{"id":6240,"date":"2021-04-19T13:14:08","date_gmt":"2021-04-19T20:14:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6240"},"modified":"2021-04-19T16:01:27","modified_gmt":"2021-04-19T23:01:27","slug":"ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/","title":{"rendered":"IP Address Management &#8211; The One Trick that ensures accurate Vulnerability Assessments"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team, or hiring a third-party to perform these assessments for them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The third-party providers would discuss the Scope of Work to gather as much information about the client\u2019s network, subnets, and their IT and OT environment to make sure they are covering all their critical applications and infrastructure. At the same time, they need to ensure that when they perform the assessment, testing would not disrupt any essential production processes for the client, which could possibly result in loss of service, slowing the production environment, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a Cyber Security Consultant, when I performed enterprise-wide vulnerability assessments, what I found was that the standard practice for most of the organizations was to manually track and manage IP addresses, and gain network insight of assets that are connected to their network.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of the customers and prospects we meet with suffer from limited asset information and depend heavily on Excel Spreadsheets, which only includes IP addresses and the physical location of the assets. It\u2019s highly likely that the Spreadsheet content is not kept up-to-date and decommissioned systems remain, while newly provisioned ones may be missing. The risk to the organization is greatly increased due to the unreliable scope of identified assets, which would lead to vulnerability oversights and missing security patches. The resulting control gaps would expose the organization to malicious attacks by threat actors in their efforts to compromise critical systems and create business disruption.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having to manually update spreadsheets with rapidly evolving network infrastructure is not the best practice in obtaining real-time visibility of your network assets and their location in the network. Without an IP Address Management (IPAM) solution in place, network administrators miss out on having an accurate list of devices that are connected to their on-premises or hybrid cloud platforms.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s where Infoblox can help. Organizations can get greater insight and control of their network using <\/span><a href=\"https:\/\/www.infoblox.com\/products\/ipam-dhcp\/\"><span style=\"font-weight: 400;\">Infoblox\u2019s IPAM QuickStart<\/span><\/a><span style=\"font-weight: 400;\">, which provides automated visibility and accuracy to centrally manage your network data, hosts, servers, and dynamic clients. This leads to reliable discovery and control of on-premises or hybrid cloud networks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With Infoblox\u2019s IPAM and DHCP solution, network and security teams can have an increase in network agility, efficiency, and responsiveness, which could lower the number of findings during a vulnerability assessment, detect security risks and quarantine rogue devices automatically.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having it all in a centralized platform unlocks network insight from shared data to simplify asset management and makes it easier to anticipate IP address capacity and take advantage of predictive analysis to avoid address exhaustion and prevent outages.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using an IPAM tool and leveraging it to control your network helps network administrators to overcome visibility challenges and have a near-real time, up-to-date consolidated view of their network. It also helps the security team be aware of possible rogue and unmanaged devices, and potentially compromised\u00a0 assets which are already registered in the network. Hence, having it all visible and registered in a centralized platform helps to manage assets, fix possible vulnerabilities discovered in regular vulnerability assessments, and practice proper security compliance enforcement.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team, or [&hellip;]<\/p>\n","protected":false},"author":348,"featured_media":6241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[477,478,479],"class_list":{"0":"post-6240","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-vulnerability-assessment","9":"tag-ip-address-management","10":"tag-cyber-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IP Address Management - The One Trick that ensures accurate Vulnerability Assessments<\/title>\n<meta name=\"description\" content=\"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments. Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team or hiring a third-party to perform these assessments for them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments\" \/>\n<meta property=\"og:description\" content=\"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments. Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team or hiring a third-party to perform these assessments for them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-19T20:14:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-19T23:01:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ip-address-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pallavi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pallavi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/\"},\"author\":{\"name\":\"Pallavi Singh\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb0e7070ac45e19413b08d8713273194\"},\"headline\":\"IP Address Management &#8211; The One Trick that ensures accurate Vulnerability Assessments\",\"datePublished\":\"2021-04-19T20:14:08+00:00\",\"dateModified\":\"2021-04-19T23:01:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ip-address-management.jpg\",\"keywords\":[\"vulnerability assessment\",\"ip address management\",\"Cyber security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/\",\"name\":\"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ip-address-management.jpg\",\"datePublished\":\"2021-04-19T20:14:08+00:00\",\"dateModified\":\"2021-04-19T23:01:27+00:00\",\"description\":\"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments. Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team or hiring a third-party to perform these assessments for them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ip-address-management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ip-address-management.jpg\",\"width\":750,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IP Address Management &#8211; The One Trick that ensures accurate Vulnerability Assessments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb0e7070ac45e19413b08d8713273194\",\"name\":\"Pallavi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"caption\":\"Pallavi Singh\"},\"description\":\"Pallavi is an Associate Product Marketing Manager, Cyber Security at Infoblox. She\u2019s a cyber security enthusiast with a strong focus on cyber security management, risk assessments, and culture and awareness. She is currently managing the Technology Alliance Program (Security and Networking) content creation and GTM activities at Infoblox. Prior to joining Infoblox, Pallavi was a Cyber Security Consultant at Deloitte Canada. She has done her Masters in Telecommunication and Information Security from University of Victoria, BC and had an opportunity to Intern at Nokia Threat Intelligence Lab as a Malware Research Assistant.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/pallavi-singh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments","description":"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments. Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team or hiring a third-party to perform these assessments for them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/","og_locale":"en_US","og_type":"article","og_title":"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments","og_description":"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments. Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team or hiring a third-party to perform these assessments for them.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/","og_site_name":"Infoblox Blog","article_published_time":"2021-04-19T20:14:08+00:00","article_modified_time":"2021-04-19T23:01:27+00:00","og_image":[{"width":750,"height":500,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ip-address-management.jpg","type":"image\/jpeg"}],"author":"Pallavi Singh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pallavi Singh","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/"},"author":{"name":"Pallavi Singh","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cb0e7070ac45e19413b08d8713273194"},"headline":"IP Address Management &#8211; The One Trick that ensures accurate Vulnerability Assessments","datePublished":"2021-04-19T20:14:08+00:00","dateModified":"2021-04-19T23:01:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/"},"wordCount":575,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ip-address-management.jpg","keywords":["vulnerability assessment","ip address management","Cyber security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/","url":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/","name":"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ip-address-management.jpg","datePublished":"2021-04-19T20:14:08+00:00","dateModified":"2021-04-19T23:01:27+00:00","description":"IP Address Management - The One Trick that ensures accurate Vulnerability Assessments. Quarterly vulnerability assessments are a common practice among organizations to validate their security posture and support compliance requirements. Organizations schedule vulnerability scans for their enterprises, including IoT, Operational Technology (OT) and any other device or system that poses a risk. Typically, you would see them running these assessments internally using their own security team or hiring a third-party to perform these assessments for them.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ip-address-management.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ip-address-management.jpg","width":750,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/ip-address-management-the-one-trick-that-ensures-accurate-vulnerability-assessments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"IP Address Management &#8211; The One Trick that ensures accurate Vulnerability Assessments"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cb0e7070ac45e19413b08d8713273194","name":"Pallavi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","caption":"Pallavi Singh"},"description":"Pallavi is an Associate Product Marketing Manager, Cyber Security at Infoblox. She\u2019s a cyber security enthusiast with a strong focus on cyber security management, risk assessments, and culture and awareness. She is currently managing the Technology Alliance Program (Security and Networking) content creation and GTM activities at Infoblox. Prior to joining Infoblox, Pallavi was a Cyber Security Consultant at Deloitte Canada. She has done her Masters in Telecommunication and Information Security from University of Victoria, BC and had an opportunity to Intern at Nokia Threat Intelligence Lab as a Malware Research Assistant.","url":"https:\/\/www.infoblox.com\/blog\/author\/pallavi-singh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/348"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6240"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6240\/revisions"}],"predecessor-version":[{"id":6244,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6240\/revisions\/6244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6241"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}