{"id":2598,"date":"2016-08-17T11:00:31","date_gmt":"2016-08-17T11:00:31","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2598"},"modified":"2020-05-06T10:28:05","modified_gmt":"2020-05-06T17:28:05","slug":"getting-your-arms-around-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/","title":{"rendered":"Getting Your Arms Around Cybersecurity"},"content":{"rendered":"<p>Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.<\/p>\n<p>Organizations should rely on multiple sources of threat intelligence the same as they rely on notification of security events from all across their network \u2013 firewalls, endpoints, you name it. The problem then becomes centrally aggregating and normalizing that data from multiple sources and applying it to detections and investigations.<\/p>\n<p>Enterprises need to get better at gathering and acting on threat intelligence within their security infrastructure. Join me on Tuesday, August 23<sup>rd<\/sup>\u00a0for a 45-minute\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1239617\/EE717243AE01A246FCA0E12D8F0DC4D4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">webinar<\/a>\u00a0titled \u201cMaking Threat Intelligence Actionable Across Your Cybersecurity Infrastructure.\u201d The webinar will help you understand how to bring together cybersecurity data and analyze it even better.<\/p>\n<p>The webinar will reveal:<\/p>\n<ul>\n<li>Best practices for investigating, using, and sharing threat intelligence<\/li>\n<li>How you can quickly get contextual information from multiple threat intelligence sources<\/li>\n<li>How to transition from an \u201cearly adopter\u201d to a \u201cpower user\u201d of threat intelligence<\/li>\n<\/ul>\n<p>Get smarter about all your sources of security data. Register\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1239617\/EE717243AE01A246FCA0E12D8F0DC4D4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important. Organizations should rely [&hellip;]<\/p>\n","protected":false},"author":262,"featured_media":2599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15,48,36],"class_list":{"0":"post-2598","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"tag-threat","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Getting Your Arms Around Cybersecurity<\/title>\n<meta name=\"description\" content=\"Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting Your Arms Around Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-17T11:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sean Tierney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Tierney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/\"},\"author\":{\"name\":\"Sean Tierney\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\"},\"headline\":\"Getting Your Arms Around Cybersecurity\",\"datePublished\":\"2016-08-17T11:00:31+00:00\",\"dateModified\":\"2020-05-06T17:28:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/\"},\"wordCount\":209,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Threat\",\"Threats\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/\",\"name\":\"Getting Your Arms Around Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"datePublished\":\"2016-08-17T11:00:31+00:00\",\"dateModified\":\"2020-05-06T17:28:05+00:00\",\"description\":\"Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Getting Your Arms Around Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/getting-your-arms-around-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Getting Your Arms Around Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\",\"name\":\"Sean Tierney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"caption\":\"Sean Tierney\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/sean-tierney\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Getting Your Arms Around Cybersecurity","description":"Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Getting Your Arms Around Cybersecurity","og_description":"Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/","og_site_name":"Infoblox Blog","article_published_time":"2016-08-17T11:00:31+00:00","article_modified_time":"2020-05-06T17:28:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","type":"image\/jpeg"}],"author":"Sean Tierney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Tierney","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/"},"author":{"name":"Sean Tierney","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e"},"headline":"Getting Your Arms Around Cybersecurity","datePublished":"2016-08-17T11:00:31+00:00","dateModified":"2020-05-06T17:28:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/"},"wordCount":209,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","keywords":["Infoblox","Security","Threat","Threats"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/","url":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/","name":"Getting Your Arms Around Cybersecurity","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","datePublished":"2016-08-17T11:00:31+00:00","dateModified":"2020-05-06T17:28:05+00:00","description":"Sometimes the problem isn\u2019t too little insight into security; it may be too much information about potential security risks. Everyone has heard stories of companies breached, not because they had too little security data, but because the volume of security events and threat data made it difficult to discern what was important.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","width":660,"height":454,"caption":"Getting Your Arms Around Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/getting-your-arms-around-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Getting Your Arms Around Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e","name":"Sean Tierney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","caption":"Sean Tierney"},"url":"https:\/\/www.infoblox.com\/blog\/author\/sean-tierney\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/262"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2598"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2598\/revisions"}],"predecessor-version":[{"id":2600,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2598\/revisions\/2600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2599"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}