{"id":7388,"date":"2022-01-11T13:07:20","date_gmt":"2022-01-11T21:07:20","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7388"},"modified":"2022-01-11T13:07:20","modified_gmt":"2022-01-11T21:07:20","slug":"zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/","title":{"rendered":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively"},"content":{"rendered":"<p>Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.<\/p>\n<p>Historically, though, ZTN has proven difficult in many enterprises because security didn\u2019t get along well with networking. (Ok, yes, Security often doesn\u2019t get along with anybody, but I digress.) Networking saw itself as the master of productivity whereas Security focused only on security. Networking owned the data center and there was a massive list of Security todos that needed to access and manage the data center.<\/p>\n<p>Security believed that the networking teams didn\u2019t implement good security. In the old days, the security team depended on the networking team to put an appliance in their rack and get it deployed.<\/p>\n<p>Security would want to add a firewall and the networking team had to deploy it in the datacenter and they kept getting in each other\u2019s way. Hence, rock against rock.<br \/>\nBut the cloud has slowly changed all of that. Security found itself no longer so dependent on networking. As enterprises have sharply accelerated moving almost everything\u2014including, for some, much of what had been on-prem\u2014to the cloud, Security had direct access to more of what they needed. This opens the door for a ZTN approach.<\/p>\n<p>The philosophical problem with properly implementing ZTN is that many enterprises have gotten themselves into very bad habits. The industry has agreed for a decade that passwords\/PINs need to be replaced with much more secure means. But even when some enterprises try and do that, they find the least secure way to do it, which pretty much misses the point.<\/p>\n<p>Consider multi-factor authentication (MFA) aka 2FA. MFA can meaningfully add true security to an authentication effort through an encrypted authentication application. And yet so many still use SMS unencrypted text verification, which is highly susceptible to man-in-the-middle attacks. CISOs shouldn\u2019t ever say that MFA is good, but need to say that robust MFA (which excludes SMS) is good.<\/p>\n<p>Or think about access management. Enterprises have gotten much better at deleting credentials of employees\/contractors who have left the company. Not perfect but they are getting much better. But when an employee gets promoted and no longer needs access to XYZ systems, enterprises often don\u2019t delete the access, creating dangerous orphan access. IT has internalized the threat that a fired employee poses, but they tend to not see the danger of someone promoted\u2014or even given a lateral shift.<\/p>\n<p>ZTN requires a complete shift in Security and IT attitude. By the way, this goes beyond the convenience versus security argument. Some approaches, such as continuous authentication leveraging behavioral analytics and machine learning, can deliver excellent security and can do it entirely in the background. In short, as long as that user isn\u2019t flagged for pattern deviation, that user will never notice the security.<\/p>\n<p>Any user, any device, application that wants to connect to or perform an activity needs to be validated and verified. This means a lot of user training and\/or handholding. In the initial stage, testing can be done solely using Security or IT staff so that they are the ones who will be inundated with false negatives.<\/p>\n<p>Eventually, though, the verification must be unleashed into the wild and employees will initially see added friction or, at the very least, what those users will perceive as added friction. They must be trained to expect it and to know that it will soon decrease as the system starts to understand the population.<\/p>\n<p>IT and Security need to have no fiefdoms. This has to be enterprise-wide.<\/p>\n<p>Behavior analytics married to machine learning is bad at first and then it learns and gets better. Behavior that\u2019s fine for one group isn\u2019t for another. For example, an IT staffer downloading penetration testing software is fine, but it\u2019s bad if you see someone else doing it.<\/p>\n<p>A device that may have been approved to be on the network may not have got the latest patches and could now be a vulnerable device, which means running an awful lot of vulnerability scans.<\/p>\n<p>Not dissimilar from launching any new enterprise application, ZTN is difficult in the beginning. Users&#8211;and that absolutely includes line-of-business (LOB) chiefs&#8211;must understand that the process not only gets a lot easier over time, but the benefits to the enterprise are massive.<\/p>\n<p>Any network behavior anomaly detection (NBAD) approach has this perception problem. It\u2019s also critical to internalize that all germane applications need to work together using open APIs (application interfaces). All of these applications needs to be fully integrated and workflows need to share data and implement security at every stage. Letting various apps run independently is just asking for conflicts and lack-of-internal communication. Rather than making the enterprise more secure, it just creates more holes for attackers to leverage.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":7110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[623,284,405,283,361,624],"class_list":{"0":"post-7388","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-ztn","9":"tag-ztna","10":"tag-zero-trust","11":"tag-zero-trust-network-architecture","12":"tag-network-security","13":"tag-nbad","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively<\/title>\n<meta name=\"description\" content=\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively. Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively. Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-11T21:07:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively\",\"datePublished\":\"2022-01-11T21:07:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"keywords\":[\"ZTN\",\"ZTNA\",\"Zero Trust\",\"Zero Trust Network Architecture\",\"Network Security\",\"NBAD\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/\",\"name\":\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"datePublished\":\"2022-01-11T21:07:20+00:00\",\"description\":\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively. Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"width\":612,\"height\":350,\"caption\":\"Automatic software technology system for efficient work with the most advanced technology, business process concepts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively","description":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively. Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively","og_description":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively. Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/","og_site_name":"Infoblox Blog","article_published_time":"2022-01-11T21:07:20+00:00","og_image":[{"width":612,"height":350,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively","datePublished":"2022-01-11T21:07:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/"},"wordCount":866,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","keywords":["ZTN","ZTNA","Zero Trust","Zero Trust Network Architecture","Network Security","NBAD"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/","url":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/","name":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","datePublished":"2022-01-11T21:07:20+00:00","description":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively. Zero Trust Networking (ZTN) is more of a concept of security, an approach, an ideology if you will, than a detailed specification. There are many ways of implementing ZTN, but the common thread is that everything must prove that it is a legitimate user. No \u201cwell, you\u2019re here in a secure area so something must have approved you\u201d thinking. As a Unix admin would say, no trusted host anymore.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","width":612,"height":350,"caption":"Automatic software technology system for efficient work with the most advanced technology, business process concepts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/zero-trust-networking-is-needed-but-it-must-be-implemented-aggressively\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Zero Trust Networking Is Needed, But It Must Be Implemented Aggressively"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7388"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7388\/revisions"}],"predecessor-version":[{"id":7389,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7388\/revisions\/7389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7110"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}