{"id":5046,"date":"2020-04-08T14:35:57","date_gmt":"2020-04-08T21:35:57","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5046"},"modified":"2020-12-16T17:30:08","modified_gmt":"2020-12-17T01:30:08","slug":"primary-applications-of-the-mitre-attck-framework","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/","title":{"rendered":"Primary Applications of the MITRE ATT&#038;CK Framework"},"content":{"rendered":"<p>The MITRE ATT&amp;CK framework is being widely adopted by the cybersecurity industry because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. In this blog, we going to describe the primary ways MITRE ATT&amp;CK data is being used by the cybersecurity professionals to identify gaps and strengthen defenses.<\/p>\n<p>Before we proceed, let\u2019s step back and take a moment to understand what is the MITRE ATT&amp;CK framework and how it can be used to deconstruct various types of cyberattacks.<\/p>\n<h2>What is MITRE ATT&amp;CK?<\/h2>\n<p><a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK<\/a> is a globally accessible knowledge base of tactics and techniques used by adversaries to launch cyberattacks. MITRE is a government funded research organization that started the project of gathering and curating real-world attack scenarios back in 2013. ATT&amp;CK stands for Adversarial Tactics, Techniques, and Common Knowledge, which is growing repository of attacks openly shared with government, education and commercial organizations.<\/p>\n<p><em>Tactics and techniques<\/em> are a new way of representing the taxonomy of cyberattacks. Instead of looking at the results of a cyberattack after it is successful as <em>Indicators of Compromise (IoCs)<\/em>, security analysts can use tactics and techniques to see how an attack is propagated as it is in progress. Tactics represents the \u201cwhy\u201d of the attack, techniques represent \u201chow\u201d the adversary achieves the tactical objective, and CK is the documented use of tactics and techniques by adversaries.<\/p>\n<h2>Understanding MITRE ATT&amp;CK Matrices<\/h2>\n<p>The MITRE ATT&amp;CK matrix organizes all known attack tactics and techniques into an easy to understand format, with the 11 different tactics that represent the different stages of the attack across the top. Multiple techniques to accomplish each tactic is listed down each column. A successful cyberattack sequence is built from moving from the leftmost column (Initial Access) to the rightmost column (Exfiltration).<\/p>\n<p><a href=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/MITRE-1-1024x280.png\" data-lity=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5047 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/MITRE-1-1024x280.png\" alt=\"\" width=\"1024\" height=\"280\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/MITRE-1-1024x280.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/MITRE-1-300x82.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/MITRE-1-768x210.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/MITRE-1.png 1330w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>As shown in the Table snippet above taken from the <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/\">Enterprise MITRE ATT&amp;CK matrix<\/a>, it lists 3 different techniques of launching a Spearphishing attack \u2013 via malicious file attachment, malicious link, and rogue service. The rest of the table is a comprehensive list of techniques for launching various cyberattacks in the enterprise. MITRE also has curated lists for <a href=\"https:\/\/attack.mitre.org\/matrices\/mobile\/\">attacks on mobile devices<\/a>, <a href=\"https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page\">industrial control systems<\/a>, and <a href=\"https:\/\/attack.mitre.org\/matrices\/pre\/\">pre-attack sequences<\/a> that are steps taken by adversaries before an attack is launched.<\/p>\n<h2>Primary Applications of the MITRE ATT&amp;CK Framework<\/h2>\n<p>Beyond offering a common language for describing cyberattacks, the ATT&amp;CK framework is being used by cybersecurity professionals for testing adversarial behavior and strength of cyber defenses in the following ways.<\/p>\n<ul>\n<li><strong>Breach and Attack Simulation<\/strong>: it can be used to simulate attack scenarios and validate your security controls against the behavior of well-known attacks.<\/li>\n<li><strong>Red and Blue Teaming<\/strong>: it can be used by red teams to model real-world attacks using penetration testing. Blue teams can improve defensive measures to block such attacks.<\/li>\n<li><strong>SOC Maturity Assessment<\/strong>: it can be used to determine how effective your security operations center (SOC) is at detecting, analyzing and responding to incidents.<\/li>\n<li><strong>Threat Intelligence Enrichment<\/strong>: it can be used to enrich threat intelligence data by understanding adversary group profiles and their behaviors.<\/li>\n<li><strong>Vendor Analysis<\/strong>: Vendor products widely vary in their effectiveness. ATT&amp;CK provides ways to compare product capabilities to address common threats and objectively determine which vendor better meets your needs.<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<p>MITRE ATT&amp;CK provides a powerful open-source tool that enables you to classify tactics and techniques of various well known cyberattacks. MITRE has documented a common taxonomy of attacks and makes it easy to communicate them across various cybersecurity vendors. As a result, cybersecurity practitioners can better design a comprehensive strategy for security controls to defend against likely threats and prioritize security incidents that need to be mitigated to reduce business risks.<\/p>\n<p>For more details read the <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/introduction-to-mitre-attck\">Infoblox whitepaper<\/a> on this topic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The MITRE ATT&amp;CK framework is being widely adopted by the cybersecurity industry because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. In this blog, we going to describe the primary ways MITRE ATT&amp;CK data [&hellip;]<\/p>\n","protected":false},"author":333,"featured_media":3599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[253,15,370,371],"class_list":{"0":"post-5046","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-mitre-attck","9":"tag-security","10":"tag-higher-education","11":"tag-education","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Primary Applications of the MITRE ATT&amp;CK Framework<\/title>\n<meta name=\"description\" content=\"The MITRE ATT&amp;CK framework is being widely adopted by cybersecurity industry, because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. Primary Applications of the MITRE ATT&amp;CK Framework\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Primary Applications of the MITRE ATT&amp;CK Framework\" \/>\n<meta property=\"og:description\" content=\"The MITRE ATT&amp;CK framework is being widely adopted by cybersecurity industry, because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. Primary Applications of the MITRE ATT&amp;CK Framework\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-08T21:35:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-17T01:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Narayan Makaram\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Narayan Makaram\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/\"},\"author\":{\"name\":\"Narayan Makaram\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e590a2634abc746b9ccc3c0439784d14\"},\"headline\":\"Primary Applications of the MITRE ATT&#038;CK Framework\",\"datePublished\":\"2020-04-08T21:35:57+00:00\",\"dateModified\":\"2020-12-17T01:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/\"},\"wordCount\":661,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"keywords\":[\"MITRE ATT&amp;CK\",\"Security\",\"Higher Education\",\"education\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/\",\"name\":\"Primary Applications of the MITRE ATT&CK Framework\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"datePublished\":\"2020-04-08T21:35:57+00:00\",\"dateModified\":\"2020-12-17T01:30:08+00:00\",\"description\":\"The MITRE ATT&CK framework is being widely adopted by cybersecurity industry, because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. Primary Applications of the MITRE ATT&CK Framework\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Enhanced IPAM with Network Insight\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/primary-applications-of-the-mitre-attck-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Primary Applications of the MITRE ATT&#038;CK Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e590a2634abc746b9ccc3c0439784d14\",\"name\":\"Narayan Makaram\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_333_1586469017-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_333_1586469017-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_333_1586469017-96x96.jpg\",\"caption\":\"Narayan Makaram\"},\"description\":\"Narayan Makaram, CEO, Cybernetix Security, has over 20 years of experience, leading product marketing, product management and strategic alliances at several companies including Arctic Wolf Networks, Imperva, Tenable, FireEye, ArcSight and Hewlett-Packard. His expertise are in the areas of Managed Detection and Response (MDR), Network Security, Application Security, Security Information and Event Management(SIEM) and Data Protection.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/narayan-makaram\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Primary Applications of the MITRE ATT&CK Framework","description":"The MITRE ATT&CK framework is being widely adopted by cybersecurity industry, because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. Primary Applications of the MITRE ATT&CK Framework","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/","og_locale":"en_US","og_type":"article","og_title":"Primary Applications of the MITRE ATT&CK Framework","og_description":"The MITRE ATT&CK framework is being widely adopted by cybersecurity industry, because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. Primary Applications of the MITRE ATT&CK Framework","og_url":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/","og_site_name":"Infoblox Blog","article_published_time":"2020-04-08T21:35:57+00:00","article_modified_time":"2020-12-17T01:30:08+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","type":"image\/jpeg"}],"author":"Narayan Makaram","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Narayan Makaram","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/"},"author":{"name":"Narayan Makaram","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e590a2634abc746b9ccc3c0439784d14"},"headline":"Primary Applications of the MITRE ATT&#038;CK Framework","datePublished":"2020-04-08T21:35:57+00:00","dateModified":"2020-12-17T01:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/"},"wordCount":661,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","keywords":["MITRE ATT&amp;CK","Security","Higher Education","education"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/","url":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/","name":"Primary Applications of the MITRE ATT&CK Framework","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","datePublished":"2020-04-08T21:35:57+00:00","dateModified":"2020-12-17T01:30:08+00:00","description":"The MITRE ATT&CK framework is being widely adopted by cybersecurity industry, because it provides a common language to communicate different methods by which threat actors (adversaries) can launch real-world cyberattacks, and how they can bypass your defenses to accomplish their mission. Primary Applications of the MITRE ATT&CK Framework","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","width":660,"height":454,"caption":"Enhanced IPAM with Network Insight"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/primary-applications-of-the-mitre-attck-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Primary Applications of the MITRE ATT&#038;CK Framework"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e590a2634abc746b9ccc3c0439784d14","name":"Narayan Makaram","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_333_1586469017-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_333_1586469017-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_333_1586469017-96x96.jpg","caption":"Narayan Makaram"},"description":"Narayan Makaram, CEO, Cybernetix Security, has over 20 years of experience, leading product marketing, product management and strategic alliances at several companies including Arctic Wolf Networks, Imperva, Tenable, FireEye, ArcSight and Hewlett-Packard. His expertise are in the areas of Managed Detection and Response (MDR), Network Security, Application Security, Security Information and Event Management(SIEM) and Data Protection.","url":"https:\/\/www.infoblox.com\/blog\/author\/narayan-makaram\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/333"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5046"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5046\/revisions"}],"predecessor-version":[{"id":5126,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5046\/revisions\/5126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3599"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}