{"id":2543,"date":"2016-09-27T07:00:32","date_gmt":"2016-09-27T07:00:32","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2543"},"modified":"2020-05-06T10:28:04","modified_gmt":"2020-05-06T17:28:04","slug":"security-tools-are-enough-to-rapidly-respond-to-threats-think-again","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/","title":{"rendered":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!"},"content":{"rendered":"<p>Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.<\/p>\n<p>What these teams are faced with is a flood of alerts from dissimilar sources, from which they have to manually correlate and assemble data. They struggle with poor visibility across an increasingly diverse infrastructure, making it difficult to ensure security and compliance. Silos between network and security ops teams add to the disconnect. All these challenges often lead to rising costs of security operations, making it difficult to recognize, prioritize and contain threats before it is too late.<\/p>\n<p>To help overcome these operational challenges and automate threat containment and remediation, Infoblox and Cisco have come together to automatically share information through pxGrid, Cisco\u2019s unique data exchange standard. Infoblox publishes valuable network data to enrich the ISE database and also publishes detected indicators of compromise for further analysis and remediation by 3rd party partners that integrate with pxGrid. Infoblox also subscribes for user identity data available via ISE to enhance the IPAM database. This combination of identity context from ISE together with context around malware hits that Infoblox detects helps provide security teams with actionable network intelligence to prioritize, see and stop threats faster.<\/p>\n<p>Join Infoblox and Cisco at 10:00 am Pacific Time on Wednesday, October 5th for a webinar, \u201cWhy Information Sharing is Critical for Easing Security Operations\u201d, co-sponsored by SC magazine. You will learn about:<\/p>\n<p>* DNS: Why it\u2019s being used as a control plane by malware and ransomware<\/p>\n<p>* How siloed security operations are impeding effective defense<\/p>\n<p>* How Cisco ISE and Infoblox use automated information exchange to see and stop threats faster<\/p>\n<p>To register for the webinar, click here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again. What these teams are faced with is a flood of alerts from dissimilar sources, from which they have to manually correlate and [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15,48],"class_list":{"0":"post-2543","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"tag-threat","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Tools are Enough to Rapidly Respond to Threats. Think Again!<\/title>\n<meta name=\"description\" content=\"Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Tools are Enough to Rapidly Respond to Threats. Think Again!\" \/>\n<meta property=\"og:description\" content=\"Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-27T07:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Security Tools are Enough to Rapidly Respond to Threats. Think Again!\",\"datePublished\":\"2016-09-27T07:00:32+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/\"},\"wordCount\":304,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207-1-1.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Threat\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/\",\"name\":\"Security Tools are Enough to Rapidly Respond to Threats. Think Again!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207-1-1.jpg\",\"datePublished\":\"2016-09-27T07:00:32+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"description\":\"Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207-1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Security Tools are Enough to Rapidly Respond to Threats. Think Again!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Tools are Enough to Rapidly Respond to Threats. Think Again!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!","description":"Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/","og_locale":"en_US","og_type":"article","og_title":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!","og_description":"Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/","og_site_name":"Infoblox Blog","article_published_time":"2016-09-27T07:00:32+00:00","article_modified_time":"2020-05-06T17:28:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207-1-1.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!","datePublished":"2016-09-27T07:00:32+00:00","dateModified":"2020-05-06T17:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/"},"wordCount":304,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207-1-1.jpg","keywords":["Infoblox","Security","Threat"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/","url":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/","name":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207-1-1.jpg","datePublished":"2016-09-27T07:00:32+00:00","dateModified":"2020-05-06T17:28:04+00:00","description":"Many security teams have invested in several tools to detect and mitigate threats that may hit their network. If you think that investment is enough for rapid threat containment and remediation, think again.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207-1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207-1-1.jpg","width":660,"height":454,"caption":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/security-tools-are-enough-to-rapidly-respond-to-threats-think-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Security Tools are Enough to Rapidly Respond to Threats. Think Again!"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2543"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2543\/revisions"}],"predecessor-version":[{"id":2545,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2543\/revisions\/2545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2544"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}