{"id":7633,"date":"2022-06-04T13:16:38","date_gmt":"2022-06-04T20:16:38","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7633"},"modified":"2022-04-04T13:34:29","modified_gmt":"2022-04-04T20:34:29","slug":"effective-visibility-goes-way-beyond-ip-addresses","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/","title":{"rendered":"Effective Visibility Goes Way Beyond IP Addresses"},"content":{"rendered":"<p>Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.<\/p>\n<p>As much as cloud usage is soaring and that presents a wide range of new issues, the reality is that most enterprise networks\u2013to varying degrees\u2013went to the cloud a very long time ago.<\/p>\n<p>That includes discovering software-defined networks (SDN) such as Cisco ACI or SD-WANs including Cisco Miraki or Cisco Viptela. Remote sites in particular mean that enterprises must enhance and unify hybrid IPAM visibility.<\/p>\n<p>In short, this allows for network staff to quickly search for IP addresses, find device names, what types they are, what vendors or models or versions or even chassis serial numbers they have. This all enables far greater forensic insights and context.<\/p>\n<p>Those searches facilitate the critical goal of detecting and remediating rogue and\/or compromised assets while also reconciling networks to any IPAM conflicts and collecting firmware information to help with updates and patches.<\/p>\n<h3>Easy Access<\/h3>\n<p>With cybersecurity defenses as well as compliance rules, it\u2019s essential to have easy access to adhoc and standardized reports to have visibility into any access and to see if anything significant has changed. For example, when a staffer engages in some shadow IT and throws onto the network a router they picked up at Target, that forces the question: Is it in compliance? Almost certainly not.<\/p>\n<p>Another problematic network element are switches. Having deep and current visibility into the discovery of a switch port is an urgent need, especially with tracking free, available and unused ports or those that are connected to wired or wireless end hosts.<\/p>\n<p>Delving into switches can deliver a world of helpful data, including IP and Mac addresses, the admin and operations status, the switch port description, VLAN configurations, their IDs, their names, the data VLANs, the voice VLANs, the beginning and ending of those ranges, along with metadata and metatags associated with switches and ports.<br \/>\nToday\u2019s enterprise networks are inherently more complex, featuring a large number of vendors working off of multiple operating systems.<\/p>\n<p>&#8220;IT needs visibility into all of that, along with the ability to convert IP networks and address into managed objects. Discovery needs to be a lot more than a simple ping sweep,&#8221; said Bob Rose, senior product marketing manager at Infoblox. &#8220;IT needs robust information on DNS, DHCP, host objects, devices (both physical and virtual), models, OS, versions, interfaces, along with current data on routers, subnets and VLANs.&#8221;<\/p>\n<h3>VLAN Advantages<\/h3>\n<p>That VLAN issue is critical given the sharply increasing number of assets and data moving to clouds controlled by third-parties, where IT may not truly know where the data and assets are physically located. But with the right systems in place, all of that information is still discoverable, especially in regards to VM instances. It\u2019s not only being able to determine Layer 2 physical and Layer 3 logical devices, but to understand how these complex components actually are connected on the network.<\/p>\n<p>That is because if IT understands how those elements are actually connected, it helps to manage the changes and the configurations both for traditional networks and virtualized networks using technologies like VRF (virtual routing and forwarding). VRF allows for multiple routing tables and multiple forwarding instances on the same router. All of this also gives visibility into end hosts connected to physical switches and that can deliver both a current view and an historical view. The historical view is essential for effective forensic investigations.<\/p>\n<p>Too many security products today just share the information about this endpoint and this endpoint and this server. But they don\u2019t typically answer the important question: how did the problem move between them? It\u2019s important to know how they are connected because that\u2019s when you start realizing that in order for it to get from Point A to Point B, it had to compromise something else. These threats will compromise devices, do what they need to do with them and then clean up after themselves and then move on. We\u2019ve even seen some that were able to take advantage of a device because the firmware hadn\u2019t been properly updated. Before they moved on, they updated the firmware. If you weren\u2019t tracking your firmware revisions, you wouldn\u2019t have known that.<\/p>\n<p>How do you understand how the network constructs fit together so that you can see a topology view, visualize how those devices are connected and then drill down to see how specific devices are operating on your network. It\u2019s all about being to have all of this information all in one place, in an IPAM database.<\/p>\n<p>Another consideration is data-sharing. That\u2019s why OpenAPIs are so useful, as they can give easy access to perhaps a threat-hunting tool, a SIEM or even SOAR for automation. The more context your systems have, the better it is for both cybersecurity and compliance.<\/p>\n<p>Networks also need to track end of life and end of service of different types of devices. How can you eliminate device vulnerabilities with automated security and lifecycle management? Integrate with DNS, DHCP and IPAM.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue. As much as cloud usage is soaring and that presents a wide range of new issues, the reality is that most enterprise networks\u2013to varying degrees\u2013went to the cloud a very [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":1635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[668,478,671,672,673],"class_list":{"0":"post-7633","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-network-visibility","9":"tag-ip-address-management","10":"tag-enterprise-network","11":"tag-vlan","12":"tag-dns-dhcp-ipam","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Effective Visibility Goes Way Beyond IP Addresses<\/title>\n<meta name=\"description\" content=\"Effective Visibility Goes Way Beyond IP Addresses. Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Effective Visibility Goes Way Beyond IP Addresses\" \/>\n<meta property=\"og:description\" content=\"Effective Visibility Goes Way Beyond IP Addresses. Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-04T20:16:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"Effective Visibility Goes Way Beyond IP Addresses\",\"datePublished\":\"2022-06-04T20:16:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/\"},\"wordCount\":864,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"keywords\":[\"network visibility\",\"ip address management\",\"enterprise network\",\"VLAN\",\"DNS DHCP IPAM\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/\",\"name\":\"Effective Visibility Goes Way Beyond IP Addresses\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"datePublished\":\"2022-06-04T20:16:38+00:00\",\"description\":\"Effective Visibility Goes Way Beyond IP Addresses. Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/effective-visibility-goes-way-beyond-ip-addresses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Effective Visibility Goes Way Beyond IP Addresses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Effective Visibility Goes Way Beyond IP Addresses","description":"Effective Visibility Goes Way Beyond IP Addresses. Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/","og_locale":"en_US","og_type":"article","og_title":"Effective Visibility Goes Way Beyond IP Addresses","og_description":"Effective Visibility Goes Way Beyond IP Addresses. Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/","og_site_name":"Infoblox Blog","article_published_time":"2022-06-04T20:16:38+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"Effective Visibility Goes Way Beyond IP Addresses","datePublished":"2022-06-04T20:16:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/"},"wordCount":864,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","keywords":["network visibility","ip address management","enterprise network","VLAN","DNS DHCP IPAM"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/","url":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/","name":"Effective Visibility Goes Way Beyond IP Addresses","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","datePublished":"2022-06-04T20:16:38+00:00","description":"Effective Visibility Goes Way Beyond IP Addresses. Network visibility is critical for cybersecurity and compliance, but that means going way beyond IP address tracking, given how many network layers are at issue.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/effective-visibility-goes-way-beyond-ip-addresses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Effective Visibility Goes Way Beyond IP Addresses"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7633"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7633\/revisions"}],"predecessor-version":[{"id":7776,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7633\/revisions\/7776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1635"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}