{"id":5088,"date":"2020-04-15T11:39:52","date_gmt":"2020-04-15T18:39:52","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5088"},"modified":"2020-05-06T10:26:49","modified_gmt":"2020-05-06T17:26:49","slug":"how-to-protect-and-defend-against-iot-in-a-5g-world","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/","title":{"rendered":"How To Protect\u2014And Defend Against\u2014IoT In A 5G World"},"content":{"rendered":"<p>Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.<\/p>\n<p>For starters, IoT means two things to CISOs and CSOs. First, the IoT devices need to be protected from attackers trying to take over the devices and then use it either as a convenient backdoor to your network or to actively use it as an attack tool. Specifically, it would be an attacker that your systems will initially identify as a trusted ally. That&#8217;s a bad combo.<\/p>\n<p>Due to a wide range of reasons (some evil, some merely employees unintentionally violating policies and procedures), most CIOs and CISOs have very limited visibility into IoT devices. To state the obvious, you can&#8217;t protect what you don&#8217;t know about and it&#8217;s harder to fight an attacker who has taken over a trusted device that neither of your teams knew existed.<\/p>\n<p>Let&#8217;s talk internal policy problems. We continue to get frequent reports of departments that are not used to interacting with IT or Security much\u2014think Facilities, Building Operations and Maintenance as the most obvious examples\u2014but are buying IoT devices. Facilities, for example, may have a multi-decade history of buying and installing door locks without checking in with Security or IT, and Maintenance likely has a similar history when it comes to purchasing lightbulbs. When lightbulbs and door locks morphed into IoT devices, many of those departments didn&#8217;t change their purchasing procedures and they often didn&#8217;t even do any testing.<\/p>\n<h3><strong>The Nature Of IoT Devices<\/strong><\/h3>\n<p>Add to that the very nature of IoT devices. Most are coded to communicate with their mothership, for innocuous things like code updates or patches. Those communications are typically unmonitored. Even worse, some of these IoT devices have independent antennae, which allows the devices to perform two-way communications without it appearing on even the strictest systems tracking the LAN and WAN. The antennae allows the devices to fully bypass your network. Think cyberthieves could perhaps make use of such powerful devices?<\/p>\n<p>Even worse, a hijacked set of IoT lightbulbs could exfiltrate data without anyone noticing, by making minute changes in the bulbs&#8217; brightness in a specific pattern that someone in the parking lot\u2014watching predetermined windows\u2014could capture and later analyze.<\/p>\n<h3><strong>That Which Is Seen Versus Unseen<\/strong><\/h3>\n<p>This brings us to the seen\/unseen reality. Devices that IT\/Security is aware of get treated like a trusted unit with network privileges. And devices that IT\/Security does <em>not <\/em>know about get ignored completely. From a security standpoint, both situations are equally potentially disastrous, just in different ways.<\/p>\n<p>On top of all this, enterprises have to deal with the ever-present Shadow IT nightmare, where workgroups and even individual employees\/contractors will get tired of waiting for IT to act and will independently go and purchase consumer-grade IoT devices and will use the devices without anyone&#8217;s knowledge\/approval.<\/p>\n<p>Then there are always the unintended IoT glitches. A major British financial institution recently was performing routine penetration testing and happened to be examining one network. It accidentally hit on a trigger URL and all of the building&#8217;s locks dropped into the open position.<\/p>\n<h3><strong>IoT Device Age<\/strong><\/h3>\n<p>Another issue is the age of an IoT device. Many IoT manufacturers will abandon IoT devices after about 4-5 years of performance. At that point, they no longer get security updates and are absolutely ripe for an attacker to find and take over that unit. Once orphaned, those devices sit in your network forever\u2014or until someone in Security\/IT discovers them, hopefully before the Bad Guys do.<\/p>\n<p>The best way to deal with all of these IoT issues is to apply the Zero Trust model to anything and everything in the network. Then apply a continuous authentication model to establish a norm\u2014the activities and communications represent each device&#8217;s pattern for safe operations. But the system then continuously tracks those devices and flags any deviations in behavior.<\/p>\n<p>Even if the IoT device is passive and silent for an extended period, eventually it will try and do something, which is when it will be detected by a continuous authentication system fine-tuned to watch for IoT devices.<\/p>\n<h3><strong>5G IoT Issues<\/strong><\/h3>\n<p>As difficult it is to master security with IoT devices, the upcoming 5G rollout is going to make it even more challenging. As 5G rollouts hit different geographies, it will enable far more communications with remote areas that today have severe communication challenges. By being able to extend bandwidth to these locations, a dramatic increase in the number of data centers is expected, with each one needing protection from\/for tiny IoT devices. Consider what it will mean for your enterprise when today&#8217;s 10,000 devices per square mile becomes hundreds of thousands\u2014or more\u2014for that same footprint.<\/p>\n<p>Then there are hardware considerations. 5G speed is going to make many current devices run hot. More specifically, its chipsets\/CPUs are likely to not being to stand that much heat.<\/p>\n<p>IoT enterprise systems can be dealt with from a security perspective, but it&#8217;s best to put the new monitoring systems into place today\u2014to try and get ahead of the next disaster.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more. For starters, IoT means two things to CISOs and CSOs. First, the IoT devices need to be protected from attackers trying to take over the devices and then use it either [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":4416,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[259,234,75,40],"class_list":{"0":"post-5088","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-5g","9":"tag-iot","10":"tag-security-infrastructure","11":"tag-threat-intelligence","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How To Protect\u2014And Defend Against\u2014IoT In A 5G World<\/title>\n<meta name=\"description\" content=\"Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Protect\u2014And Defend Against\u2014IoT In A 5G World\" \/>\n<meta property=\"og:description\" content=\"Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-15T18:39:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"613\" \/>\n\t<meta property=\"og:image:height\" content=\"434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"How To Protect\u2014And Defend Against\u2014IoT In A 5G World\",\"datePublished\":\"2020-04-15T18:39:52+00:00\",\"dateModified\":\"2020-05-06T17:26:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/\"},\"wordCount\":882,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"keywords\":[\"5G\",\"IoT\",\"Security Infrastructure\",\"Threat Intelligence\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/\",\"name\":\"How To Protect\u2014And Defend Against\u2014IoT In A 5G World\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"datePublished\":\"2020-04-15T18:39:52+00:00\",\"dateModified\":\"2020-05-06T17:26:49+00:00\",\"description\":\"Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"width\":613,\"height\":434},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-to-protect-and-defend-against-iot-in-a-5g-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How To Protect\u2014And Defend Against\u2014IoT In A 5G World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How To Protect\u2014And Defend Against\u2014IoT In A 5G World","description":"Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/","og_locale":"en_US","og_type":"article","og_title":"How To Protect\u2014And Defend Against\u2014IoT In A 5G World","og_description":"Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/","og_site_name":"Infoblox Blog","article_published_time":"2020-04-15T18:39:52+00:00","article_modified_time":"2020-05-06T17:26:49+00:00","og_image":[{"width":613,"height":434,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"How To Protect\u2014And Defend Against\u2014IoT In A 5G World","datePublished":"2020-04-15T18:39:52+00:00","dateModified":"2020-05-06T17:26:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/"},"wordCount":882,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","keywords":["5G","IoT","Security Infrastructure","Threat Intelligence"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/","url":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/","name":"How To Protect\u2014And Defend Against\u2014IoT In A 5G World","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","datePublished":"2020-04-15T18:39:52+00:00","dateModified":"2020-05-06T17:26:49+00:00","description":"Providing security around Internet of Things (IoT) devices has always been hard, but upcoming 5G rollouts are going to complicate IoT security far more.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","width":613,"height":434},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-to-protect-and-defend-against-iot-in-a-5g-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"How To Protect\u2014And Defend Against\u2014IoT In A 5G World"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5088"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5088\/revisions"}],"predecessor-version":[{"id":5091,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5088\/revisions\/5091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4416"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}