{"id":7692,"date":"2022-04-21T16:58:35","date_gmt":"2022-04-21T23:58:35","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7692"},"modified":"2022-04-21T17:03:14","modified_gmt":"2022-04-22T00:03:14","slug":"hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/","title":{"rendered":"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil"},"content":{"rendered":"<p>On April 11, 2022, three leading InfoSec experts joined Hack, No! host Cricket Liu, Executive Vice President and Chief Evangelist at Infoblox, for a timely discussion titled <strong>Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil<\/strong>. The hour-long event profiled the security measures organizations can take to combat the rapidly increasing Internet risks spawned by the war in Ukraine. Participating panelists included cyber security veterans Tom Kellermann Head of Cybersecurity Strategy for VMware, Chris Usserman, Director of Security Architecture at Infoblox and Krupa Srivatsan, Head of Product Marketing for our security products.<\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png\" alt=\"\" width=\"1335\" height=\"749\" class=\"aligncenter size-full wp-image-7695\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png 1335w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil-300x168.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil-1024x575.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil-768x431.png 768w\" sizes=\"auto, (max-width: 1335px) 100vw, 1335px\" \/><\/a><\/p>\n<p>Cricket set the stage by asking panelists to describe the main types of cyber security risks that have changed since the onset of the war. Krupa Srivatsan noted the activity around new Ukraine-related lookalike domain names and their use in malware attacks. Prominent malware spread through these attacks were Agent Tesla, a key logging program used to capture credentials as victims type, and Remcos, a powerful random access Trojan (RAT), designed to capture victims\u2019 computer screens.<\/p>\n<p>Chris Usserman observed that the use of malicious domains by bad actors tends to spike in times of global upheaval such as that involving the war in Ukraine. Tom Kellerman added that the cyber attacks started several months before the Russian invasion with successive attacks involving data-deleting wiper software and the reprovisioning of botnets, such as the banking industry Trojan TrickBot. <\/p>\n<p>Panelists also noted that the rise in island hopping tactics, in which threat actors target vulnerable partner networks to find ways to get into a primary target network, means that those partner organizations are now more likely to become attack victims. They mentioned that the sectors most at risk include energy, telecommunications, finance and public health.<\/p>\n<p>The discussion also addressed how the cyber security community was responding to these new threats. Krupa said that Infoblox Cyber Intelligence Unit regularly shares emerging threat intelligence across the cyber security ecosystem and has taken to posting newly detected indicators of compromise (IoCs) and has accelerated threat sharing by posting IoCs on GitHub. Tom noted that the destructive fallout of cyber attacks from the war in Ukraine has been minimal in the U.S. as the result of unprecedented threat data sharing, notably between the Joint Cyber Defense Collaborative (JCDC) and the larger tech community.<\/p>\n<p>The discussion pivoted to describing specific defensive tactics that organizations can readily deploy. The first of these was to simply make use of security resources open to all organizations. Panelists pointed out that some of the best resources can be found on websites for <a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noopener\">CISA<\/a>, the <a href=\"https:\/\/www.fbi.gov\/\" target=\"_blank\" rel=\"noopener\">FBI<\/a> and the <a href=\"https:\/\/cyber-center.org\/\" target=\"_blank\" rel=\"noopener\">National Cybersecurity Center<\/a>. They made specific mention of the <a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noopener\">Shields Up Campaign<\/a>, available through the CISA web site, as well as the importance of building relationships with regional FBI and local law enforcement personnel.<\/p>\n<p>Another tactic the panelists encouraged was the use of Response Policy Zones (RPZs), which when continuously updated with emerging IoCs and properly implemented, can be used to automatically block devices from connecting with newly discovered malicious domains. Krupa noted that RPZs can be used to both proactively block a device from connecting to bad destinations and isolate an already-compromised device to prevent further spread.<\/p>\n<p>The next defensive tactic up for discussion was the use of SaaS-based DNS security, which panelists mentioned is well-suited to helping protect roaming users in the new age of remote work. They described how SaaS-based DNS security enables all users everywhere to have lightweight security available on a laptop that is hosted and managed from the cloud, ensuring that all devices comply with policies and are not able to connect with known malicious destinations. <\/p>\n<p>Cricket then shifted the discussion to the all-important tactic of ecosystem integration. Panelists observed that in addition to having security solutions that integrate with existing SIEM and SOAR deployments, it is also essential that organizations work with security vendors who believe in open APIs and open ecosystems. Panelists also discussed how proper integration and network context can minimize the number of duplicate alerts different security tools produce.<\/p>\n<p>The panel wrapped up the session by describing security trends such as SASE and new tools coming on the market. Panelists described the upcoming extended network detection response (XDR) coming soon from VMware and new attack surface detection capabilities in the works from Infoblox.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On April 11, 2022, three leading InfoSec experts joined Hack, No! host Cricket Liu, Executive Vice President and Chief Evangelist at Infoblox, for a timely discussion titled Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil. The hour-long event profiled the security measures organizations can take to combat the [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":7695,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[189,334,360,680,681,424],"class_list":{"0":"post-7692","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cybersecurity","9":"tag-cisa","10":"tag-dns-security","11":"tag-national-cybersecurity-center","12":"tag-shields-up-campaign","13":"tag-hack-no","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting Your Network From Wartime Cyber Risks | Hack No! | Infoblox<\/title>\n<meta name=\"description\" content=\"The war in Ukraine has spurred a wave of cyber threats for the distributed workforce. Learn what top cyber experts recommend to keep your organization safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil\" \/>\n<meta property=\"og:description\" content=\"The war in Ukraine has spurred a wave of cyber threats for the distributed workforce. Learn what top cyber experts recommend to keep your organization safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-21T23:58:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-22T00:03:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1335\" \/>\n\t<meta property=\"og:image:height\" content=\"749\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil\",\"datePublished\":\"2022-04-21T23:58:35+00:00\",\"dateModified\":\"2022-04-22T00:03:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/\"},\"wordCount\":734,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png\",\"keywords\":[\"Cybersecurity\",\"CISA\",\"DNS Security\",\"National Cybersecurity Center\",\"Shields Up Campaign\",\"Hack No\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/\",\"name\":\"Protecting Your Network From Wartime Cyber Risks | Hack No! | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png\",\"datePublished\":\"2022-04-21T23:58:35+00:00\",\"dateModified\":\"2022-04-22T00:03:14+00:00\",\"description\":\"The war in Ukraine has spurred a wave of cyber threats for the distributed workforce. Learn what top cyber experts recommend to keep your organization safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png\",\"width\":1335,\"height\":749},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Your Network From Wartime Cyber Risks | Hack No! | Infoblox","description":"The war in Ukraine has spurred a wave of cyber threats for the distributed workforce. Learn what top cyber experts recommend to keep your organization safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/","og_locale":"en_US","og_type":"article","og_title":"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil","og_description":"The war in Ukraine has spurred a wave of cyber threats for the distributed workforce. Learn what top cyber experts recommend to keep your organization safe.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/","og_site_name":"Infoblox Blog","article_published_time":"2022-04-21T23:58:35+00:00","article_modified_time":"2022-04-22T00:03:14+00:00","og_image":[{"width":1335,"height":749,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png","type":"image\/png"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil","datePublished":"2022-04-21T23:58:35+00:00","dateModified":"2022-04-22T00:03:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/"},"wordCount":734,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png","keywords":["Cybersecurity","CISA","DNS Security","National Cybersecurity Center","Shields Up Campaign","Hack No"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/","url":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/","name":"Protecting Your Network From Wartime Cyber Risks | Hack No! | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png","datePublished":"2022-04-21T23:58:35+00:00","dateModified":"2022-04-22T00:03:14+00:00","description":"The war in Ukraine has spurred a wave of cyber threats for the distributed workforce. Learn what top cyber experts recommend to keep your organization safe.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hack-no-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil.png","width":1335,"height":749},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/hack-no-recap-using-your-security-ecosystem-to-protect-the-anywhere-worker-in-a-world-of-geopolitical-turmoil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Hack, No! Recap: Using Your Security Ecosystem to Protect the Anywhere Worker in a World of Geopolitical Turmoil"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7692"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7692\/revisions"}],"predecessor-version":[{"id":7696,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7692\/revisions\/7696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7695"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}