{"id":7394,"date":"2022-03-11T15:40:35","date_gmt":"2022-03-11T23:40:35","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7394"},"modified":"2022-01-11T15:50:40","modified_gmt":"2022-01-11T23:50:40","slug":"coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/","title":{"rendered":"Coupling AI with Asset Management &#038; DNS Can Make An Amazing Difference In Speed"},"content":{"rendered":"<p>Leveraging AI in with asset management&#8211;on top of DNS management&#8211;can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.<\/p>\n<p>But the issue here is not merely speed. It is about asset visibility as well as&#8211;in many situations&#8211;asset controls. CISOs track assets well, but they often spend insufficient effort focusing on networking. That is where the complexity is, with IoT, IIoT, cloud, Shadow IT, branch users, remote sites, etc. By leveraging network elements such as IPAM and DNS, CISOs and CIOs have far greater visibility and control.<\/p>\n<p>For example, consider a routine IOT device such as a GE smart thermostat. IT and Security know that the device routinely checks in with the GE network, but are they aware if it visits an unrelated network? Do they know if it radically increases its communications or, even worse, starts moving increasingly larger amounts in either direction? DNS knows.<\/p>\n<p>Many tools today deliver limited information, such as an IP address, but it doesn\u2019t report on the roles of the asset. Is it a server running a financial application? IPAM metadata reports far more information including the MAC address, operating system details, what part of the network it\u2019s on (subnet, physical location). Leveraging a configuration management database (CMDB) simply doesn\u2019t deliver enough details.<\/p>\n<p>That said, by combining CMDB information and correlating it with information from other databases managed by other groups (such as security, network admin, etc.), IPAM can detect data asset problems that the isolated resources can\u2019t. When there\u2019s DNS data exfiltration, many enterprises won\u2019t detect it.<\/p>\n<p>The next step is to make sure that IPAM data feeds into other applications such as a NAC app. That would mean that if a non-sanctioned device is added to the network, the NAC can block the device from the network by quarantining it. With all assets monitored, if a big increase in DNS data going to an unrecognized cloud, it will be detected. It might be an attack or it might simply be an employee violating the rules. Such is the joy of Shadow IT. Either way, rules can be written (or a SOC staffer could manually) add the cloud server to a block list.<\/p>\n<p>Is something on the network making 1,000 or more DNS requests a minute? That\u2019s a ransomware red flag that might be missed if network tools aren\u2019t being closed monitored. That\u2019s where machine learning (ML) can be an enterprise-saver. Attackers today are quite fond of embedding malware into DNS requests.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leveraging AI in with asset management&#8211;on top of DNS management&#8211;can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":2599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[242,30,625],"class_list":{"0":"post-7394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-ai","9":"tag-dns","10":"tag-asset-management","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Coupling AI with Asset Management &amp; DNS Can Make An Amazing Difference In Speed<\/title>\n<meta name=\"description\" content=\"Coupling AI with Asset Management &amp; DNS Can Make An Amazing Difference In Speed. Leveraging AI in with asset management--on top of DNS management--can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coupling AI with Asset Management &amp; DNS Can Make An Amazing Difference In Speed\" \/>\n<meta property=\"og:description\" content=\"Coupling AI with Asset Management &amp; DNS Can Make An Amazing Difference In Speed. Leveraging AI in with asset management--on top of DNS management--can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-11T23:40:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"Coupling AI with Asset Management &#038; DNS Can Make An Amazing Difference In Speed\",\"datePublished\":\"2022-03-11T23:40:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/\"},\"wordCount\":482,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"keywords\":[\"AI\",\"DNS\",\"asset management\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/\",\"name\":\"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"datePublished\":\"2022-03-11T23:40:35+00:00\",\"description\":\"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed. Leveraging AI in with asset management--on top of DNS management--can accelerate detection and blocking of an attack some 60 times. That means that a detection\\\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/470796649-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Getting Your Arms Around Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Coupling AI with Asset Management &#038; DNS Can Make An Amazing Difference In Speed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed","description":"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed. Leveraging AI in with asset management--on top of DNS management--can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/","og_locale":"en_US","og_type":"article","og_title":"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed","og_description":"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed. Leveraging AI in with asset management--on top of DNS management--can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/","og_site_name":"Infoblox Blog","article_published_time":"2022-03-11T23:40:35+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"Coupling AI with Asset Management &#038; DNS Can Make An Amazing Difference In Speed","datePublished":"2022-03-11T23:40:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/"},"wordCount":482,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","keywords":["AI","DNS","asset management"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/","url":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/","name":"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","datePublished":"2022-03-11T23:40:35+00:00","description":"Coupling AI with Asset Management & DNS Can Make An Amazing Difference In Speed. Leveraging AI in with asset management--on top of DNS management--can accelerate detection and blocking of an attack some 60 times. That means that a detection\/blockage that would 3-4 hours without leveraging DNS files could happen in 3-4 minutes. During, for example, a ransomware attack, that could easily make the difference between losing sensitive data and potentially control of your environment and shutting the bad guys out before they do any serious damage.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/470796649-660x454.jpg","width":660,"height":454,"caption":"Getting Your Arms Around Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/coupling-ai-with-asset-management-dns-can-make-an-amazing-difference-in-speed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Coupling AI with Asset Management &#038; DNS Can Make An Amazing Difference In Speed"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7394"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7394\/revisions"}],"predecessor-version":[{"id":7395,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7394\/revisions\/7395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2599"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}