{"id":7048,"date":"2021-10-12T13:08:53","date_gmt":"2021-10-12T20:08:53","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7048"},"modified":"2021-10-14T14:25:56","modified_gmt":"2021-10-14T21:25:56","slug":"ransomware-reporting-bills","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/","title":{"rendered":"Compliance Deja Vu"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The Ransom Disclosure Act<\/span><\/h3>\n<p><a href=\"https:\/\/www.warren.senate.gov\/download\/dun21766\"><span style=\"font-weight: 400;\">The Ransom Disclosure Act<\/span><\/a><span style=\"font-weight: 400;\">, introduced in early October by Senators Elizabeth Warren (D-Mass)\u00a0 and Representative Deborah Ross (D-N.C.), provides the Department of Homeland Security (DHS) with critical data on ransomware payments.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Specifically, the current version of the bill will likely:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Require ransomware victims (excluding individuals) to disclose information about ransom payments no later than 48 hours after the date of payment. This disclosed information will likely include the amount of the ransom demand, the amount paid, the type of currency used for payment of the ransom, and any known information on the threat actor demanding the ransom.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Require DHS to make the information from the prior year\u2019s ransom disclosure public. This will likely exclude identifying information about the entities that paid ransoms.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Require DHS to set up a website to facilitate ransom reporting.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Further, the legislation will direct the Secretary of Homeland Security to conduct a study on commonalities among ransomware attacks and the extent to which cryptocurrency facilitated these attacks. Homeland Security will need to provide recommendations for protecting information systems and strengthening cybersecurity.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The Cyber Incident Notification Act of 2021<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Earlier in October, the Senate Homeland Security and Governmental Affairs Committee Chairman Gary Peters (D-Mich.) and ranking member Sen. Rob Portman (R-Ohio) introduced a bill <\/span><a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/senate-bill\/2407\/text\"><span style=\"font-weight: 400;\">The Cyber Incident Notification Act of 2021<\/span><\/a><span style=\"font-weight: 400;\"> that impacts company reporting which involves cybersecurity breaches and payments made for ransomware attacks. This bill also requires the Cybersecurity and Infrastructure Security Agency (CISA) to develop a program to alert organizations to vulnerabilities exploited by ransomware. It further directs the National Cyber Director to establish a joint ransomware task force to coordinate federal efforts with private industry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The legislation would require the owners and operators of what is designated as critical infrastructure groups to report cyber incidents to CISA. This must happen within 72 hours. These critical infrastructure groups, nonprofits, state and local governments, and most other business organizations with over 50 employees must also report making ransomware attack payments within 24 hours. Note that the 50 employee threshold is the \u201csmall business\u201d designation in the view of various federal government programs and would subject approximately half of American businesses to the rule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The proposed legislation comes with teeth. The proposed legislation would grant the CISA Director the authority to issue subpoenas to organizations that fail to comply with its reporting requirements under the Bill. Entities that fail to comply with subpoenas would, of course, be referred to the Justice Department. Federal contractors that fail to comply with subpoenas would be subject to additional penalties from the General Services Administration.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Compliance Costs Never Seem to Go Down<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Compliance costs never seem to go down. Perhaps with good reason. The needs for this legislation are not being questioned. The legislation clearly presents a silent incentive for most industries. If you can avoid paying ransoms, it seems you can avoid public disclosure in some cases, depending on relevant laws that may or may not apply, the state, and the industry. For example, in healthcare today for ransomware attacks that encrypt over 500 patient records &#8211; whether or not you pay, you must disclose it as an assumed data breach under HIPAA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This was the earlier opinion several years ago by HHS\/OCR on ransomware and HIPAA that became closely associated with major healthcare data breach reporting. In the event of a\u00a0 ransomware attack, it is to be assumed, at least in the healthcare industry, that the data has also been breached, and therefore it should be reported as such.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Deja Vu all over again.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re just a few steps away from the same thinking applied to other industries.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Roll the tape forward on this potential legislation as it heads towards finalization. If ransomware attacks are also declared crisply and clearly as data breaches, as HHS\/OCR did for healthcare, how will that impact your enterprise? What new costs might you incur? How will you manage it? How do your governance and compliance teams treat incidents like these today?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are other questions the details of which will need to be sorted out with precision. What is the definition of a cyber incident, exactly? So, if you leave your laptop in a coffee shop and lose it, is this a reportable cyber incident? Or just an active verified hacking attempt? How many security events in a major bank, for example, would qualify as cyber incidents under this proposed legislation? When do the governance, compliance, and operations teams note that time windows have passed the legislative threshold for reporting? You can see the challenges that await as this legislation is finalized.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.\u00a0 The Ransom Disclosure Act [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":6720,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[288,368,573,576],"class_list":{"0":"post-7048","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-ransomware","9":"tag-federal","10":"tag-cyber-incident-notification-act","11":"tag-compliance","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Reporting Bills<\/title>\n<meta name=\"description\" content=\"Compliance Deja Vu. Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance Deja Vu\" \/>\n<meta property=\"og:description\" content=\"Compliance Deja Vu. Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-12T20:08:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-14T21:25:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Compliance Deja Vu\",\"datePublished\":\"2021-10-12T20:08:53+00:00\",\"dateModified\":\"2021-10-14T21:25:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"keywords\":[\"Ransomware\",\"Federal\",\"Cyber Incident Notification Act\",\"compliance\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/\",\"name\":\"Ransomware Reporting Bills\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"datePublished\":\"2021-10-12T20:08:53+00:00\",\"dateModified\":\"2021-10-14T21:25:56+00:00\",\"description\":\"Compliance Deja Vu. Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"width\":612,\"height\":333,\"caption\":\"Criminal hiding behind a mask turns up on computer screen asking the owner for money. Concept of phishing and ransomware, where the computer has all files on the harddrive encrypted and the victims need to pay a ransom in order to get their files unlocked. The computer stands on a table.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomware-reporting-bills\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compliance Deja Vu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Reporting Bills","description":"Compliance Deja Vu. Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/","og_locale":"en_US","og_type":"article","og_title":"Compliance Deja Vu","og_description":"Compliance Deja Vu. Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/","og_site_name":"Infoblox Blog","article_published_time":"2021-10-12T20:08:53+00:00","article_modified_time":"2021-10-14T21:25:56+00:00","og_image":[{"width":612,"height":333,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Compliance Deja Vu","datePublished":"2021-10-12T20:08:53+00:00","dateModified":"2021-10-14T21:25:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/"},"wordCount":816,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","keywords":["Ransomware","Federal","Cyber Incident Notification Act","compliance"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/","url":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/","name":"Ransomware Reporting Bills","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","datePublished":"2021-10-12T20:08:53+00:00","dateModified":"2021-10-14T21:25:56+00:00","description":"Compliance Deja Vu. Two cybersecurity bills were introduced over the past few weeks that have a potential impact on cybersecurity reporting and compliance in the U.S. Ransomware is front and center in both. This is likely part of a government-wide reaction to the recent attacks on meat producer JBS USA, Kaseya, and Colonial Pipeline.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","width":612,"height":333,"caption":"Criminal hiding behind a mask turns up on computer screen asking the owner for money. Concept of phishing and ransomware, where the computer has all files on the harddrive encrypted and the victims need to pay a ransom in order to get their files unlocked. The computer stands on a table."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomware-reporting-bills\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Compliance Deja Vu"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7048"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7048\/revisions"}],"predecessor-version":[{"id":7106,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7048\/revisions\/7106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6720"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}