{"id":4643,"date":"2020-02-04T14:42:17","date_gmt":"2020-02-04T22:42:17","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4643"},"modified":"2020-05-06T10:26:51","modified_gmt":"2020-05-06T17:26:51","slug":"the-best-ways-to-use-ai-to-help-with-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/","title":{"rendered":"The Best Ways To Use AI To Help with Security"},"content":{"rendered":"<p>One of the favorite tools in the Fortune 1000 CISO&#8217;s arsenal for threat protection is the threat intelligence feed. Indeed, the typical enterprise signs up for a wide range of external feeds\u2014some free, some decidedly not, some vertical-specific, others not. Those are then supplemented with extensive data from the enterprise&#8217;s own systems, i.e. the internal reports. These feeds can include commercial feeds, open source feeds, internal logs, Information Sharing and Analysis Centers (ISAC) data, government alerts and media reports of other attack attempts.<\/p>\n<p>From the vantage point of giving security analysts lots of relevant information every day, this plethora of feeds is extremely helpful. But, from the practical perspective of &#8220;how much time can security analysts justify giving those reports every day?,&#8221; these reports deliver less help than desired because it&#8217;s difficult to justify much more than a cursory review of each feed\u2014up and until there&#8217;s an active attack justifying a deeper look, searching for a pattern match. To add to this frustration, when a large active attack happens, all security teams are defending against the attack and fighting the clock. No time to do a deep dive. That&#8217;s where AI comes in.<\/p>\n<p>Artificial Intelligence (AI) can be used to review all internal and external threat feeds, identifying patterns, memorizing all salient details and can constantly apply that to realtime traffic patterns, continuously searching for a match or at least a close match. This would theoretically allow for a near-realtime alert for the security analyst during a messy active attack, something like &#8220;The pattern of the current attack looks 92 percent similar to an attack that hit our largest competitor two months ago. In that attack, the company eventually successfully defended itself by taking this action: XXXXX. Shall I launch a similar defense?&#8221;<\/p>\n<p>A lot has to align for that AI mechanism to work, including that the attacker hasn&#8217;t taken the time to meaningfully alter the attack&#8217;s modus operandi to avoid this kind of detection. But it&#8217;s a wonderful capability and it can only be done with the speed of software.<\/p>\n<p>AI\u2014along with various forms of Machine Learning (ML), which is only one AI capability\u2014can do what a security analyst doesn&#8217;t have the time nor the perfect memory for doing a comprehensive threat intel feed analysis. Consider: When doing the analysis of today&#8217;s feeds, the analyst has no way of knowing which details may be useful 3 months from now. The sad truth is that all details must be retained and the human brain is generally bad at such tasks.<\/p>\n<p>There are many other ways to leverage AI for security. Current AI attacker defense shares some of the thinking behind advanced detection techniques used by anti-virus programs, including heuristic static analysis and, one step beyond, dynamic heuristic analysis. Both go beyond the AV Software classic defense of identifying the patterns of known malware and looking for either an identical match or an extremely close match. The heuristic approaches go one big step up by, instead of looking for specific known malware, they watch what the software does and then guess whether it&#8217;s likely malware.<\/p>\n<p>Heuristic static analysis looks for elements such as library imports, obscured code and packers. Dynamic heuristic analysis takes it one step further by running the malware in a sandbox where it looks at anything the program does, including concerning behaviors such as trying to hide itself, the libraries it calls and whether it tries to make or revise registry entries.<\/p>\n<p>AI can take a similar approach, but can often perform these tasks faster\u2014almost always starting with isolation such as a sandbox. Where AI goes well beyond anti-virus is it&#8217;s access to behavior patterns from lots of different companies as well as detailed internal logs. InfoBlox, for example, leverages curated feeds and weeds out false positives. It then marries the speed and pattern-matching strengths of AI and partners it with security-expert humans, who are able to see the connections that AI can&#8217;t. It&#8217;s just as important to identify a company that is <em>not <\/em>a threat\u2014so that it can be greenlighted to allow business communications to proceed\u2014as it is to identify one that is. False positives can be as problematic as false negatives.<\/p>\n<p>Another important way that AI can help enterprise security efforts is to track and, over time, note how accurate and germane various feeds are for your operations. That information can be used to decide which feeds are renewed and which should be either discontinued or at least deprioritized.<\/p>\n<p>A major concern about threat intel feeds today is that many tend to be generic, lacking the relevance for any one specific company. Things like geography (are these attacks currently being used only in specific high-population geographies? Can we map which, if any, of our locations overlap with the malware&#8217;s attack pattern?), vertical (Is this attack being used again only financial institutions? Healthcare? Military contractors by nation states?) and even company size are highly useful. The goal is to address the intel signal-to-noise ratio so that analysis can be faster and more on-point.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the favorite tools in the Fortune 1000 CISO&#8217;s arsenal for threat protection is the threat intelligence feed. Indeed, the typical enterprise signs up for a wide range of external feeds\u2014some free, some decidedly not, some vertical-specific, others not. Those are then supplemented with extensive data from the enterprise&#8217;s own systems, i.e. the internal [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":4338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[231,15],"class_list":{"0":"post-4643","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-artificial-intelligence","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Best Ways To Use AI To Help with Security - Infoblox Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Best Ways To Use AI To Help with Security\" \/>\n<meta property=\"og:description\" content=\"One of the favorite tools in the Fortune 1000 CISO&#8217;s arsenal for threat protection is the threat intelligence feed. Indeed, the typical enterprise signs up for a wide range of external feeds\u2014some free, some decidedly not, some vertical-specific, others not. Those are then supplemented with extensive data from the enterprise&#8217;s own systems, i.e. the internal [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-04T22:42:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"613\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"The Best Ways To Use AI To Help with Security\",\"datePublished\":\"2020-02-04T22:42:17+00:00\",\"dateModified\":\"2020-05-06T17:26:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/\",\"name\":\"The Best Ways To Use AI To Help with Security - Infoblox Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"datePublished\":\"2020-02-04T22:42:17+00:00\",\"dateModified\":\"2020-05-06T17:26:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"width\":613,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-best-ways-to-use-ai-to-help-with-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Best Ways To Use AI To Help with Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Best Ways To Use AI To Help with Security - Infoblox Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/","og_locale":"en_US","og_type":"article","og_title":"The Best Ways To Use AI To Help with Security","og_description":"One of the favorite tools in the Fortune 1000 CISO&#8217;s arsenal for threat protection is the threat intelligence feed. Indeed, the typical enterprise signs up for a wide range of external feeds\u2014some free, some decidedly not, some vertical-specific, others not. Those are then supplemented with extensive data from the enterprise&#8217;s own systems, i.e. the internal [&hellip;]","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/","og_site_name":"Infoblox Blog","article_published_time":"2020-02-04T22:42:17+00:00","article_modified_time":"2020-05-06T17:26:51+00:00","og_image":[{"width":613,"height":343,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"The Best Ways To Use AI To Help with Security","datePublished":"2020-02-04T22:42:17+00:00","dateModified":"2020-05-06T17:26:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/"},"wordCount":866,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","keywords":["Artificial Intelligence","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/","name":"The Best Ways To Use AI To Help with Security - Infoblox Blog","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","datePublished":"2020-02-04T22:42:17+00:00","dateModified":"2020-05-06T17:26:51+00:00","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","width":613,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-best-ways-to-use-ai-to-help-with-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The Best Ways To Use AI To Help with Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4643"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4643\/revisions"}],"predecessor-version":[{"id":4644,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4643\/revisions\/4644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4338"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}