{"id":4236,"date":"2019-11-26T10:30:08","date_gmt":"2019-11-26T18:30:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4236"},"modified":"2020-05-06T10:26:53","modified_gmt":"2020-05-06T17:26:53","slug":"an-introduction-to-mitre-attck","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/","title":{"rendered":"An Introduction to MITRE ATT&amp;CK"},"content":{"rendered":"<p>The MITRE ATT&amp;CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. As an important knowledge base, MITRE ATT&amp;CK enables anyone on the cyber defense team to review and contrast attacker activity, and then understand the best options for defense.<\/p>\n<p>MITRE ATT&amp;CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corporation, a nonprofit, in 2015. MITRE does work for U.S. Government agencies in a wide variety of areas.\u00a0<\/p>\n<p>This <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/introduction-to-mitre-attck\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a> provides an introduction to MITRE ATT&amp;CK, an overview of how MITRE ATT&amp;CK is organized, and a description of the matrix and the tactics and techniques that it contains. It also shares information on various attack groups and the adversary emulation plans that might be applicable. Finally, it shares details on the use cases that make MITRE ATT&amp;CK compelling.<\/p>\n<p>MITRE ATT&amp;CK enables you to think like an attacker. Where are the gaps in protection based upon likely threats? This helps you balance your defensive measures against the steps an attacker will take. The end goal in using MITRE ATT&amp;CK is to make better decisions about assessing risks, deploying new security controls, and better defending your network.\u00a0<\/p>\n<h2>Understanding the MITRE ATT&amp;CK\u2122 Framework<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4240\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Modified-FIgure-1-300x146.png\" alt=\"\" width=\"378\" height=\"184\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-FIgure-1-300x146.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-FIgure-1-768x374.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-FIgure-1-1024x499.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-FIgure-1.png 1554w\" sizes=\"auto, (max-width: 378px) 100vw, 378px\" \/><\/p>\n<p>Figure 1: &#8211; Cyber Kill Chain\u00ae Mapped to MITRE PRE-ATT&amp;CK\u2122 and ATT&amp;CK\u2122<\/p>\n<p>MITRE ATT&amp;CK is not the only cybersecurity framework. There are several other important security frameworks, such as The Lockheed Martin Cyber Kill Chain\u00ae, ISO\/IEC 27001, the NIST cybersecurity framework, and COBIT. MITRE ATT&amp;CK is distinguished most by the very deep and detailed data on what the attack looks like from the attacker\u2019s perspective. Conceptually, MITRE ATT&amp;CK covers a subset of the Cyber Kill Chain but goes into much greater depth and detail. There is also MITRE PRE-ATT&amp;CK, which helps cyber defenders prevent an attack before the attacker can gain access to the network.\u00a0<\/p>\n<h2>Tactics, Techniques, and Procedures<\/h2>\n<p>The MITRE ATT&amp;CK Enterprise matrix provides a navigable taxonomy to all techniques that might involve Windows, Mac, and Linux. Each of the twelve tactics includes from between 9 to 67 techniques that might be used. In some cases, techniques may be used by several tactics. Here is a partial view although not all of the tactics and techniques are visible.\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4239\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Modified-Figure-2-300x174.png\" alt=\"\" width=\"372\" height=\"216\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-Figure-2-300x174.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-Figure-2-768x446.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-Figure-2-1024x595.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Modified-Figure-2.png 1474w\" sizes=\"auto, (max-width: 372px) 100vw, 372px\" \/><\/p>\n<p>Tactics represent the goals the attacker is trying to achieve. Techniques represent the different ways that cyber attackers can achieve the goals and objectives of the tactic. There you will see data that provides a more detailed explanation of the technique, possible mitigations, and examples of malware associated with the use of this technique by cyber attackers.\u00a0<\/p>\n<p>In summary, MITRE ATT&amp;CK is a highly powerful open-source tool to understand and classify cyber attacker tactics, techniques, and procedures. By using MITRE ATT&amp;CK, Cyber defense teams can better design a comprehensive strategy for security controls against the likely threats and the tactics and techniques they will exhibit, assess risks, and then prioritize and remediate gaps in the cyber defense.<\/p>\n<p>To learn more, please download our <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/introduction-to-mitre-attck\" target=\"_blank\" rel=\"noopener noreferrer\">white paper here<\/a>.<\/p>\n<p>Cyber Kill Chain\u00ae is a registered trademark of Lockheed Martin Corporation<br \/>\nMITRE ATT&amp;CK\u2122 is a trademark of The MITRE Corporation<\/p>\n<p><a href=\"https:\/\/trademarks.justia.com\/856\/75\/cyber-kill-85675496.html\">https:\/\/trademarks.justia.com\/856\/75\/cyber-kill-85675496.html<\/a><br \/>\n<a href=\"https:\/\/www.iso.org\/isoiec-27001-information-security.html\">https:\/\/www.iso.org\/isoiec-27001-information-security.html<\/a><br \/>\n<a href=\"https:\/\/www.nist.gov\/cyberframework\">https:\/\/www.nist.gov\/cyberframework<\/a><br \/>\n<a href=\"http:\/\/www.isaca.org\/cobit\/pages\/default.aspx\">http:\/\/www.isaca.org\/cobit\/pages\/default.aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The MITRE ATT&amp;CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. As an important knowledge base, MITRE ATT&amp;CK enables anyone on the cyber defense team to review and contrast attacker activity, and then understand the best options for defense. MITRE ATT&amp;CK (Adversarial Tactics, Techniques, [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":3892,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[153,169,15],"class_list":{"0":"post-4236","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone","9":"tag-mitreattck","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An Introduction to MITRE ATT&amp;CK<\/title>\n<meta name=\"description\" content=\"The MITRE ATT&amp;CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Introduction to MITRE ATT&amp;CK\" \/>\n<meta property=\"og:description\" content=\"The MITRE ATT&amp;CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-26T18:30:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/gears-and-hands.png\" \/>\n\t<meta property=\"og:image:width\" content=\"540\" \/>\n\t<meta property=\"og:image:height\" content=\"406\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"An Introduction to MITRE ATT&amp;CK\",\"datePublished\":\"2019-11-26T18:30:08+00:00\",\"dateModified\":\"2020-05-06T17:26:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/gears-and-hands.png\",\"keywords\":[\"BloxOne\u00ae\",\"MITREATT&amp;CK\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/\",\"name\":\"An Introduction to MITRE ATT&CK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/gears-and-hands.png\",\"datePublished\":\"2019-11-26T18:30:08+00:00\",\"dateModified\":\"2020-05-06T17:26:53+00:00\",\"description\":\"The MITRE ATT&CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/gears-and-hands.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/gears-and-hands.png\",\"width\":540,\"height\":406,\"caption\":\"Gears and Hands\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/an-introduction-to-mitre-attck\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An Introduction to MITRE ATT&amp;CK\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An Introduction to MITRE ATT&CK","description":"The MITRE ATT&CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/","og_locale":"en_US","og_type":"article","og_title":"An Introduction to MITRE ATT&amp;CK","og_description":"The MITRE ATT&CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/","og_site_name":"Infoblox Blog","article_published_time":"2019-11-26T18:30:08+00:00","article_modified_time":"2020-05-06T17:26:53+00:00","og_image":[{"width":540,"height":406,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/gears-and-hands.png","type":"image\/png"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"An Introduction to MITRE ATT&amp;CK","datePublished":"2019-11-26T18:30:08+00:00","dateModified":"2020-05-06T17:26:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/"},"wordCount":589,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/gears-and-hands.png","keywords":["BloxOne\u00ae","MITREATT&amp;CK","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/","url":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/","name":"An Introduction to MITRE ATT&CK","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/gears-and-hands.png","datePublished":"2019-11-26T18:30:08+00:00","dateModified":"2020-05-06T17:26:53+00:00","description":"The MITRE ATT&CK\u2122 framework is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/gears-and-hands.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/gears-and-hands.png","width":540,"height":406,"caption":"Gears and Hands"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/an-introduction-to-mitre-attck\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"An Introduction to MITRE ATT&amp;CK"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4236"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4236\/revisions"}],"predecessor-version":[{"id":4383,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4236\/revisions\/4383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3892"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}