{"id":2676,"date":"2016-06-02T08:51:05","date_gmt":"2016-06-02T08:51:05","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2676"},"modified":"2020-05-06T10:28:06","modified_gmt":"2020-05-06T17:28:06","slug":"the-devaluation-of-personal-identity","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/","title":{"rendered":"The Devaluation of Personal Identity"},"content":{"rendered":"<p>In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.<\/p>\n<p>In the fervor to cover a cyber breech and spread the FUD about the end of all times we have lost sight of the most important factor in all of this, people. Think not in terms of the millions of credit cards or medical records, of finger prints and retinal scans &#8211; stop thinking in such abstract and lets consider what a credit card is.<\/p>\n<p>This data, this information is a sacred trust between business operators and consumers, even more importantly, between people and other people.\u00a0<strong><em>Turning a breech into a statistic is a way of dehumanizing the impact.<\/em><\/strong><\/p>\n<p>Our culture does this with horrible atrocities, like plane crashes (no, I am not comparing a data breech to a plane crash). When we anonymize the data to the point of abstraction we also loose the very nature of what that data actually means.<\/p>\n<p>Its not PII, and its not \u2018trade secrets\u2019, these are our customers, our friends, our parents, our kids. Through our dealings with each other (if we are a business, community website, or other place where data lingers) information that seems to be our customer, friend, co-workers, family, has leaked out into the hands of bad guys. I think the first step in moving to a culture of security is to stop dehumanizing data.<\/p>\n<p>Lets stop calling it data. Lets call it people, or life.<\/p>\n<p>When a breach happens machines don\u2019t care, reporters don\u2019t care, even CEO\u2019s don\u2019t really care, but the actual people affected do (or would, if they knew that their names were among those of \u201cmillions of encrypted files lost, says Major Retailer.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust. In the fervor to cover a cyber breech and spread the FUD about the end of all times we have lost [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":2677,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15],"class_list":{"0":"post-2676","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Devaluation of Personal Identity<\/title>\n<meta name=\"description\" content=\"In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Devaluation of Personal Identity\" \/>\n<meta property=\"og:description\" content=\"In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-02T08:51:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/The-Devaluation-of-Personal-Identity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"The Devaluation of Personal Identity\",\"datePublished\":\"2016-06-02T08:51:05+00:00\",\"dateModified\":\"2020-05-06T17:28:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/\"},\"wordCount\":311,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/The-Devaluation-of-Personal-Identity.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/\",\"name\":\"The Devaluation of Personal Identity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/The-Devaluation-of-Personal-Identity.jpg\",\"datePublished\":\"2016-06-02T08:51:05+00:00\",\"dateModified\":\"2020-05-06T17:28:06+00:00\",\"description\":\"In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/The-Devaluation-of-Personal-Identity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/The-Devaluation-of-Personal-Identity.jpg\",\"width\":660,\"height\":454,\"caption\":\"The Devaluation of Personal Identity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-devaluation-of-personal-identity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Devaluation of Personal Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Devaluation of Personal Identity","description":"In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/","og_locale":"en_US","og_type":"article","og_title":"The Devaluation of Personal Identity","og_description":"In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/","og_site_name":"Infoblox Blog","article_published_time":"2016-06-02T08:51:05+00:00","article_modified_time":"2020-05-06T17:28:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/The-Devaluation-of-Personal-Identity.jpg","type":"image\/jpeg"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"The Devaluation of Personal Identity","datePublished":"2016-06-02T08:51:05+00:00","dateModified":"2020-05-06T17:28:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/"},"wordCount":311,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/The-Devaluation-of-Personal-Identity.jpg","keywords":["Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/","name":"The Devaluation of Personal Identity","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/The-Devaluation-of-Personal-Identity.jpg","datePublished":"2016-06-02T08:51:05+00:00","dateModified":"2020-05-06T17:28:06+00:00","description":"In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of the most important thing, our most sacred trust.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/The-Devaluation-of-Personal-Identity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/The-Devaluation-of-Personal-Identity.jpg","width":660,"height":454,"caption":"The Devaluation of Personal Identity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-devaluation-of-personal-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The Devaluation of Personal Identity"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2676"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2676\/revisions"}],"predecessor-version":[{"id":2678,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2676\/revisions\/2678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2677"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}