{"id":1883,"date":"2017-05-01T23:33:20","date_gmt":"2017-05-01T23:33:20","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1883"},"modified":"2020-05-06T10:28:00","modified_gmt":"2020-05-06T17:28:00","slug":"why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/","title":{"rendered":"Why We Should Let Our Walls Down When It Comes to Cybersecurity"},"content":{"rendered":"<p dir=\"ltr\">With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing. But even in this age of hackers relentlessly penetrating our networks, in the information technology security industry, we know that walls don\u2019t work.<\/p>\n<p dir=\"ltr\">The truth is that surrounding yourself with impenetrable barricades is akin to sticking your head in the sand. Walls by themselves fail to tackle the root cause of threats, meaning any sense of safety created is artificial. Organizations need to have a holistic security posture that spans their internal network and devices. More importantly, they must anticipate malicious external threats.<\/p>\n<p dir=\"ltr\"><strong>Security requires a holistic approach<\/strong><\/p>\n<p dir=\"ltr\">For protection, traditional IT security systems have for a long time relied on perimeter defenses, such as firewalls, intrusion detection systems and intrusion prevention systems. But that paradigm has changed, as cybercriminals have evolved and cyberattacks have increased in volume and sophistication. In 2015, there were 430 million unique pieces of malware, up\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">36 percent<\/a>\u00a0from the prior year. It\u2019s a number only continuing to explode. Singular perimeter defenses are no longer enough.<\/p>\n<div id=\"dfp-ad-mosad_1-wrapper\" class=\"dfp-tag-wrapper wrapper\">\n<div id=\"dfp-ad-mosad_1\" class=\"dfp-tag-wrapper\" data-google-query-id=\"CK7zp_DTz9MCFUeCAQodvpEC4A\">\n<div id=\"google_ads_iframe_1107919\/Content_300x250_ROS_asynch_0__container__\">Internal infrastructure, whether digital or physical, is meant to encourage and foster a natural ebb and flow \u2014 of both good and bad \u2014 with the world beyond the walls. Blocking this organic two-way flow only incites turmoil and turbulence within. Modern businesses rely on constant communication both within and outside the organization. After all, while employees are crucial, a business cannot survive without customers, partners, investors and other external stakeholders. These are all outsiders who keep the business alive.<\/div>\n<\/div>\n<\/div>\n<p dir=\"ltr\">Therefore, building thick, impenetrable walls goes against this grain of open and constant communication that our 21st century enterprises are built on. Keeping everything out is not an option (including insidious actors, hackers or viruses) and keeping everything in (halting the outward flow of data) is also impossible. As such, the industry must respond not with rigid, insular systems that block, but rather open, adaptive systems that can learn as threats evolve and move quickly to discover and resolve threats. This the only way to truly bolster security.<\/p>\n<p dir=\"ltr\">So how do we go about building these protective, intelligently porous systems? Let\u2019s break down what a network like this would entail.<\/p>\n<p dir=\"ltr\"><strong>It starts with the foundation<\/strong><\/p>\n<p dir=\"ltr\">Today\u2019s digital organizations must strive to build secure systems and networks that are open and enable the bidirectional flow of information, support the needs of the business and, are simple to manage, all while maintaining security. These networks are not one element but a collection of widgets, or returning to the wall metaphor, bricks that need to be glued together.<\/p>\n<p dir=\"ltr\">These bricks are crucial to the foundation of your infrastructure. They must strengthen each other, maintain the integrity of the foundation, and provide the necessary protection, but always allow the free flow of ideas, information, commerce. and communication.<\/p>\n<p dir=\"ltr\"><strong>Control and security come from the core<\/strong><\/p>\n<p dir=\"ltr\">The core of the network is what enables communication and interaction with others in the broader digital ecosystem. In stark contrast to rigid perimeter defenses and walls, the network needs to provide protection without compromising openness. This means building digital infrastructure that is responsive and flexible.<\/p>\n<p dir=\"ltr\">Most importantly, in today\u2019s dangerous cyber climate, they must protect the infrastructure\u2019s integrity, the assets and data in the enterprise, and the users and devices \u2014 guarding against malware, hackers, data leaks, and attacks.<\/p>\n<p dir=\"ltr\"><strong>Defense and intelligence are synonymous<\/strong><\/p>\n<p dir=\"ltr\">Walls neglect to address the points at which the threats originate, allowing hackers to persist and grow more sophisticated in seeking new backchannels and vulnerabilities to penetrate. So in this day and age of so many threats, how can we safeguard against all this without erecting walls?<\/p>\n<p dir=\"ltr\">The solution to outdated perimeter defenses is to build layers of actionable intelligence that seek to understand the causes, behavior, history, and nature of those gaining access to the network \u2014 similar to our unsung heroes, the officers at airports and borders, who ask travelers where they\u2019ve been, why they left, and what they\u2019re bringing in. These are all contextual pieces of information that when analyzed provide actionable intelligence.<\/p>\n<p dir=\"ltr\">We need to build the same kind of multilayer defense that the human physiology provides: the skin (the wall in this scenario) allows a natural ebb and flow, but is supported by our white blood cells fighting infections internally. Meanwhile, the brain learns how to avoid external threats using contextual and actionable insights, providing holistic defense. Today\u2019s digital organization and its network are much like a living organism that needs intelligence for survival.<\/p>\n<p dir=\"ltr\">Equally important is balancing visibility and flexibility. To enable a secure enterprise, you need to be able to see everything on your network and to evaluate new additions. Think of a device that is added to the network: you need to ensure that it is not introducing malware into the network while also being adaptable enough to accommodate a new piece of the network.<\/p>\n<p dir=\"ltr\">This could be something as simple as automating the process by which a printer is added to the network or creating guest permissions for a contractor\u2019s device once it\u2019s been verified. Crucially, networks must be scalable so that they can keep pace with a modern enterprises\u2019 growth, as new people and devices constantly join or exit the fold, the network must be able to adapt.<\/p>\n<p dir=\"ltr\"><strong>Moving beyond bricks in the wall<\/strong><\/p>\n<p dir=\"ltr\">Our rich digital ecosystems can only thrive and innovate via learning from and evolving with the disparate digital communities and netizens beyond our perimeters, even if this means occasional friction and conflict. Data, ideas, digital currency, commerce, and interactions rely on this two-way flow of both good and bad.<\/p>\n<p dir=\"ltr\">It is true that like every building, every organization constructs defenses around its physical and virtual premises. But all walls do well is isolate and create an artificial sense of security. Instead we must accept the reality that in today\u2019s cyber climate, threats are bound to find their way in.<\/p>\n<p dir=\"ltr\">To move forward, we must build layers of defense, visibility, and intelligence that are adaptive, responsive and secure \u2014 ones that guarantee open communication, engagement, and unfettered commerce, but provide the protection and openness we need to thrive. It is about much more than just adding another brick in the wall.<\/p>\n<p dir=\"ltr\"><em><a href=\"https:\/\/www.infoblox.com\/company\/leadership\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Ashish Gupta<\/a>\u00a0is executive vice president and chief marketing officer of\u00a0<a href=\"https:\/\/www.infoblox.com\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox<\/a>.<\/em><\/p>\n<p dir=\"ltr\"><em>Find Original Post Here:\u00a0<a href=\"http:\/\/thehill.com\/blogs\/pundits-blog\/technology\/328963-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/thehill.com\/blogs\/pundits-blog\/technology\/328963-we-should-let-our-walls-down-when-it-comes-t&#8230;<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing. But even in this age of hackers relentlessly penetrating our networks, in the information technology security industry, we know that walls don\u2019t work. The truth is that surrounding [&hellip;]<\/p>\n","protected":false},"author":162,"featured_media":1478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[69,44,16,15,67],"class_list":{"0":"post-1883","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-best-practices","9":"tag-dns-firewall","10":"tag-infoblox","11":"tag-security","12":"tag-tips-tricks","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why We Should Let Our Walls Down When It Comes to Cybersecurity<\/title>\n<meta name=\"description\" content=\"With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why We Should Let Our Walls Down When It Comes to Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-01T23:33:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ashish Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ashish Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/\"},\"author\":{\"name\":\"Ashish Gupta\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0195258ceffc04aae5c8598ca1786372\"},\"headline\":\"Why We Should Let Our Walls Down When It Comes to Cybersecurity\",\"datePublished\":\"2017-05-01T23:33:20+00:00\",\"dateModified\":\"2020-05-06T17:28:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"keywords\":[\"Best practices\",\"DNS Firewall\",\"Infoblox\",\"Security\",\"Tips &amp; Tricks\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/\",\"name\":\"Why We Should Let Our Walls Down When It Comes to Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"datePublished\":\"2017-05-01T23:33:20+00:00\",\"dateModified\":\"2020-05-06T17:28:00+00:00\",\"description\":\"With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"width\":725,\"height\":483,\"caption\":\"Computer crime concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why We Should Let Our Walls Down When It Comes to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0195258ceffc04aae5c8598ca1786372\",\"name\":\"Ashish Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a66a2d037509eb5cfc724122ec2365e7427d0a4f256e2e57596f4b161716a69?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a66a2d037509eb5cfc724122ec2365e7427d0a4f256e2e57596f4b161716a69?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a66a2d037509eb5cfc724122ec2365e7427d0a4f256e2e57596f4b161716a69?s=96&d=blank&r=g\",\"caption\":\"Ashish Gupta\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ashish-gupta\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why We Should Let Our Walls Down When It Comes to Cybersecurity","description":"With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why We Should Let Our Walls Down When It Comes to Cybersecurity","og_description":"With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/","og_site_name":"Infoblox Blog","article_published_time":"2017-05-01T23:33:20+00:00","article_modified_time":"2020-05-06T17:28:00+00:00","og_image":[{"width":725,"height":483,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","type":"image\/jpeg"}],"author":"Ashish Gupta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ashish Gupta","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/"},"author":{"name":"Ashish Gupta","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0195258ceffc04aae5c8598ca1786372"},"headline":"Why We Should Let Our Walls Down When It Comes to Cybersecurity","datePublished":"2017-05-01T23:33:20+00:00","dateModified":"2020-05-06T17:28:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","keywords":["Best practices","DNS Firewall","Infoblox","Security","Tips &amp; Tricks"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/","url":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/","name":"Why We Should Let Our Walls Down When It Comes to Cybersecurity","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","datePublished":"2017-05-01T23:33:20+00:00","dateModified":"2020-05-06T17:28:00+00:00","description":"With digital threats growing more rampant across the country and from around the world, the idea of building \u201cwalls\u201d for cyber defense and protection can seem appealing.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","width":725,"height":483,"caption":"Computer crime concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/why-we-should-let-our-walls-down-when-it-comes-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Why We Should Let Our Walls Down When It Comes to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0195258ceffc04aae5c8598ca1786372","name":"Ashish Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0a66a2d037509eb5cfc724122ec2365e7427d0a4f256e2e57596f4b161716a69?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0a66a2d037509eb5cfc724122ec2365e7427d0a4f256e2e57596f4b161716a69?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a66a2d037509eb5cfc724122ec2365e7427d0a4f256e2e57596f4b161716a69?s=96&d=blank&r=g","caption":"Ashish Gupta"},"url":"https:\/\/www.infoblox.com\/blog\/author\/ashish-gupta\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1883"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1883\/revisions"}],"predecessor-version":[{"id":1884,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1883\/revisions\/1884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1478"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}