{"id":8293,"date":"2022-11-16T11:02:27","date_gmt":"2022-11-16T19:02:27","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8293"},"modified":"2022-11-16T11:04:00","modified_gmt":"2022-11-16T19:04:00","slug":"discovery-is-the-key-to-both-cybersecurity-and-compliance","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/","title":{"rendered":"Discovery Is The Key To Both Cybersecurity and Compliance"},"content":{"rendered":"<p>When it comes to modern cybersecurity, many security analysts see the network as their friend, one of their strongest lines of defense. In reality, the network is just as often the enemy, hiding vulnerabilities and obscuring the information you need to defend your enterprise.<\/p>\n<p>But by using existing\u2013and often ignored\u2013tools plus a few others, that network can again be a trusted ally.<\/p>\n<p>Two Infoblox senior specialists\u2013Bob Rose, Sr. Product Marketing Manager, DDI &amp; Value-Added Services and Bob Hansmann, Sr. Product Marketing Manager, Network Security\u2013did <strong><a href=\"https:\/\/www.infoblox.com\/resources\/podcast\/threattalk-episode-12-solving-hidden-secops-vulnerabilities-with-network-discovery\" target=\"_blank\" rel=\"noopener\">a podcast together<\/a><\/strong> where they explored how security can have far better visibility and, therefore, far tighter security and much easier compliance.<\/p>\n<p>What did they discuss? Let\u2019s start with DHCP error messages.<\/p>\n<p>\u201cLet\u2019s say you get a DHCP server error message. It could be that the server fails in a network where you only have one DHCP server. Or it might be where all available addresses have been allocated. That&#8217;s another cause for DHCP failure. It could be that your network server failed,\u201d Rose detailed. \u201cIt could be that there was a configuration change that affected the DHCP packet relay. You know that that happens on occasion. Or perhaps there&#8217;s another configuration mistake that happened during a new installation a little bit later.\u201d<\/p>\n<p>That\u2019s all within the system, with technology not playing well with other technology. Then there are the many end-user hiccups, including glitches from IT.<\/p>\n<p>\u201cPeople are making configuration errors. Now there are products out there that will test your configuration. Those are still evolving because even as we were preparing to go live today, you&#8217;re talking about some tools that we all use. Consider the Facebook management platform. They just changed their whole UI, the platforms and those tools to do that,\u201d Hansmann said. \u201cThey exist but they&#8217;re all in such a chaotic level of evolution, that we still have this configuration error problem. There are now vulnerabilities because somebody configured something wrong. So having just this management history here of knowing who did what, but it also applies if I trace the incident because of a vulnerability in some system where somebody changed something. I do need to know when and why, not so that we can figure out who to blame but so that we can learn from that and maybe put in steps to make sure it doesn&#8217;t happen again.\u201d<\/p>\n<p>A big part of the problem that starts to turn the network from friend to foe is complexity, Rose argued.<\/p>\n<p>\u201cDiscovery is so important because it&#8217;s possible that there are IT silos that are out there that have shared access to integrated, authoritative databases or protocols, IP address, network infrastructure, devices and host connectivity, all of that information. You need to be able to see it and if you don&#8217;t, you have a security risk and you could have a service interruption risk. Even worse, if there are rogue devices, somebody can potentially get access through an unmanaged device, get into an environment and impact millions of customers,\u201d Rose said. \u201cIf you have a comprehensive inventory of all of your data, all of your endpoints, you&#8217;re much much better able to see it to an analyze it to validate that your designs are right, that your provisioning is right to do troubleshooting, to manage and really deliver an effective core network service that&#8217;s up and running and performing at its highest level.\u201d<\/p>\n<p>That complexity can also be driven by business moves, especially mergers and acquisitions.<\/p>\n<p>\u201cIn an enterprise environment, networks are really becoming a lot more diverse. They&#8217;re distributed, they&#8217;re multi-vendor. Companies are also dealing with mergers and acquisitions. And so now you&#8217;re dealing with more and more complexity. So how do you ensure that your network devices are secure and compliant and what do you do about it when you have a device that&#8217;s reached the end of support? It&#8217;s not being patched. It&#8217;s not being taken care of any longer,\u201d Rose said. \u201cNow your network is really at risk and open to attack. The challenge of tracking security vulnerabilities is huge. Field notices that you get from Cisco product security incident response team, or Juniper bulletins, managing those become a lot harder. It&#8217;s really a tedious and manual process. If you&#8217;re collecting and aggregating RSS feeds and emails and try to cross tabulate all the vulnerabilities across a multitude of device models and operating systems, that can be overwhelming. And patching is never a one and done thing. And so what you really need is an automated process that gives you continuous multi-vendor advisories and updates that have accurate and rich vendor agnostic device discovery.\u201d<\/p>\n<p>Another level of complexity is introduced through the massive number of file types, especially with data coming from various partners, above and beyond the M&amp;A activity.<\/p>\n<p>\u201cThe data can be really in a lot of different places and in a lot of different formats. Being able to automate collecting and aggregating that information is a big benefit. Not a lot of discovery tools do that but you know, it is done. Now I know what firmware version is needed and I can go out and manually check that, perhaps using my IPAM system. But it means I still have to do it. Having this automated just means that it just does it on a regular schedule or on demand, Hansmann said, \u201cI hit a button and it just does it. That\u2019s the level of automation that is needed.\u201d<\/p>\n<p>Rose added that hybrid discovery is also an important area.<\/p>\n<p>\u201cSo many companies have traditional data centers, but they&#8217;re migrating now to virtualized environments or they&#8217;re migrating to the cloud. You really need full discovery across all of your environments,\u201d Rose said. \u201cYou don&#8217;t want to go into their various instances. You want a single control plane and you want to be able to access that either on-prem or from the cloud.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to modern cybersecurity, many security analysts see the network as their friend, one of their strongest lines of defense. In reality, the network is just as often the enemy, hiding vulnerabilities and obscuring the information you need to defend your enterprise. But by using existing\u2013and often ignored\u2013tools plus a few others, that [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":8294,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[189,753,361,50,776,52,228],"class_list":{"0":"post-8293","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cybersecurity","9":"tag-network-discovery","10":"tag-network-security","11":"tag-dhcp","12":"tag-network-configuration","13":"tag-nios","14":"tag-bloxone-threat-defense","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Network Discoverability Can Boost Cybersecurity &amp; Compliance | Infoblox<\/title>\n<meta name=\"description\" content=\"By using existing\u2013and often ignored\u2013tools plus a few others, networks can be a trusted ally and valued asset in cybersecurity and compliance. Learn more in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discovery Is The Key To Both Cybersecurity and Compliance\" \/>\n<meta property=\"og:description\" content=\"By using existing\u2013and often ignored\u2013tools plus a few others, networks can be a trusted ally and valued asset in cybersecurity and compliance. Learn more in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-16T19:02:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T19:04:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-07.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"Discovery Is The Key To Both Cybersecurity and Compliance\",\"datePublished\":\"2022-11-16T19:02:27+00:00\",\"dateModified\":\"2022-11-16T19:04:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/\"},\"wordCount\":1016,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-07.jpg\",\"keywords\":[\"Cybersecurity\",\"Network Discovery\",\"Network Security\",\"DHCP\",\"Network Configuration\",\"NIOS\",\"BloxOne\u00ae Threat Defense\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/\",\"name\":\"How Network Discoverability Can Boost Cybersecurity & Compliance | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-07.jpg\",\"datePublished\":\"2022-11-16T19:02:27+00:00\",\"dateModified\":\"2022-11-16T19:04:00+00:00\",\"description\":\"By using existing\u2013and often ignored\u2013tools plus a few others, networks can be a trusted ally and valued asset in cybersecurity and compliance. Learn more in this article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-07.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-07.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/discovery-is-the-key-to-both-cybersecurity-and-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Discovery Is The Key To Both Cybersecurity and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Network Discoverability Can Boost Cybersecurity & Compliance | Infoblox","description":"By using existing\u2013and often ignored\u2013tools plus a few others, networks can be a trusted ally and valued asset in cybersecurity and compliance. Learn more in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Discovery Is The Key To Both Cybersecurity and Compliance","og_description":"By using existing\u2013and often ignored\u2013tools plus a few others, networks can be a trusted ally and valued asset in cybersecurity and compliance. Learn more in this article.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/","og_site_name":"Infoblox Blog","article_published_time":"2022-11-16T19:02:27+00:00","article_modified_time":"2022-11-16T19:04:00+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-07.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"Discovery Is The Key To Both Cybersecurity and Compliance","datePublished":"2022-11-16T19:02:27+00:00","dateModified":"2022-11-16T19:04:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/"},"wordCount":1016,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-07.jpg","keywords":["Cybersecurity","Network Discovery","Network Security","DHCP","Network Configuration","NIOS","BloxOne\u00ae Threat Defense"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/","url":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/","name":"How Network Discoverability Can Boost Cybersecurity & Compliance | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-07.jpg","datePublished":"2022-11-16T19:02:27+00:00","dateModified":"2022-11-16T19:04:00+00:00","description":"By using existing\u2013and often ignored\u2013tools plus a few others, networks can be a trusted ally and valued asset in cybersecurity and compliance. Learn more in this article.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-07.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-07.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/discovery-is-the-key-to-both-cybersecurity-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Discovery Is The Key To Both Cybersecurity and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8293"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8293\/revisions"}],"predecessor-version":[{"id":8296,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8293\/revisions\/8296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8294"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}