{"id":2726,"date":"2016-05-10T12:45:47","date_gmt":"2016-05-10T12:45:47","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2726"},"modified":"2020-05-06T10:28:07","modified_gmt":"2020-05-06T17:28:07","slug":"cop-or-spy","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/","title":{"rendered":"Cop or Spy"},"content":{"rendered":"<p>Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?<\/p>\n<p>Sometime ago we shifted our cyber criminal culture to something akin to being cops, yes cops are important, take them away and you get bedlam. But cops (for the most part) investigate crimes that already happened. Just like most cyber security teams do, they investigate breeches or violations after they happen. Why do incident response teams and companies make so much? Why wouldn\u2019t we pay more for people to prevent it in the first place, maybe some sort of front line cyber defense group watching your IP and your users and names, wait we do have some of those (do they work?).<\/p>\n<p>So shift the cyber security model to being Spy\u2019s, not only is it cooler but also it\u2019s more productive. Let machines do the cop part, enforce policy and limit user interaction, humans need to make the hard call, fuzzy logic stuff. Let\u2019s get to a culture where Phillip K. **bleep** is our role model in security and products are \u2018Minority Reporting\u2019 rather than \u2018piles of reporting\u2019?<\/p>\n<p>I think its by security automation, we demand (not ask) that security vendors stop selling us point solutions that meet a specific need but are part of a greater solution. Today you have 7? 10? Security products that talk to each other how, do they meet in the SEIM? How is that working? (Lot\u2019s of swivel chair administration?) Seriously, why can\u2019t my IDS trigger a scan from my vulnerability scanner, triggering an endpoint remediation? STIX and TAXI promise some of this, but I fail to see how they can at all deliver specific solutions from generic protocol, ask a hacker how to compromise STIX and get back to me.<\/p>\n<p>If security professionals continue to accept things as they are, we will be in worse shape in 5 years.\u00a0 Today even the most secure networks work as-if compromised continually. Why is that? Because we cannot even detect most compromises until long after they happen. How long is the average breech-to-detection? (It\u2019s 200 days) seriously? How long is the average remediation? (21 days) seriously?<\/p>\n<p>So lets consider no waiting for the breech, stop-playing cop. Lets dig into our data, know what is valuable in our network. Stop playing cop at the edge and remember that like the Matrix\u00a0 \u2018There is no spoon\u2019 (or in this case there is no edge) the user is the endpoint, not the device.<\/p>\n<p>Lets build a culture of security, secure applications by design, build secure networks, and secure data. Stop thinking encrypt it all, and start thinking \u2018why do we have this in the first place\u2019. Ask your application developers \u2018why do we need the social security number\u2019 or \u2018why do we store that data\u2019 and not \u2018how are we encrypting it\u2019. See where tokenization, and just plain anonymity for our users is possible. A breech is really different when you can report \u2018we don\u2019t have any PII, we don\u2019t store it\u2019<\/p>\n<p>See you at the Casino Royale\u2026I will take a Whiskey Neat<\/p>\n<p>*Jaron Lanier (thanks dude)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":2727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,32,15,36],"class_list":{"0":"post-2726","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-malware","10":"tag-security","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cop or Spy<\/title>\n<meta name=\"description\" content=\"Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cop or Spy\" \/>\n<meta property=\"og:description\" content=\"Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-10T12:45:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cop-or-Spy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"Cop or Spy\",\"datePublished\":\"2016-05-10T12:45:47+00:00\",\"dateModified\":\"2020-05-06T17:28:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cop-or-Spy.jpg\",\"keywords\":[\"Infoblox\",\"Malware\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/\",\"name\":\"Cop or Spy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cop-or-Spy.jpg\",\"datePublished\":\"2016-05-10T12:45:47+00:00\",\"dateModified\":\"2020-05-06T17:28:07+00:00\",\"description\":\"Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cop-or-Spy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cop-or-Spy.jpg\",\"width\":660,\"height\":454,\"caption\":\"Cop or Spy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cop-or-spy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cop or Spy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cop or Spy","description":"Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/","og_locale":"en_US","og_type":"article","og_title":"Cop or Spy","og_description":"Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?\u00a0","og_url":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/","og_site_name":"Infoblox Blog","article_published_time":"2016-05-10T12:45:47+00:00","article_modified_time":"2020-05-06T17:28:07+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cop-or-Spy.jpg","type":"image\/jpeg"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"Cop or Spy","datePublished":"2016-05-10T12:45:47+00:00","dateModified":"2020-05-06T17:28:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/"},"wordCount":573,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cop-or-Spy.jpg","keywords":["Infoblox","Malware","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/","url":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/","name":"Cop or Spy","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cop-or-Spy.jpg","datePublished":"2016-05-10T12:45:47+00:00","dateModified":"2020-05-06T17:28:07+00:00","description":"Which are you? More like 007 or TJ Hooker (which is cooler to you)? \u00a0We all want to be the suave figure in the snappy black tie with a martini shaken, not stirred (personally its whiskey, neat) but you get the idea.\u00a0 What I am asking you are you busy investigating traffic crimes, writing your users tickets like T.J. Hooker?\u00a0 Or are you hunting for Red October?\u00a0","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cop-or-Spy.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cop-or-Spy.jpg","width":660,"height":454,"caption":"Cop or Spy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/cop-or-spy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Cop or Spy"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2726"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2726\/revisions"}],"predecessor-version":[{"id":2728,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2726\/revisions\/2728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2727"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}