{"id":1913,"date":"2017-11-28T00:08:08","date_gmt":"2017-11-28T00:08:08","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1913"},"modified":"2020-05-06T10:27:54","modified_gmt":"2020-05-06T17:27:54","slug":"video-changing-definition-of-core-networking-and-enterprise-expectations-on-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/","title":{"rendered":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security"},"content":{"rendered":"<p>As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of c<a href=\"https:\/\/www.infoblox.com\/products\/core-network-services\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">ore networking(DNS, DHCP, IP Address Management)<\/a>\u00a0is changing rapidly. Security has become a critical component in this changed scenario. However, many enterprises\u00a0are still viewing the two as separate components, making the solution and architectural decisions without a comprehensive view. With such disconnect, the hackers are sure to slip through these cracks and the resulting havoc is very expensive, sometimes leading to the loss of brand value.<\/p>\n<p>We have asked this question to our executives, Prakash Nagpal, VP Product Marketing and Joel Ferman, Sr. Director of Product Management. Both Prakash and Joel have discussed this emerging trend on what should the core networking stack look like and what Infoblox is doing about it. Recently Infoblox has introduced a package (a.k.a., Core Bundle) to help customers go beyond the traditional meaning of Core Networking and secure their DNS.<\/p>\n<p>Watch the video to learn about how the core networking is changing and how Infoblox is helping customers with\u00a0<a href=\"http:\/\/info.infoblox.com\/AMS-WBR-Q3FY18-CoreBundle-021518_01.LP-Registration1.html?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Core Bundle<\/a>. You will learn what Core Bundle is and how it can help.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" id=\"HOJz1MCUaf4\" class=\" bf_frame_init\" src=\"https:\/\/www.youtube.com\/embed\/HOJz1MCUaf4?enablejsapi=1&amp;origin=https:\/\/community.infoblox.com\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management)\u00a0is changing rapidly. Security has become a critical component in this changed scenario. However, many enterprises\u00a0are still viewing the two as separate components, making the solution and architectural decisions [&hellip;]<\/p>\n","protected":false},"author":270,"featured_media":1914,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[28,15],"class_list":{"0":"post-1913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddi","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>[Video] Changing Definition of Core Networking and Enterprise Expectations on Security<\/title>\n<meta name=\"description\" content=\"As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management) is changing rapidly. Security has become a critical component in this changed scenario.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security\" \/>\n<meta property=\"og:description\" content=\"As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management) is changing rapidly. Security has become a critical component in this changed scenario.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-28T00:08:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Srinivas Penumaka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srinivas Penumaka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/\"},\"author\":{\"name\":\"Srinivas Penumaka\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\"},\"headline\":\"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security\",\"datePublished\":\"2017-11-28T00:08:08+00:00\",\"dateModified\":\"2020-05-06T17:27:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-1.jpg\",\"keywords\":[\"DDI\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/\",\"name\":\"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-1.jpg\",\"datePublished\":\"2017-11-28T00:08:08+00:00\",\"dateModified\":\"2020-05-06T17:27:54+00:00\",\"description\":\"As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management) is changing rapidly. Security has become a critical component in this changed scenario.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\",\"name\":\"Srinivas Penumaka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"caption\":\"Srinivas Penumaka\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/srinivas-penumaka\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security","description":"As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management) is changing rapidly. Security has become a critical component in this changed scenario.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/","og_locale":"en_US","og_type":"article","og_title":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security","og_description":"As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management) is changing rapidly. Security has become a critical component in this changed scenario.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/","og_site_name":"Infoblox Blog","article_published_time":"2017-11-28T00:08:08+00:00","article_modified_time":"2020-05-06T17:27:54+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-1.jpg","type":"image\/jpeg"}],"author":"Srinivas Penumaka","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Srinivas Penumaka","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/"},"author":{"name":"Srinivas Penumaka","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293"},"headline":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security","datePublished":"2017-11-28T00:08:08+00:00","dateModified":"2020-05-06T17:27:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/"},"wordCount":207,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-1.jpg","keywords":["DDI","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/","url":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/","name":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-1.jpg","datePublished":"2017-11-28T00:08:08+00:00","dateModified":"2020-05-06T17:27:54+00:00","description":"As cyber attacks continue to mount and DNS is fast becoming a major threat vector exploited by hackers, the definition of core networking(DNS, DHCP, IP Address Management) is changing rapidly. Security has become a critical component in this changed scenario.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-1.jpg","width":660,"height":454,"caption":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/video-changing-definition-of-core-networking-and-enterprise-expectations-on-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"[Video] Changing Definition of Core Networking and Enterprise Expectations on Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293","name":"Srinivas Penumaka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","caption":"Srinivas Penumaka"},"url":"https:\/\/www.infoblox.com\/blog\/author\/srinivas-penumaka\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/270"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1913"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1913\/revisions"}],"predecessor-version":[{"id":1915,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1913\/revisions\/1915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1914"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}