{"id":628,"date":"2018-02-22T17:01:50","date_gmt":"2018-02-22T17:01:50","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=628"},"modified":"2020-12-05T17:04:57","modified_gmt":"2020-12-06T01:04:57","slug":"tales-from-the-trenches-finding-a-better-way-to-share-threat","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/","title":{"rendered":"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence"},"content":{"rendered":"<p>Global spend on cybersecurity products is expected to exceed\u00a0<a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-market-report\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$1 trillion between 2017 and 2021<\/a>, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture. Yet the number of cyber threats is growing even faster and breaches continue to happen.<\/p>\n<p>It\u2019s time for the cybersecurity community to make a true commitment to threat intelligence sharing and create an industry standard to enable the timely sharing of information across both the public and private sector. In a recent Ponemon\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-white-paper-ponemon-infoblox-2018-final-report.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">study<\/a>\u00a0sponsored by Infoblox, two-thirds of security professionals surveyed said threat intelligence sharing could have prevented or minimized the consequences of a cyber-attack or data breach.<\/p>\n<p>The industry tried to combat this over a decade ago through\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc5070\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Incident Object Description Exchange<\/a>\u00a0(IODEF RFC-5070) and most recently through sharing models such as\u00a0<a href=\"https:\/\/oasis-open.github.io\/cti-documentation\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">STIX and TAXII<\/a>. However, many security professionals are still dissatisfied with these options and there remains a reluctance from organizations to share their intelligence broadly.<\/p>\n<p>To explore this topic further, Infoblox recently hosted a roundtable discussion that brought together cybersecurity experts from government, healthcare, education and private sector backgrounds to discuss how, as an industry, we can better share threat intelligence knowledge to ultimately fight back against cyber criminals and regain control.<\/p>\n<p>Michael Daniel, the president and CEO of the Cyber Threat Alliance and former cybersecurity advisor to President Barack Obama, encouraged a shift in our thinking. \u201cThe first thing we need to think about is how do we change our mindset. We are looking for a solution to cybersecurity challenges and there is no solution, it\u2019s a risk management problem.\u201d He went on to advise that \u201cwe shouldn\u2019t be afraid to share &#8212; sharing doesn\u2019t blunt our competitive edge, it just enhances it. \u00a0We need to facilitate it from happening rather than inhibiting it from happening.\u201d<\/p>\n<p>The Ponemon study backs up this point by Daniel that the fear of sharing is a key hindrance the industry has been facing. In fact, 58 percent of respondents in the Ponemon study point to the potential liability of sharing and the lack of trust in sources that keeps their companies from only partially participating in a threat intelligence exchange program. It\u2019s not easy to further the conversation if customers and the community are not willing to share, which will be an ongoing battle the industry faces.<\/p>\n<p>Infoblox customer Richard Hu, associate director, Service Strategy and System Architecture at Weill Cornell Medical College, recognizes the need for sharing but noted how difficult this process actually is: \u201cThose in my community share their threat intelligence manually, from one security office to the next, and by the time we have these conversations, it\u2019s often too late. It\u2019s almost like a marriage, it\u2019s not easy and we need help.\u201d<\/p>\n<p>So what else can we do as an industry to make the sharing of information more seamless and effective? First and foremost, real time risk intelligence is critical as threat intelligence becomes stale within minutes. For shared intelligence to increase in appeal, it needs to be more quickly disseminated so it retains its accuracy. Second, we need to do away with siloes among business departments and create a centralized program controlled by one dedicated team to better enable information to flow. And last, but not least, the industry needs to take advantage of tools, like Infoblox Dossier, that help give context and meaning to threat intelligence and enable IT organizations and security professionals to make accurate decisions quickly with confidence.<\/p>\n<p>Ultimately, we all agreed, we have to work together as an industry to combat these cyber threats. This dinner gave us new hope that there are those out there who want to collaborate and who want to come together to find a solution.<\/p>\n<p>I\u2019ll leave you with this thought provoking question from Jose Pagliery at CNNMoney, \u201cIs it time for the business sector to have its #MeToo movement.\u201d What do you think?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-630\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/tales-from-the-trenches-dinner.jpeg\" alt=\"Tales from the Trenches - Dinner\" width=\"400\" height=\"300\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tales-from-the-trenches-dinner.jpeg 400w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tales-from-the-trenches-dinner-300x225.jpeg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture. Yet the number of cyber threats is growing even faster and breaches continue to happen. It\u2019s time for the cybersecurity community to [&hellip;]<\/p>\n","protected":false},"author":209,"featured_media":629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15,346,371,367],"class_list":{"0":"post-628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"tag-healthcare","11":"tag-education","12":"tag-government","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tales from the Trenches: Finding a Better Way to Share Threat Intelligence<\/title>\n<meta name=\"description\" content=\"Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence\" \/>\n<meta property=\"og:description\" content=\"Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-22T17:01:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T01:04:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jesper Andersen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jesper Andersen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/\"},\"author\":{\"name\":\"Jesper Andersen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/fb93d57995e1c33dc9298a9b10a4babc\"},\"headline\":\"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence\",\"datePublished\":\"2018-02-22T17:01:50+00:00\",\"dateModified\":\"2020-12-06T01:04:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/\"},\"wordCount\":671,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Healthcare\",\"education\",\"Government\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/\",\"name\":\"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"datePublished\":\"2018-02-22T17:01:50+00:00\",\"dateModified\":\"2020-12-06T01:04:57+00:00\",\"description\":\"Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tales-from-the-trenches-finding-a-better-way-to-share-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/fb93d57995e1c33dc9298a9b10a4babc\",\"name\":\"Jesper Andersen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_209_1674090745-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_209_1674090745-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_209_1674090745-96x96.jpg\",\"caption\":\"Jesper Andersen\"},\"description\":\"Andersen is a seasoned networking and software industry executive with a track record of building large businesses at Cisco Systems, Oracle and other technology companies. Prior to Infoblox, Andersen served as a Senior Vice President for network management where he managed over 1,000 employees and was responsible for the development of integrated network management and analysis solutions. He was also Senior Vice President and General Manager of Cisco\u2019s service provider video business unit. Andersen helped transform the business from a focus on traditional set-top boxes and cable access to the new world of streaming online video. Under Andersen\u2019s leadership, the company acquired NDS, a leading provider of video software solutions.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jesper-andersen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence","description":"Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/","og_locale":"en_US","og_type":"article","og_title":"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence","og_description":"Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/","og_site_name":"Infoblox Blog","article_published_time":"2018-02-22T17:01:50+00:00","article_modified_time":"2020-12-06T01:04:57+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","type":"image\/jpeg"}],"author":"Jesper Andersen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jesper Andersen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/"},"author":{"name":"Jesper Andersen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/fb93d57995e1c33dc9298a9b10a4babc"},"headline":"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence","datePublished":"2018-02-22T17:01:50+00:00","dateModified":"2020-12-06T01:04:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/"},"wordCount":671,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","keywords":["Infoblox","Security","Healthcare","education","Government"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/","url":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/","name":"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","datePublished":"2018-02-22T17:01:50+00:00","dateModified":"2020-12-06T01:04:57+00:00","description":"Global spend on cybersecurity products is expected to exceed\u00a0$1 trillion between 2017 and 2021, as companies continue to invest in new technologies to combat increasingly sophisticated cyber attacks and augment their security posture.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/tales-from-the-trenches-finding-a-better-way-to-share-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Tales from the Trenches: Finding a Better Way to Share Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/fb93d57995e1c33dc9298a9b10a4babc","name":"Jesper Andersen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_209_1674090745-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_209_1674090745-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_209_1674090745-96x96.jpg","caption":"Jesper Andersen"},"description":"Andersen is a seasoned networking and software industry executive with a track record of building large businesses at Cisco Systems, Oracle and other technology companies. Prior to Infoblox, Andersen served as a Senior Vice President for network management where he managed over 1,000 employees and was responsible for the development of integrated network management and analysis solutions. He was also Senior Vice President and General Manager of Cisco\u2019s service provider video business unit. Andersen helped transform the business from a focus on traditional set-top boxes and cable access to the new world of streaming online video. Under Andersen\u2019s leadership, the company acquired NDS, a leading provider of video software solutions.","url":"https:\/\/www.infoblox.com\/blog\/author\/jesper-andersen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=628"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/628\/revisions"}],"predecessor-version":[{"id":632,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/628\/revisions\/632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/629"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}