{"id":2552,"date":"2016-09-19T08:55:53","date_gmt":"2016-09-19T08:55:53","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2552"},"modified":"2020-05-06T10:28:04","modified_gmt":"2020-05-06T17:28:04","slug":"demystifying-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/","title":{"rendered":"Demystifying Threat Intelligence"},"content":{"rendered":"<p>You cannot effectively mitigate cyber threats without threat intelligence.<\/p>\n<p>If you think organizations are covered when it comes to using threat intelligence to counter cyberthreats, think again. Although enterprises have invested in multiple security systems and technologies, most lack the resources, time and tools to really understand and prioritize threats.<\/p>\n<p><strong>What is threat intelligence?<\/strong><\/p>\n<p>According to\u00a0<a href=\"https:\/\/www.gartner.com\/doc\/3222217\/gartner-defines-threat-intelligence\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Gartner<\/a>, \u201cThreat intelligence is evidence-based knowledge (e.g., context, mechanisms, indicators, implications and action-oriented advice) about existing or emerging menaces or hazards to assets.\u201d<\/p>\n<p>A key point is that threat intelligence is not simply data and information \u2013 threat intelligence provides\u00a0<strong>context<\/strong>. Without context on threat type\/category, when a threat was discovered, and the source (e.g. geographic origin), it can be difficult for a security team to prioritize threat indicators and create effective security policies for taking action on existing and emerging threats. Also, investigation of threats is contingent upon being able to obtain context.<\/p>\n<p><strong>Who is creating and using threat intelligence?<\/strong><\/p>\n<p>Historically, government and defense have invested the most to create, use and also distribute threat intelligence data (in a controlled manner). From a private sector perspective, verticals such as financial services, healthcare, retail and technology are leveraging threat intelligence data to understand and act on threats. They typically transact sensitive data (financial, personal) and stand to lose a lot of money (legal, financial costs) if they suffer from a data breach. However, generally speaking, any organization that is using security technologies such as firewall, antivirus and others is using threat intelligence data because these technologies apply threat intelligence data to operate.<\/p>\n<p><strong>What are the benefits of threat intelligence?<\/strong><\/p>\n<p>There are several potential benefits of threat intelligence, including:<\/p>\n<ol>\n<li><strong><u>Rich threat context<\/u><\/strong><strong>\u00a0for faster prioritization and threat response<\/strong>: Given that there are multiple alerts from sources such as SIEM, firewall and other tools, Security Ops and Incident Response teams need to be able to quickly understand which threats to tackle first. Threat intelligence provides these teams the necessary context (what the threat is\/category, when it was first discovered, severity level, etc.).<\/li>\n<li><strong><u>Streamline security operations resources<\/u><\/strong>: With the shortage in cyber security skilled professionals (<a href=\"http:\/\/www.informationweek.com\/strategic-cio\/security-and-risk-strategy\/cyber-security-skills-shortage-leaves-companies-vulnerable\/d\/d-id\/1326463\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.informationweek.com\/strategic-cio\/security-and-risk-strategy\/cyber-security-skills-shorta&#8230;<\/a>) and looming threat of a data breach, organizations cannot depend on scarce security resources to be constantly \u201con top of their game\u201d in deflecting threats. By deploying threat intelligence on various security systems (e.g. firewall) and network control points (e.g.,\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/dns-firewall\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS Firewall<\/a>), that is both reliable and automatically refreshed by the threat intelligence provider itself, organizations aren\u2019t at the \u201cmercy of\u201d scarce security resources who are here today, but may be gone tomorrow.<\/li>\n<li><strong><u>Leverage network intelligence to identify infected devices and targeted users<\/u><\/strong>: DNS, DHCP and IP Address Management (DDI) services provide critical, actionable network intelligence such as the devices used by, IP addresses assigned to and web sites visited by users. By tracking user behavior over time, the security team can create a profile of \u201cnormal\u201d user behavior to use as a baseline and then alert and flag any deviations from that profile which may be indicative of suspicious or rogue activity.\u00a0<em>Combining<\/em>\u00a0network and user context with threat intelligence (e.g. device is trying to connect to a \u201cransomware C&amp;C\u201d server) helps organizations quickly identify infected devices and the users being targeted.<\/li>\n<\/ol>\n<p><em>Unfortunately, despite the potential benefits of threat intelligence, organizations also face some key challenges, including:<\/em><\/p>\n<ul>\n<li><strong>Lacking sufficient threat context\u00a0<\/strong>results in slow incident response. It is very challenging to get enough context to understand and prioritize alerts that organizations have received from various security technologies (e.g. firewall, SIEM). Also, typically threat research and context gathering requires SOC\/security analysts\/researchers to use multiple tools and takes a lot of time.<\/li>\n<li><strong>Triaging (deprioritizing) false positive threat indicators.\u00a0<\/strong>It is critical to be able to quickly learn about the top threat indicators that would cause the most damage to the organization if not addressed. Essentially, you want to filter out the \u201cnoise\u201d and false positives and instead focus on high impact threats.<\/li>\n<li><strong>Overcoming gaps in threat intelligence data.\u00a0<\/strong>Since threat intelligence data is sold and operates in siloes, typically organizations don\u2019t have broad enough coverage against threats. Ideally, you would be able to centrally aggregate and then apply threat intelligence data to any infrastructure of choice without individual threat intelligence vendor imposed limitations.<\/li>\n<li><strong>Not being able to share data internally in controlled manner<\/strong>. Therefore, organizations cannot effectively fulfill data governance (control how, where and what threat intelligence is deployed).<\/li>\n<li><strong>Deploying and managing threat intelligence data problematic<\/strong>. This often requires extensive manual effort and time, both of which are scarce resources in most organizations.<\/li>\n<\/ul>\n<p>We will dive into these challenges in more detail in the 2<sup>nd<\/sup>\u00a0of the 3-part blog series in October. In the meanwhile, you can check out\u00a0<a href=\"http:\/\/info.infoblox.com\/resources-webinars-make-threat-intelligence-actionable-across-cybersecurity-infrastructure?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">this webinar<\/a>\u00a0presented by Sean Tierney, Director of Threat Intelligence at Infoblox, on\u00a0<em>Making Threat Intelligence Actionable across Your Cybersecurity Infrastructure<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You cannot effectively mitigate cyber threats without threat intelligence. If you think organizations are covered when it comes to using threat intelligence to counter cyberthreats, think again. Although enterprises have invested in multiple security systems and technologies, most lack the resources, time and tools to really understand and prioritize threats. What is threat intelligence? According [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":2553,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,32,59,15,36],"class_list":{"0":"post-2552","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-malware","10":"tag-risk","11":"tag-security","12":"tag-threats","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Demystifying Threat Intelligence<\/title>\n<meta name=\"description\" content=\"You cannot effectively mitigate cyber threats without threat intelligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying Threat Intelligence\" \/>\n<meta property=\"og:description\" content=\"You cannot effectively mitigate cyber threats without threat intelligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-19T08:55:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Seema Kathuria\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Seema Kathuria\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/\"},\"author\":{\"name\":\"Seema Kathuria\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\"},\"headline\":\"Demystifying Threat Intelligence\",\"datePublished\":\"2016-09-19T08:55:53+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/\"},\"wordCount\":820,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-1-1.jpg\",\"keywords\":[\"Infoblox\",\"Malware\",\"Risk\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/\",\"name\":\"Demystifying Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-1-1.jpg\",\"datePublished\":\"2016-09-19T08:55:53+00:00\",\"dateModified\":\"2020-05-06T17:28:04+00:00\",\"description\":\"You cannot effectively mitigate cyber threats without threat intelligence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Demystifying Threat Intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/demystifying-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Demystifying Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\",\"name\":\"Seema Kathuria\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"caption\":\"Seema Kathuria\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/seema-kathuria\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Demystifying Threat Intelligence","description":"You cannot effectively mitigate cyber threats without threat intelligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Demystifying Threat Intelligence","og_description":"You cannot effectively mitigate cyber threats without threat intelligence.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/","og_site_name":"Infoblox Blog","article_published_time":"2016-09-19T08:55:53+00:00","article_modified_time":"2020-05-06T17:28:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-1-1.jpg","type":"image\/jpeg"}],"author":"Seema Kathuria","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Seema Kathuria","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/"},"author":{"name":"Seema Kathuria","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a"},"headline":"Demystifying Threat Intelligence","datePublished":"2016-09-19T08:55:53+00:00","dateModified":"2020-05-06T17:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/"},"wordCount":820,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-1-1.jpg","keywords":["Infoblox","Malware","Risk","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/","url":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/","name":"Demystifying Threat Intelligence","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-1-1.jpg","datePublished":"2016-09-19T08:55:53+00:00","dateModified":"2020-05-06T17:28:04+00:00","description":"You cannot effectively mitigate cyber threats without threat intelligence.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-1-1.jpg","width":660,"height":454,"caption":"Demystifying Threat Intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/demystifying-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Demystifying Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a","name":"Seema Kathuria","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","caption":"Seema Kathuria"},"url":"https:\/\/www.infoblox.com\/blog\/author\/seema-kathuria\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2552"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2552\/revisions"}],"predecessor-version":[{"id":2554,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2552\/revisions\/2554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2553"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}