{"id":5828,"date":"2021-01-28T08:50:41","date_gmt":"2021-01-28T16:50:41","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5828"},"modified":"2021-02-03T09:03:39","modified_gmt":"2021-02-03T17:03:39","slug":"marking-data-privacy-day-in-the-time-of-cloud-first-networks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/","title":{"rendered":"Marking Data Privacy Day in the Time of Cloud-first Networks"},"content":{"rendered":"<p>On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be. Since March 2020, COVID-19 shutdowns have accelerated workforce transformation with <a href=\"https:\/\/www.infoblox.com\/company\/news-events\/press-releases\/global-report-more-than-90-of-business-leaders-say-cloud-is-a-priority-in-the-covid-19-shutdown\/\" target=\"_blank\" rel=\"noopener noreferrer\">more than 90% of business leaders<\/a> committed to building borderless enterprises.<\/p>\n<p>The network&#8217;s extension into hybrid, multi-cloud environments demands that security move from physically contained (on-premises) boundaries to a data-centric model that can be deployed remotely and protects geographically dispersed workers. The human is now the perimeter. In this paradigm, securing the expanded network provides the means for achieving privacy, which builds trust. Landmark privacy legislations, the <a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\" target=\"_blank\" rel=\"noopener noreferrer\">CCPA<\/a> and <a href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">GDPR<\/a>, have codified that companies have a responsibility to provide adequate protection that advance the interlocked cause.<\/p>\n<p>Defenders can cover their bases by asking framework building questions:<\/p>\n<ul>\n<li>Where is my key data and is it appropriately protected and monitored?<\/li>\n<li>Are there multiple lines of defense protecting my data (defense in depth)?<\/li>\n<li>Are the controls close to the data?<\/li>\n<li>How well are we protecting access beyond the campus walls?<\/li>\n<li>Am I spending my limited resources on the right things (risk management)?<\/li>\n<\/ul>\n<p>Key to addressing these questions is the ability to scale visibility and foundational security to every endpoint, every application, everything that collectively makes up the modern enterprise. Visibility across the entire IT stack gives teams contextual awareness into what each device connected to the system is doing. As the network expands out beyond the four walls, <a href=\"https:\/\/www.infoblox.com\/products\/ddi\/\">DDI<\/a> enables companies to use a technology they already implemented (for devices to communicate with each other) to glean enhanced insight into network activities.<\/p>\n<p>Since more than 90 percent of malware touches DNS \u2014 the first D in DDI \u2014 to break in and out of networks, DDI sheds light on blindspots that the existing security tools, such as firewalls, antivirus, and SIEMs, miss. Layering on DDI enhances visibility into previously hidden spaces to provide a clearer picture of what situations may require investigation, which is crucial to putting teams on the path to control.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5835\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cloud-first-wfh-gdpr.png\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr-300x206.png 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>In addition to visibility, defending a hybrid environment requires <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\" target=\"_blank\" rel=\"noopener noreferrer\">foundational security<\/a> that enables the zero trust model to extend security beyond the reach of on-premises defenses. Zero trust is the strongest approach a company can take to secure data both in the cloud and on the traditional network as it layers in security technologies from an \u201cassume breach\u201d standpoint.<\/p>\n<p>This model bases access to data, apps, and devices on a user&#8217;s identity and the minimum required access. In order for this approach to be effective, an accurate inventory of both users and devices is required. Infoblox DDI can assist by supplying accurate and up-to-date contextual data from these assigned devices. These insights can accelerate threat investigation and remediation as well as optimizes the performance of the entire security ecosystem.<\/p>\n<p>Data Privacy Day draws awareness to the work defenders do every day to protect their companies from attackers. The alternative is leaving open gaps that, if exploited, <a href=\"https:\/\/gdpr.eu\/fines\/\" target=\"_blank\" rel=\"noopener noreferrer\">could cost<\/a> a company 4% of its annual revenue or 20 million euros, whichever is higher. In addition to hefty fines, poor security jeopardizes customer privacy, which diminishes trust \u2014 another precious currency. By investing in sound security practices, companies can protect themselves against potential financial and reputational damages. That&#8217;s the outcome security teams work towards in face of the multiplying threats that come with the expanding network.<\/p>\n<p><a href=\"https:\/\/www.techradar.com\/uk\/news\/data-privacy-day-in-the-time-of-cloud-first-networks\" target=\"_blank\" rel=\"noopener noreferrer\">Read the byline on TechRadar<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be. Since [&hellip;]<\/p>\n","protected":false},"author":192,"featured_media":5835,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[189,15,143,361,402,43,403,404,30,28,405,255],"class_list":{"0":"post-5828","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cybersecurity","9":"tag-security","10":"tag-cloud-networking","11":"tag-network-security","12":"tag-ccpa","13":"tag-gdpr","14":"tag-data-privacy","15":"tag-cloud-first-networks","16":"tag-dns","17":"tag-ddi","18":"tag-zero-trust","19":"tag-covid-19","20":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Marking Data Privacy Day in the Time of Cloud-first Networks<\/title>\n<meta name=\"description\" content=\"On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Marking Data Privacy Day in the Time of Cloud-first Networks\" \/>\n<meta property=\"og:description\" content=\"On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-28T16:50:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-03T17:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ed Hunter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ed Hunter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/\"},\"author\":{\"name\":\"Ed Hunter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e4216692b4e13f6d3391c3fdf8ea459a\"},\"headline\":\"Marking Data Privacy Day in the Time of Cloud-first Networks\",\"datePublished\":\"2021-01-28T16:50:41+00:00\",\"dateModified\":\"2021-02-03T17:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-first-wfh-gdpr.png\",\"keywords\":[\"Cybersecurity\",\"Security\",\"Cloud Networking\",\"Network Security\",\"CCPA\",\"GDPR\",\"Data Privacy\",\"Cloud-first Networks\",\"DNS\",\"DDI\",\"Zero Trust\",\"Covid-19\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/\",\"name\":\"Marking Data Privacy Day in the Time of Cloud-first Networks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-first-wfh-gdpr.png\",\"datePublished\":\"2021-01-28T16:50:41+00:00\",\"dateModified\":\"2021-02-03T17:03:39+00:00\",\"description\":\"On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-first-wfh-gdpr.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-first-wfh-gdpr.png\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Marking Data Privacy Day in the Time of Cloud-first Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e4216692b4e13f6d3391c3fdf8ea459a\",\"name\":\"Ed Hunter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_192_1585668215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_192_1585668215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_192_1585668215-96x96.jpg\",\"caption\":\"Ed Hunter\"},\"description\":\"Ed Hunter, CISO, leads the Infoblox Information security security team. He came to Infoblox from Palo Alto Networks, where he founded the security information security team and program. Previous roles include various firms in manufacturing, research and defense.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ed-hunter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Marking Data Privacy Day in the Time of Cloud-first Networks","description":"On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/","og_locale":"en_US","og_type":"article","og_title":"Marking Data Privacy Day in the Time of Cloud-first Networks","og_description":"On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/","og_site_name":"Infoblox Blog","article_published_time":"2021-01-28T16:50:41+00:00","article_modified_time":"2021-02-03T17:03:39+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png","type":"image\/png"}],"author":"Ed Hunter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ed Hunter","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/"},"author":{"name":"Ed Hunter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e4216692b4e13f6d3391c3fdf8ea459a"},"headline":"Marking Data Privacy Day in the Time of Cloud-first Networks","datePublished":"2021-01-28T16:50:41+00:00","dateModified":"2021-02-03T17:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/"},"wordCount":598,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png","keywords":["Cybersecurity","Security","Cloud Networking","Network Security","CCPA","GDPR","Data Privacy","Cloud-first Networks","DNS","DDI","Zero Trust","Covid-19"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/","name":"Marking Data Privacy Day in the Time of Cloud-first Networks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png","datePublished":"2021-01-28T16:50:41+00:00","dateModified":"2021-02-03T17:03:39+00:00","description":"On this 14th anniversary of Data Privacy Day, we find the technology landscape radically different from the early days of cloud adoption when few could have predicted that software would rule the world. Corporate environments have evolved from on-premises networks to cloud-first environments that must deliver productivity applications to endpoints wherever they may be.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-first-wfh-gdpr.png","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/marking-data-privacy-day-in-the-time-of-cloud-first-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Marking Data Privacy Day in the Time of Cloud-first Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e4216692b4e13f6d3391c3fdf8ea459a","name":"Ed Hunter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_192_1585668215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_192_1585668215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_192_1585668215-96x96.jpg","caption":"Ed Hunter"},"description":"Ed Hunter, CISO, leads the Infoblox Information security security team. He came to Infoblox from Palo Alto Networks, where he founded the security information security team and program. Previous roles include various firms in manufacturing, research and defense.","url":"https:\/\/www.infoblox.com\/blog\/author\/ed-hunter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/192"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5828"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5828\/revisions"}],"predecessor-version":[{"id":5971,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5828\/revisions\/5971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/5835"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}