{"id":2893,"date":"2016-04-01T12:17:21","date_gmt":"2016-04-01T12:17:21","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2893"},"modified":"2020-05-06T10:30:02","modified_gmt":"2020-05-06T17:30:02","slug":"spooks-and-spys","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/","title":{"rendered":"Spook&#8217;s and Spy&#8217;s"},"content":{"rendered":"<p>In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.<\/p>\n<p>But where are these services when it comes to protecting our data? Name-your-huge-retailer is more than happy to collect every click, and nugget of shopping data about you, and profile you into a category (35-50, disposable income, mid-level shopper). But what about using those techniques to profile would-be thieves and malicious actors, using that \u2018spooks\u2019 level knowledge for good (rather than for cash). \u00a0Why can\u2019t we profile the malware makers, code wranglers, and exploiters?<\/p>\n<p>Business models are so concerned with bottom lines, stock prices, and share holder expectations that end users are lost, customers are lost, and so is our humanity.<\/p>\n<p>I am suggesting that if we valued the relationships we have with our customers like we used to, you know in the way back days, if we treasured that data entrusted to us we might be able to do something useful (would Floyd the barber ever allow his customer list to leak out?) . Lets imagine a world where the identity, and PII of our employees and customers was more than a headline or press release.<\/p>\n<p>Where is the Intelligence in Threat Intelligence? Maybe it\u2019s a shift from HumINT\u00a0 (that\u2019s Human Intelligence for you non Military types) to CompuINT? (Is that a word for Computer Intelligence?). The problem might be that we are not savvy like we used to be, remember the cold war? (I don\u2019t) but I can read. We had to worry about Russians under every table; your neighbor could be a spy. Guess what, that browser plugin is a spy, the website your using is a spy. Threat researchers need to see the inherit THREAT in that.<\/p>\n<p>Siren (stealing Jaron Lanier again) servers are collecting mountains of data about us, more about us than we know about ourselves (give me an hour and I can tell you about cousins you don\u2019t know, guess your high school, street you grew up on, or first pets name, and if you\u2019re a millennial its 20 min because I just use Facebook and snap chat). But who is watching the Sirens? Who protects us not from them (different blog) but who protects them (from theft of data)? Why bother as an attacker to steal your data from you when I can steal it from your dating website (see how I ambulance chased that?). Why is it ok to allow these websites this much data? Do they need it? Do you?<\/p>\n<p>It\u2019s a spooky world we are moving into, maybe one where we need to challenge human behavior (and narcissism) to really combat the growing issues we have. Will biometrics solve the identity issue (what happens when that\u2019s hacked? hacking the sensor is easier).<\/p>\n<p>How much data do you collect in your enterprise? Why are you not leveraging that to better profile human behavior? To know what and why your users are doing the things they need to, and should be doing on your network and with your precious data.<\/p>\n<p>Are you talking to your board like this? Talking about human relationships? Talking about what data really is? Why it\u2019s really valuable, and what trust means? I\u2019m not talking about windows, or domains, I mean why don\u2019t you shop at the large retailer now? Why don\u2019t you use your credit card online? Why don\u2019t you turn on your Bluetooth at DefCon? Or do you?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide. But where are these services when it comes to protecting our [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":2894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,15],"class_list":{"0":"post-2893","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Spook&#039;s and Spy&#039;s<\/title>\n<meta name=\"description\" content=\"In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spook&#039;s and Spy&#039;s\" \/>\n<meta property=\"og:description\" content=\"In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-01T12:17:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"Spook&#8217;s and Spy&#8217;s\",\"datePublished\":\"2016-04-01T12:17:21+00:00\",\"dateModified\":\"2020-05-06T17:30:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/\"},\"wordCount\":613,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/\",\"name\":\"Spook's and Spy's\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"datePublished\":\"2016-04-01T12:17:21+00:00\",\"dateModified\":\"2020-05-06T17:30:02+00:00\",\"description\":\"In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"width\":660,\"height\":454,\"caption\":\"Spook's and Spy's\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/spooks-and-spys\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spook&#8217;s and Spy&#8217;s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Spook's and Spy's","description":"In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/","og_locale":"en_US","og_type":"article","og_title":"Spook's and Spy's","og_description":"In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/","og_site_name":"Infoblox Blog","article_published_time":"2016-04-01T12:17:21+00:00","article_modified_time":"2020-05-06T17:30:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","type":"image\/jpeg"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"Spook&#8217;s and Spy&#8217;s","datePublished":"2016-04-01T12:17:21+00:00","dateModified":"2020-05-06T17:30:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/"},"wordCount":613,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","keywords":["Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/","url":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/","name":"Spook's and Spy's","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","datePublished":"2016-04-01T12:17:21+00:00","dateModified":"2020-05-06T17:30:02+00:00","description":"In our modern world we are accustomed to constant monitoring, be that video, email, or our browsing history. We accept (as terms of service) the complete loss of anonymity, and often-even identity all in the name of Siren servers* and the services they provide.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","width":660,"height":454,"caption":"Spook's and Spy's"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/spooks-and-spys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Spook&#8217;s and Spy&#8217;s"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2893"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2893\/revisions"}],"predecessor-version":[{"id":2895,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2893\/revisions\/2895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2894"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}