{"id":7629,"date":"2022-04-14T11:15:53","date_gmt":"2022-04-14T18:15:53","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7629"},"modified":"2022-04-04T12:25:28","modified_gmt":"2022-04-04T19:25:28","slug":"the-case-for-cybersecurity-modernization","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/","title":{"rendered":"The Case for Cybersecurity Modernization"},"content":{"rendered":"<p>Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.<\/p>\n<p>Given the massive differences in cybersecurity levels in many companies both in energy and transportation, there is a pragmatic logic to providing a basic set of guidelines that most organizations can implement fairly easily and quickly. That said, given the extreme importance of cybersecurity in 2022 due in part to ransomware and state actor attacks, it might be prudent to ask what else companies can do.<\/p>\n<p>The U.S. Department of Homeland Security\u2019s Transportation Security Administration (TSA) issued <a href=\"https:\/\/www.tsa.gov\/news\/press\/releases\/2021\/12\/02\/dhs-announces-new-cybersecurity-requirements-surface-transportation\">two security directives issued in December 2021<\/a>. First, we should stress that all of these directives are not being published for the entire industry, so we can only discuss the few details they have announced.<\/p>\n<p><em>The TSA Security Directives announced today target higher-risk freight railroads, passenger rail, and rail transit, based on a determination that these requirements need to be issued immediately to protect transportation security.\u00a0 These Directives require owners and operators to:<\/em><\/p>\n<ol>\n<li><em>designate a cybersecurity coordinator;\u00a0<\/em><\/li>\n<li><em>report cybersecurity incidents to CISA within 24 hours;\u00a0<\/em><\/li>\n<li><em>develop and implement a cybersecurity incident response plan to reduce the risk of an operational disruption; and,\u00a0\u00a0<\/em><\/li>\n<li><em>complete a cybersecurity vulnerability assessment to identify potential gaps or vulnerabilities in their systems.<\/em><\/li>\n<\/ol>\n<p>While many enterprises may already have been doing some of these for years if not decades, the conversation also needs to move towards resilient approaches that can increase their defenses.<\/p>\n<p>The energy new rules\u2013specifically, for \u201c<a href=\"https:\/\/www.dhs.gov\/news\/2021\/07\/20\/dhs-announces-new-cybersecurity-requirements-critical-pipeline-owners-and-operators\">critical pipeline owners and operators<\/a>\u201d&#8211;came out the summer of 2021. The second directive, which builds on top of a first directive back in May of 20201, requires pipeline owners and operators to \u201cimplement specific mitigation measures to protect against ransomware attacks and other known threats to IT and OT systems,\u00a0develop and implement a cybersecurity contingency\u00a0and recovery plan, and conduct a cybersecurity architecture design review.\u201d<\/p>\n<p>What companies need to do today to boost cybersecurity is to not only boost security defenses, but to make sure they have modern mechanisms in place to use those security tools and get maximum value out of those tools.<\/p>\n<p>The best example: Automation. The speed and intensity of attacks is such that enterprises need to come up with new ways to keep up. After all, the best way to slow down a meaningful defense is to hide\/obscure the attack for as long as possible. That typically means either an undifferentiated flood of simultaneous attacks\u2013to hide the actual attack\u2013or to stage one large focused attack, such as a DDOS, to take attention away from the real target, such as rerouting Payroll payments or downloading a half-petabyte of customer data. Otherwise, Security will waste lots of time chasing down bogus alerts\u2013which is precisely what the attackers want.<\/p>\n<p>Automating incident response and investigation as much as possible, along with leveraging machine learning to allow the system to figure out what to do, is an ideal way to quickly identify the real attack so that the SOC team can minimize impact of the attack.<\/p>\n<p>A big challenge for security today is that many enterprises have not sufficiently changed their security defenses over the last several years, despite the fact that the attack surface they are defending has dramatically changed. How so?<\/p>\n<ul>\n<li>Much higher cloud usage than had been projected for 2022,<\/li>\n<li>Remote sites have soared<\/li>\n<li>On-prem has shrunk faster than expected for 2022<\/li>\n<li>Partners (contractors, suppliers, distributors, supply chain, large customers, etc.) are demanding and being granted far deeper access to data, apps and systems<\/li>\n<li>IoT and IIoT increasing rapidly, including IoT with independent communications capabilities (antenna) and secret IIoT. Secret IIoT such as manufacturing systems that the enterprise has used for decades, but the vendor has now added IIoT devices without telling the enterprise. Surprise!<\/li>\n<\/ul>\n<p>And yet, the cybersecurity defense strategies are relatively the same. Please don\u2019t get me wrong. Tools and apps and network appliances have been repeatedly upgraded, with better security. But the defense strategy is pretty much the same, despite the cybersecurity landscape being entirely different.<\/p>\n<p>Enterprises need to embrace the intent of modernizing security, including seriously starting the journey to true zero trust, boosting authentication (including behavioral analytics, continuous authentication, and robust MFA, which means excluding weak efforts such as unencrypted SMS).<\/p>\n<p>Are enterprises truly using modern security? Are they leveraging network segmentation via DNS? Do they have strong meaningful real-time visibility into what OT systems are on the network and what are they doing? Enterprises need to maintain a list of domains that are frequently visited and match them to domain reputations.<\/p>\n<p>Those partners that are now getting deeper access? Contracts with those partners must now insist on the partner matching the enterprise\u2019s security level, verified by routine third-party audits.<\/p>\n<p>There are many straight-forward approaches to security modernization. The most critical first step, though, is making sure that your enterprise is focusing on what it needs to defend and protect, which includes leveraging what you can from your existing systems. But if you limit your efforts to slightly upgrading what you already have, you may find that your arsenal is no longer up its task.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness. Given the massive differences in cybersecurity levels in many companies [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":1320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[479,288,667,405,611,636,668],"class_list":{"0":"post-7629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyber-security","9":"tag-ransomware","10":"tag-pipeline-security","11":"tag-zero-trust","12":"tag-iiot","13":"tag-network-modernization","14":"tag-network-visibility","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Case for Cybersecurity Modernization<\/title>\n<meta name=\"description\" content=\"The Case for Cybersecurity Modernization. Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Case for Cybersecurity Modernization\" \/>\n<meta property=\"og:description\" content=\"The Case for Cybersecurity Modernization. Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-14T18:15:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"The Case for Cybersecurity Modernization\",\"datePublished\":\"2022-04-14T18:15:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/\"},\"wordCount\":892,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"keywords\":[\"Cyber security\",\"Ransomware\",\"pipeline security\",\"Zero Trust\",\"IIoT\",\"Network modernization\",\"network visibility\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/\",\"name\":\"The Case for Cybersecurity Modernization\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"datePublished\":\"2022-04-14T18:15:53+00:00\",\"description\":\"The Case for Cybersecurity Modernization. Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"What Makes the Infoblox Security EcoSystem so Powerful?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-case-for-cybersecurity-modernization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Case for Cybersecurity Modernization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Case for Cybersecurity Modernization","description":"The Case for Cybersecurity Modernization. Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/","og_locale":"en_US","og_type":"article","og_title":"The Case for Cybersecurity Modernization","og_description":"The Case for Cybersecurity Modernization. Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/","og_site_name":"Infoblox Blog","article_published_time":"2022-04-14T18:15:53+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"The Case for Cybersecurity Modernization","datePublished":"2022-04-14T18:15:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/"},"wordCount":892,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","keywords":["Cyber security","Ransomware","pipeline security","Zero Trust","IIoT","Network modernization","network visibility"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/","name":"The Case for Cybersecurity Modernization","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","datePublished":"2022-04-14T18:15:53+00:00","description":"The Case for Cybersecurity Modernization. Government regulators have been recently taking an increased and active interest in cybersecurity defenses, especially with transportation and energy industries. Although the best practices proposed are basic measures that organizations should take, there are additional approaches that can boost an organization\u2019s security capabilities and responsiveness.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","width":660,"height":454,"caption":"What Makes the Infoblox Security EcoSystem so Powerful?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-case-for-cybersecurity-modernization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The Case for Cybersecurity Modernization"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7629"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7629\/revisions"}],"predecessor-version":[{"id":7630,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7629\/revisions\/7630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1320"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}