{"id":2951,"date":"2016-03-10T20:35:42","date_gmt":"2016-03-10T20:35:42","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2951"},"modified":"2020-05-06T10:30:03","modified_gmt":"2020-05-06T17:30:03","slug":"cops-and-bloggers","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/","title":{"rendered":"Cops and Bloggers"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack. Bloggers are all about reporting what evil deed that has happened like newscasters reporting a plane crash. When was the last time you read a major \u2018security blog\u2019 that gave you information about how to stop something or a new way of thinking about security that might stop a breach before it occurs has a blog provided you with information that helped change how you thought about cyber warfare?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It is always about \u2018that major retail breach\u2019 or that \u2018healthcare breach\u2019. So much deep critical analysis of what went wrong and how it could be prevented in the future, as if an attacker uses the same method every time. Why not\u00a0help people solve real problems, like changing the game and really stopping or at least thwarting cyber crime before it happens (where is the cyber version of The Minority Report?) How about helping computer professionals (and regular people) change their thinking process to better handle the world as it is today (or better yet as it will be). \u00a0Why is William Gibson better at predicting the future of cyber war than your average \u2018expert\u2019? (Have you ever ask the bloggers if they can hack? Or where did they learn? Or how they learned). I digress.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The modern blogger has you playing a Zero-Sum game and this is making you (the security professional into a sort of cyber cop). It&#8217;s not the model we need to defend our intellectual property. Why you ask? Cops are crucial for our society, without cops we would have bedlam!<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Cops (or in our case, post-breach security analysts) all work on the premise that the perpetrator has been caught (or detected), has done something detectible and the evidence has been recorded, and that others will do things just like this. Its how we get laws in the first place, after the fact.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Let&#8217;s look at this like a legal system, I break into your computer using an exploit in Wi-Fi, so we make laws that say \u2018don\u2019t break in with Wi-Fi\u2019. How did this make you safer? How did it stop the exploit or fix the inherent flaws in Wi-Fi? It didn\u2019t, and its why \u201ccyber-cops\u201d don\u2019t really stop crime, they clean up after it.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">As Cyber-Security professionals we need to shift out of \u2018Cop \u2013mode\u2019 thinking, that is, stop enforcing laws (mostly on law abiding citizens, our users), stop investigating crimes (post breach log analysis, and what-the-heck-happened analyst work) and move to predictive, proactive, productive security work.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">So stop being a cop and I won\u2019t be a blogger<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack. Bloggers are all about reporting what evil deed that has happened like newscasters reporting a plane crash. When was the last time you read a major \u2018security blog\u2019 that gave you information about how to stop something [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":2952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,15,36],"class_list":{"0":"post-2951","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-security","10":"tag-threats","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cops and Bloggers<\/title>\n<meta name=\"description\" content=\"The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cops and Bloggers\" \/>\n<meta property=\"og:description\" content=\"The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-10T20:35:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-security-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"Cops and Bloggers\",\"datePublished\":\"2016-03-10T20:35:42+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/\"},\"wordCount\":451,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-security-banner.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/\",\"name\":\"Cops and Bloggers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-security-banner.jpg\",\"datePublished\":\"2016-03-10T20:35:42+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"description\":\"The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-security-banner.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-security-banner.jpg\",\"width\":660,\"height\":454,\"caption\":\"Futuristic Police Badge\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cops-and-bloggers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cops and Bloggers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cops and Bloggers","description":"The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/","og_locale":"en_US","og_type":"article","og_title":"Cops and Bloggers","og_description":"The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/","og_site_name":"Infoblox Blog","article_published_time":"2016-03-10T20:35:42+00:00","article_modified_time":"2020-05-06T17:30:03+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-security-banner.jpg","type":"image\/jpeg"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"Cops and Bloggers","datePublished":"2016-03-10T20:35:42+00:00","dateModified":"2020-05-06T17:30:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/"},"wordCount":451,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-security-banner.jpg","keywords":["Infoblox","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/","url":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/","name":"Cops and Bloggers","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-security-banner.jpg","datePublished":"2016-03-10T20:35:42+00:00","dateModified":"2020-05-06T17:30:03+00:00","description":"The modern cyber blogger is a sort of ambulance chaser, waiting for the next big breach or hack.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-security-banner.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-security-banner.jpg","width":660,"height":454,"caption":"Futuristic Police Badge"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/cops-and-bloggers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Cops and Bloggers"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2951"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2951\/revisions"}],"predecessor-version":[{"id":2953,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2951\/revisions\/2953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2952"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}