for over 7 years, starting in the Professional Services org where he performed NetMRI deployments at many of the largest companies in the world. Outside of work, Sif can be found at the local hackerspace where he volunteers as a leading cybersecurity educator. Online he can be found @sifbaksh running the regex daily channel.","sameAs":["https:\/\/sifbaksh.com\/"],"url":"https:\/\/www.infoblox.com\/blog\/author\/sif-baksh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/260"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1318"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1318\/revisions"}],"predecessor-version":[{"id":1327,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1318\/revisions\/1327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1320"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}