{"id":8841,"date":"2023-08-22T09:05:02","date_gmt":"2023-08-22T16:05:02","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8841"},"modified":"2023-08-23T10:07:33","modified_gmt":"2023-08-23T17:07:33","slug":"enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/","title":{"rendered":"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity"},"content":{"rendered":"<h3>Introduction<\/h3>\n<p>In today&#8217;s digital landscape, cybersecurity is of paramount importance for organizations across industries. With cyber threats evolving and becoming more sophisticated, it is crucial for your business to continually assess its defense strategies and address any identified gaps. In this blog post, we will explore key recommendations from the 2023 SANS Institute survey, \u201c<strong><a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/sans-2023-survey-visibility-and-attack-surface\" target=\"_blank\" rel=\"noopener\">Visibility and Attack Surface<\/a><\/strong>,\u201d for bolstering your organizational defense. Let&#8217;s dive in!<\/p>\n<h3>Proactive Patching<\/h3>\n<p>As the report references, one of the fundamental steps to fortify cybersecurity is implementing a rigorous and regular patching strategy. Timely updates and patches should be prioritized across the entire IT infrastructure. By promptly addressing vulnerabilities, your organization can mitigate the risk of exploitation by malicious actors.<\/p>\n<h3>Device Visibility<\/h3>\n<p>On average, there are two to three devices for every user on a modern enterprise network, making device visibility as invaluable as user data for alert triage, prioritization and investigation. Many legacy security tools are so focused on the \u2018user\u2019 that both security and networking teams are continually discovering unsanctioned IoT, Raspberry Pis and other shadow devices. It comes as no surprise that threat actors are increasingly leveraging these visibility gaps in their attacks.<\/p>\n<h3>Visibility Plus Continuous Monitoring<\/h3>\n<p>The SANS report goes beyond the obvious \u2018visibility\u2019 requirement to emphasize the need for continuous monitoring, not just visibility through snapshot reports. The addition of real-time monitoring is vital when it come to detecting and responding to cyber threats early and effectively. Investing in security tools and technologies that provide continuous monitoring can help your security teams identify potential threats before they are exploited. In addition, by implementing automated threat intelligence systems, your organization can support proactive threat hunting and remediation. All of these capabilities ensure that analysts have the most accurate and up-to-date threat information available to make prioritization, triage and remediation faster and more efficient.<\/p>\n<h3>Third-Party Risk Management<\/h3>\n<p>As your organization increasingly relies on external vendors, partners and affiliates, it is essential that you develop robust third-party risk management processes. By conducting thorough assessments and monitoring the security practices of third-party entities, your organization can prevent external connections from becoming entry points for attackers. Vigilance in managing third-party risks goes hand-in-hand with maintaining a strong security posture.<\/p>\n<h3>Security Metrics and Measurement<\/h3>\n<p>Before you can accurately evaluate the effectiveness of your defense strategies, you must have a formal metrics program in place. These programs continuously capture a broad range of cybersecurity measurements and KPIs, such as intrusion attempts, mean-time-to-detection, mean-time-to-remediation and dozens more. Identifying areas for improvement based on these metrics empowers your organization to enhance defense mechanisms, stay ahead of potential threats and elevate your security posture.<\/p>\n<h3>Social Media Security<\/h3>\n<p>Social media platforms have become potential threat vectors that every organization must address. To shut down these growing threats, it is essential that SecOps establishing controls and monitoring mechanisms to track and evaluate security incidents that stem from social media. To maximize protection, your organization must recognize the risks associated with social media usage and implement security measures to protect against social engineering attacks and data leakage.<\/p>\n<h3>Employee Security Training:<\/h3>\n<p>Employees are key to maintaining a secure environment, particularly due to social media and other topics noted above. By establishing a comprehensive security training program, you can educate your employees about common cyber threats and equip them with best practices for safeguarding sensitive information. In addition, having your security teams perform realistic-looking (but fake) phishing simulations with your entire staff on a regular basis helps all employees recognize and thwart actual phishing attacks when they occur, minimizing the risk of compromise.<\/p>\n<h3>Conclusion<\/h3>\n<p>In an ever-evolving threat landscape, your organization must continuously strengthen its defense mechanisms to mitigate the risk of cyberattacks. You can significantly enhance your cybersecurity posture by implementing proactive patching, ensuring continuous monitoring and visibility, managing third-party risks, establishing security metrics programs, addressing social media security and conducting employee security training. Remember, cybersecurity is an ongoing process that requires constant vigilance and adaptation. Stay proactive and prioritize cybersecurity to protect your organization&#8217;s valuable assets and maintain the trust of your stakeholders.<\/p>\n<h3>Learn more<\/h3>\n<p>Strengthen your organization&#8217;s security measures based on insights from this <strong><a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/sans-2023-survey-visibility-and-attack-surface\" target=\"_blank\" rel=\"noopener\">SANS survey about visibility and attack surfaces<\/a><\/strong>. Emphasizing a digital-first approach and cloud adoption, this report equips you with the tools you need to address threat visibility and fortify against phishing attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In today&#8217;s digital landscape, cybersecurity is of paramount importance for organizations across industries. With cyber threats evolving and becoming more sophisticated, it is crucial for your business to continually assess its defense strategies and address any identified gaps. In this blog post, we will explore key recommendations from the 2023 SANS Institute survey, \u201cVisibility [&hellip;]<\/p>\n","protected":false},"author":334,"featured_media":8431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[580,189,307,897,898,40,899,838,900],"class_list":{"0":"post-8841","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyber-threat","9":"tag-cybersecurity","10":"tag-phishing","11":"tag-device-visibility","12":"tag-patching","13":"tag-threat-intelligence","14":"tag-third-party-risk","15":"tag-security-operations","16":"tag-security-posture","17":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strengthen Your Organization&#039;s Security Measures: Key Cybersecurity Recommendations | Infoblox<\/title>\n<meta name=\"description\" content=\"Discover valuable insights to fortify your organization&#039;s cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Discover valuable insights to fortify your organization&#039;s cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-22T16:05:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T17:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Hansmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity\" \/>\n<meta name=\"twitter:description\" content=\"Discover valuable insights to fortify your organization&#039;s cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hansmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/\"},\"author\":{\"name\":\"Bob Hansmann\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\"},\"headline\":\"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity\",\"datePublished\":\"2023-08-22T16:05:02+00:00\",\"dateModified\":\"2023-08-23T17:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-01.jpg\",\"keywords\":[\"Cyber threat\",\"Cybersecurity\",\"Phishing\",\"Device Visibility\",\"Patching\",\"Threat Intelligence\",\"Third-Party Risk\",\"Security Operations\",\"Security Posture\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/\",\"name\":\"Strengthen Your Organization's Security Measures: Key Cybersecurity Recommendations | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-01.jpg\",\"datePublished\":\"2023-08-22T16:05:02+00:00\",\"dateModified\":\"2023-08-23T17:07:33+00:00\",\"description\":\"Discover valuable insights to fortify your organization's cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-01.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\",\"name\":\"Bob Hansmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"caption\":\"Bob Hansmann\"},\"description\":\"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-hansmann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthen Your Organization's Security Measures: Key Cybersecurity Recommendations | Infoblox","description":"Discover valuable insights to fortify your organization's cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity","og_description":"Discover valuable insights to fortify your organization's cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!","og_url":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/","og_site_name":"Infoblox Blog","article_published_time":"2023-08-22T16:05:02+00:00","article_modified_time":"2023-08-23T17:07:33+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg","type":"image\/jpeg"}],"author":"Bob Hansmann","twitter_card":"summary_large_image","twitter_title":"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity","twitter_description":"Discover valuable insights to fortify your organization's cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg","twitter_misc":{"Written by":"Bob Hansmann","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/"},"author":{"name":"Bob Hansmann","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8"},"headline":"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity","datePublished":"2023-08-22T16:05:02+00:00","dateModified":"2023-08-23T17:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/"},"wordCount":725,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg","keywords":["Cyber threat","Cybersecurity","Phishing","Device Visibility","Patching","Threat Intelligence","Third-Party Risk","Security Operations","Security Posture"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/","url":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/","name":"Strengthen Your Organization's Security Measures: Key Cybersecurity Recommendations | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg","datePublished":"2023-08-22T16:05:02+00:00","dateModified":"2023-08-23T17:07:33+00:00","description":"Discover valuable insights to fortify your organization's cybersecurity defenses. Learn proactive patching, employee training, continuous monitoring, third-party risk management, security metrics, and social media security. Stay ahead of cyber threats!","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-01.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/enhancing-organizational-defense-sans-recommendations-for-strengthening-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Enhancing Organizational Defense: SANS Recommendations for Strengthening Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8","name":"Bob Hansmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","caption":"Bob Hansmann"},"description":"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-hansmann\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/334"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8841"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8841\/revisions"}],"predecessor-version":[{"id":8845,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8841\/revisions\/8845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8431"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}