{"id":2802,"date":"2016-04-20T08:21:00","date_gmt":"2016-04-20T08:21:00","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2802"},"modified":"2020-05-06T10:30:02","modified_gmt":"2020-05-06T17:30:02","slug":"information-security-where-to-start","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/","title":{"rendered":"Information Security: Where to Start"},"content":{"rendered":"<h1 id=\"toc-hId--1092934759\">It Often Starts With Anarchy<\/h1>\n<p>As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences. The good guys are few, and the sheriffs are too far between. Maintaining the peace rests upon you; whether you asked for the job or not. Swiftly reacting to intrusive foes may grant you the right to fight another day, but getting ahead of security risks warrants a proactive, strategic plan with structured management oversight.<\/p>\n<h1 id=\"toc-hId--1064305608\">Assemble Your Strategy<\/h1>\n<p>Security spending is\u00a0<a href=\"http:\/\/www.gartner.com\/newsroom\/id\/3135617\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">estimated<\/a>\u00a0to exceed $75 billion dollars US in 2016. While it\u2019s good news that security spend is increasing, there\u2019s a broad range of security products to choose from and knowing where to allocate funds requires a strategy.<\/p>\n<p>Security programs are often derived from venerable frameworks such as the\u00a0<a href=\"https:\/\/www.sans.org\/critical-security-controls\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SANS Critical Security Controls<\/a>\u00a0or\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27000-series\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ISO 27000<\/a>. Although comprehensive, these frameworks can be daunting at first. A more simplistic approach revolves around building a security program based upon a\u00a0<strong>limited<\/strong>\u00a0set of foundational pillars which serve as security program categories or \u201ctracks.\u201d For an emergent security program, about four to five pillars should be sufficient. For example:<\/p>\n<ol>\n<li><strong>Business Alignment &#8211;\u00a0<\/strong>Security should support the business and must not impede company objectives.<\/li>\n<li><strong>Security Awareness<\/strong>\u00a0&#8211; The securing of human beings and the internal \u201cmarketing \/ PR\u201d of information security.<\/li>\n<li><strong>Governance and Compliance<\/strong>\u00a0&#8211; The management aspects of security, such as planning and measurement, as well as adherence to internal and external regulations.<\/li>\n<li><strong>Vulnerability Management and Incident Response<\/strong>\u00a0&#8211; Finding and managing vulnerabilities as well as responding to crises.<\/li>\n<\/ol>\n<p>Formal security frameworks have granular controls that conveniently \u201croll up\u201d into these pillars. For example, the SANS Critical Control 20 (Penetration Tests and Red Team Exercises) can be aligned with the Vulnerability Management pillar. Likewise, the ISO 27001 control A.15.2.1 (Monitoring and review of supplier services) can easily align with governance and compliance. Taking a page from agile methodologies, the objective here is to start small with a handful of pillars, then over time scale into something more industrial strength without much \u201cthrow-away\u201d work. Essentially pillars are baby steps that pave the way to broader ISO or SANS-type programs.<\/p>\n<h1 id=\"toc-hId--1035676457\">Find Your Pillars<\/h1>\n<p>As noted, pillars represent your security program\u2019s high-level \u201ctracks.\u201d Your enterprise will likely have different pillars, and you may have more or less than five. Regardless, these four simple steps can help identify your organization\u2019s security pillars:<\/p>\n<ol>\n<li>Identify what\u2019s important to the organization; be it money, intellectual property, customers, etc.<\/li>\n<li>Enumerate potential threats posed to the items identified in step 1.<\/li>\n<li>Determine protection and mitigation strategies to prevent threats from intersecting with important assets.<\/li>\n<li>Iterate through steps 1-3, and categorize activities into fairly general categories. By consolidating categories wherever possible, categories will start to form distinct pillars.<\/li>\n<\/ol>\n<p>It\u2019s not always easy to identify risks; especially when you are unfamiliar with the current threat landscape. Fortunately, external assistance may prove useful in such situations. A security consultant can provide comprehensive threat models, and security companies like Infoblox can provide\u00a0<a href=\"https:\/\/www.infoblox.com\/catchmalware?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">free security assessments<\/a>\u00a0that identify active threats on your network which were previously invisible.<\/p>\n<h1 id=\"toc-hId--1007047306\">Manage Security as a Program<\/h1>\n<p>Once you\u2019ve identified the general pillars of your security program, each pillar will start to develop associated sets of projects and ongoing activities around improving security posture. There are numerous tools in the security expert\u2019s repertoire to support this effort, but a couple staple artifacts worth calling out are the risk register and operational security reviews.<\/p>\n<p>The risk register is essentially where one lists risks, and summarizes how these risks are being managed. It\u2019s not rocket science, and contrary to popular belief, it doesn\u2019t require the purchase of exorbitantly expensive software. In fact for newly-founded security programs, a\u00a0<a href=\"https:\/\/www.google.com\/#q=Risk+Register+Template\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">spreadsheet<\/a>\u00a0works just fine.<\/p>\n<p>While the risk register may be appropriate for executive review, operational security reviews are intended to track progress (or lack thereof) on a more tactical level. For instance, tracking progress in the \u201cvulnerability management\u201d pillar may warrant metrics which track the number of high-risk system vulnerabilities, exploited vulnerabilities, average time to patch, and so on. These metrics must resonate with system owners and those responsible for day-to-day operational security so that they have actionable data to improve security posture.<\/p>\n<p>In summary, a security program is a continuous journey that never ends. Like most journeys, it starts with a single step, and will certainly have pitfalls along the way. Perfect security is unrealistic, so don\u2019t be afraid to fail. How we manage and adapt are infinitely more important.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences. The good guys are few, and the sheriffs are too [&hellip;]<\/p>\n","protected":false},"author":189,"featured_media":2803,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15],"class_list":{"0":"post-2802","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Information Security: Where to Start<\/title>\n<meta name=\"description\" content=\"It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security: Where to Start\" \/>\n<meta property=\"og:description\" content=\"It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-20T08:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Information-Security-Where-to-Start.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Torre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Torre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/\"},\"author\":{\"name\":\"David Torre\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cabca98cbbc530c7bc337de7253f0674\"},\"headline\":\"Information Security: Where to Start\",\"datePublished\":\"2016-04-20T08:21:00+00:00\",\"dateModified\":\"2020-05-06T17:30:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/\"},\"wordCount\":779,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Information-Security-Where-to-Start.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/\",\"name\":\"Information Security: Where to Start\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Information-Security-Where-to-Start.jpg\",\"datePublished\":\"2016-04-20T08:21:00+00:00\",\"dateModified\":\"2020-05-06T17:30:02+00:00\",\"description\":\"It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Information-Security-Where-to-Start.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Information-Security-Where-to-Start.jpg\",\"width\":660,\"height\":454,\"caption\":\"Information Security: Where to Start\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/information-security-where-to-start\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security: Where to Start\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cabca98cbbc530c7bc337de7253f0674\",\"name\":\"David Torre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f5e73158b29fa9090b287223ecde859ca31d6e15f42114b851891ce42aed1f4?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f5e73158b29fa9090b287223ecde859ca31d6e15f42114b851891ce42aed1f4?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f5e73158b29fa9090b287223ecde859ca31d6e15f42114b851891ce42aed1f4?s=96&d=blank&r=g\",\"caption\":\"David Torre\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/david-torre\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security: Where to Start","description":"It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/","og_locale":"en_US","og_type":"article","og_title":"Information Security: Where to Start","og_description":"It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/","og_site_name":"Infoblox Blog","article_published_time":"2016-04-20T08:21:00+00:00","article_modified_time":"2020-05-06T17:30:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Information-Security-Where-to-Start.jpg","type":"image\/jpeg"}],"author":"David Torre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Torre","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/"},"author":{"name":"David Torre","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cabca98cbbc530c7bc337de7253f0674"},"headline":"Information Security: Where to Start","datePublished":"2016-04-20T08:21:00+00:00","dateModified":"2020-05-06T17:30:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/"},"wordCount":779,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Information-Security-Where-to-Start.jpg","keywords":["Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/","url":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/","name":"Information Security: Where to Start","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Information-Security-Where-to-Start.jpg","datePublished":"2016-04-20T08:21:00+00:00","dateModified":"2020-05-06T17:30:02+00:00","description":"It Often Starts With Anarchy As far as we\u2019ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Information-Security-Where-to-Start.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Information-Security-Where-to-Start.jpg","width":660,"height":454,"caption":"Information Security: Where to Start"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/information-security-where-to-start\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Information Security: Where to Start"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cabca98cbbc530c7bc337de7253f0674","name":"David Torre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8f5e73158b29fa9090b287223ecde859ca31d6e15f42114b851891ce42aed1f4?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8f5e73158b29fa9090b287223ecde859ca31d6e15f42114b851891ce42aed1f4?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f5e73158b29fa9090b287223ecde859ca31d6e15f42114b851891ce42aed1f4?s=96&d=blank&r=g","caption":"David Torre"},"url":"https:\/\/www.infoblox.com\/blog\/author\/david-torre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2802"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2802\/revisions"}],"predecessor-version":[{"id":2804,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2802\/revisions\/2804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2803"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}