{"id":1929,"date":"2016-12-08T06:00:00","date_gmt":"2016-12-08T06:00:00","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1929"},"modified":"2020-05-06T10:28:02","modified_gmt":"2020-05-06T17:28:02","slug":"knowing-is-half-the-battle","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/","title":{"rendered":"Knowing Is Half the Battle!"},"content":{"rendered":"<p>The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.<\/p>\n<p>This is evident from the attack incident like the one that hit Target, Home Depot, among others over the last several months and years.<\/p>\n<p>But in the real world, most security teams don\u2019t have time to read through thousands of lines of log messages. One of the common problems with a lot of security-alerting devices is that they generate such large volumes of data that they cause information overload. It\u2019s unfair to expect security teams to perform the almost-impossible task of digesting the cryptic signals provided by these systems, analyze the impact, and take corrective measures to fix the problems.<\/p>\n<p>That is why enterprises should revisit their defenses, not just in the context of having technology to detect threats, but also having ways to simplify the processing of threat data and to support processes that empower people to take action. In the case of Target, the security messages flagged got dropped at some point in the process and were not acted upon, which is more of a process issue than a technology issue.<\/p>\n<p>So consider this: What if you had a way to identify all the devices connected to your network\u2014even the coffee maker\u2014and could determine where they are connecting on the Internet? What could you do with that information? You could more quickly identify threats, for one thing.<\/p>\n<p>This is one of the main advantages of the Infoblox Grid\u2122 with its centralized database containing all device information, including operating systems and hostnames. It can be leveraged to:<\/p>\n<p>1.\u00a0\u00a0\u00a0\u00a0 Prevent unauthorized access to the Internet (An Infoblox customer had to find an XP-based ultrasound machine that had been compromised and was reaching out to a command-and-control server on the Internet.)<\/p>\n<p>2.\u00a0\u00a0\u00a0\u00a0 Quickly identify and isolate impacted devices (Security appliances may identify a problem in part of the network, but Infoblox DNS Firewall applies that information to all the network traffic to find additional infected devices.)<\/p>\n<p>3.\u00a0\u00a0\u00a0\u00a0 Corrective measures and remediation (If a particular operating system is hosting malware, it is much easier to create a policy to isolate devices running that operating system by automatically blocking their network access.)<\/p>\n<p>Hopefully, incidents like this attack and so many others will change the approach to security\u2014from throwing money at expensive appliances to addressing the root causes of the age-old people-and-process element.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach [&hellip;]<\/p>\n","protected":false},"author":194,"featured_media":1930,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15,67],"class_list":{"0":"post-1929","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"tag-tips-tricks","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Knowing Is Half the Battle!<\/title>\n<meta name=\"description\" content=\"The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Knowing Is Half the Battle!\" \/>\n<meta property=\"og:description\" content=\"The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-08T06:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/june-23.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eric Stieg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Stieg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/\"},\"author\":{\"name\":\"Eric Stieg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4b76875dca389d84eb780abfdd533cc\"},\"headline\":\"Knowing Is Half the Battle!\",\"datePublished\":\"2016-12-08T06:00:00+00:00\",\"dateModified\":\"2020-05-06T17:28:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/\"},\"wordCount\":461,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/june-23.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Tips &amp; Tricks\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/\",\"name\":\"Knowing Is Half the Battle!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/june-23.jpg\",\"datePublished\":\"2016-12-08T06:00:00+00:00\",\"dateModified\":\"2020-05-06T17:28:02+00:00\",\"description\":\"The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/june-23.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/june-23.jpg\",\"width\":660,\"height\":454,\"caption\":\"Knowing Is Half the Battle!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/knowing-is-half-the-battle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Knowing Is Half the Battle!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4b76875dca389d84eb780abfdd533cc\",\"name\":\"Eric Stieg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/27dff7af4f65b35eb90694ac0af28f981d96e93ce795791722d7c8659ed040cd?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/27dff7af4f65b35eb90694ac0af28f981d96e93ce795791722d7c8659ed040cd?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/27dff7af4f65b35eb90694ac0af28f981d96e93ce795791722d7c8659ed040cd?s=96&d=blank&r=g\",\"caption\":\"Eric Stieg\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/eric-stieg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Knowing Is Half the Battle!","description":"The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/","og_locale":"en_US","og_type":"article","og_title":"Knowing Is Half the Battle!","og_description":"The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.\u00a0","og_url":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/","og_site_name":"Infoblox Blog","article_published_time":"2016-12-08T06:00:00+00:00","article_modified_time":"2020-05-06T17:28:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/june-23.jpg","type":"image\/jpeg"}],"author":"Eric Stieg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eric Stieg","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/"},"author":{"name":"Eric Stieg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/c4b76875dca389d84eb780abfdd533cc"},"headline":"Knowing Is Half the Battle!","datePublished":"2016-12-08T06:00:00+00:00","dateModified":"2020-05-06T17:28:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/"},"wordCount":461,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/june-23.jpg","keywords":["Infoblox","Security","Tips &amp; Tricks"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/","url":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/","name":"Knowing Is Half the Battle!","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/june-23.jpg","datePublished":"2016-12-08T06:00:00+00:00","dateModified":"2020-05-06T17:28:02+00:00","description":"The phrase from GI Joe of\u00a0 \u2018Knowing is half the battle\u2019 is true in so many ways as we read about B2B and B2C companies being hacked. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens. Only after the breach is determined can the uphill battle begin to determine exit points in the network and plug the holes.\u00a0","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/june-23.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/june-23.jpg","width":660,"height":454,"caption":"Knowing Is Half the Battle!"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/knowing-is-half-the-battle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Knowing Is Half the Battle!"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/c4b76875dca389d84eb780abfdd533cc","name":"Eric Stieg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/27dff7af4f65b35eb90694ac0af28f981d96e93ce795791722d7c8659ed040cd?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/27dff7af4f65b35eb90694ac0af28f981d96e93ce795791722d7c8659ed040cd?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/27dff7af4f65b35eb90694ac0af28f981d96e93ce795791722d7c8659ed040cd?s=96&d=blank&r=g","caption":"Eric Stieg"},"url":"https:\/\/www.infoblox.com\/blog\/author\/eric-stieg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/194"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1929"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1929\/revisions"}],"predecessor-version":[{"id":1932,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1929\/revisions\/1932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1930"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}