{"id":547,"date":"2017-11-17T01:00:34","date_gmt":"2017-11-17T01:00:34","guid":{"rendered":"http:\/\/kusuaks7\/?p=152"},"modified":"2025-04-02T07:47:18","modified_gmt":"2025-04-02T07:47:18","slug":"the-evolution-of-enterprise-iot-and-its-security-risks","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/the-evolution-of-enterprise-iot-and-its-security-risks\/","title":{"rendered":"The evolution of enterprise IoT and its security risks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"547\" class=\"elementor elementor-547\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5fa27114 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fa27114\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c50d7ec\" data-id=\"3c50d7ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56fee10f elementor-widget elementor-widget-text-editor\" data-id=\"56fee10f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong><em>Ready to learn Internet of Things? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/tracks\/internet-of-things-training-certification\">Internet of Things (IoT) Training<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-044812f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"044812f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b3a226\" data-id=\"8b3a226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd2a519 elementor-widget elementor-widget-text-editor\" data-id=\"cd2a519\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe internet of things is changing the world as we know it, connecting devices to the internet to collect, transfer and exchange data. While IoT has been around for some time as part of Industry 4.0 and available in consumer products such as Fitbit, Nest and so forth, its applications in the enterprise are relatively new and constantly changing. Over time, businesses have realized that\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Three-examples-of-IoT-in-the-enterprise\" class=\"broken_link\" rel=\"noopener\">IoT applications have critical value<\/a>, such as quantifying performance indicators, enabling efficiency mechanisms and optimizing corporate performance. Yet, in light of their increasingly widespread application, it\u2019s time to discuss how IoT applications have evolved in the enterprise and what some of the hidden threats of engaging in IoT innovation may be.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d5b834f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d5b834f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0342614\" data-id=\"0342614\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15e0de1 elementor-widget elementor-widget-heading\" data-id=\"15e0de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>The evolution of enterprise IoT<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9d18370 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d18370\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-143bf7a\" data-id=\"143bf7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85317a7 elementor-widget elementor-widget-text-editor\" data-id=\"85317a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe internet of things first caught on in the industrial sector as part of the attempt to automate manual processes on the assembly line. A trend known as Industry 4.0 began in Germany and has now spread around the world, and involves transitioning to the \u201csmart factory\u201d in which IoT devices and cyber-physical systems communicate to carry out tasks. Since, enterprise IoT has expanded to nearly every sector and business unit \u2014 from retail to food and beverage and even to government and military \u2014 due to its benefits for productivity and data collection. Indeed, the strength of the IoT trend is backed by Gartner\u2019s assertion that there will be\u00a0<a href=\"http:\/\/www.gartner.com\/smarterwithgartner\/the-internet-of-things-and-the-enterprise\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">25 billion internet-connected devices<\/a>\u00a0by 2020, resulting in nearly $2 trillion in economic profit for those applying, purchasing and producing IoT technologies.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1214039 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1214039\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1dad383\" data-id=\"1dad383\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aa7e2bb elementor-widget elementor-widget-text-editor\" data-id=\"aa7e2bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe evolution of enterprise IoT started out with simple internet-connected devices, such as VoIP telephones, printers and cameras. Instead of being hardwired onto the network, these devices can connect to the internet to improve performance within hyper-connected organizations. The keyword to remember here is\u00a0<em>can<\/em>\u00a0because the device, such as VoIP phone, doesn\u2019t have to be connected \u2014 and in many cases, isn\u2019t, but it can be connected if the need arises. This creates an area of vulnerability for enterprise because these relatively simple devices are usually overlooked in assessing network security needs, yet the potential for them to connect to the web could make them a\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Failure-to-implement-adequate-IoT-security-framework-threatens-internet\" rel=\"noopener\">gateway for cyberattacks<\/a>.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5b264dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b264dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54989f3\" data-id=\"54989f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fef5010 elementor-widget elementor-widget-text-editor\" data-id=\"fef5010\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe next stage of evolution in enterprise IoT is what you would call infrastructural IoT, or smart thermostats, water and electricity controls, and even kitchen appliances such as coffee machines and refrigerators. The main difference between infrastructural IoT devices and connected devices is that the former have an operating system installed that can be easily hacked and manipulated, while the latter only have the possibility of connecting to the web. Infrastructural IoT devices communicate with crucial endpoints on the network, such as switches, servers and computers. Therefore, using infrastructural IoT devices, hackers can apprehend the device and gain access to data stored on the network, creating the potential for data leaks and denial-of-service and malware attacks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2ba0d41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ba0d41\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e186d2\" data-id=\"2e186d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5aac37 elementor-widget elementor-widget-text-editor\" data-id=\"e5aac37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere is another more advanced kind of IoT device type that is relevant for enterprise: smart, data-collecting devices such as smart TVs and artificial intelligence gadgets. These have the same characteristics as the first two kinds of IoT devices \u2014 connecting to the internet and carrying out communications, but they are more advanced in that they collect\u00a0<em>and<\/em>\u00a0apply data. In a sense, these devices really have a mind of their own because they can make decisions\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Smarter-IoT-applications-incorporate-machine-learning\" rel=\"noopener\">based on machine learning<\/a>\u00a0and behavioral patterns and can even compile and share their own reports. While such devices have obvious benefits for businesses, including improved performance and efficiency, they present risks to the security of the enterprise network. The story of surveillance carried out over smart TVs is largely common knowledge by this point, but what many don\u2019t realize is that smart TVs aren\u2019t just listening to us, they are providing hackers with easy access to company data, conversations and network vulnerabilities. So, while investing in innovative technology has its benefits, the information the devices collect, share and apply put the enterprise network at risk.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-78ecede elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78ecede\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6068fe\" data-id=\"f6068fe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12e7235 elementor-widget elementor-widget-heading\" data-id=\"12e7235\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Combating IoT risks<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-bbe6592 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbe6592\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17bc646\" data-id=\"17bc646\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-116c73b elementor-widget elementor-widget-text-editor\" data-id=\"116c73b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere\u2019s no doubt that the evolution of IoT applications in enterprise settings has provided tools to streamline and improve businesses everywhere from the office to the factory and even in the kitchen. However, until official regulation is drafted that controls the security of these devices, organizations should remain alert to the underlying risks. To gain a hold on enterprise IoT security, organizations need complete visibility into the endpoints of all types connecting to their network, as well as mechanisms to control permissions and access for those endpoints.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-15d479a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15d479a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd41116\" data-id=\"fd41116\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4ad04b elementor-widget elementor-widget-text-editor\" data-id=\"c4ad04b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA few best practices to live by for IoT in enterprise:\n<ol>\n \t<li>Attain\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/The-IoT-security-cheat-sheet-What-you-need-to-know\" rel=\"noopener\">visibility into IoT devices<\/a>, including their characteristics, location and network attributes. Visibility provides IT professionals with network knowledge that can be used to map out an IoT security strategy, help understand immediate IT security needs and as part of vulnerability or threat mapping. As more IT professionals are tasked with addressing cybersecurity concerns in the organization, an IoT visibility tool is key in helping them understand the state of endpoints on the network.<\/li>\n \t<li>Controlling access for IoT devices is just as important as seeing them. Segmenting IoT devices into a firewalled part of the network should be standard practice until security agents are made available for IoT devices. In addition, IT professionals should set specific access policies for IoT devices to control their connectivity, but they should also control access to the IoT device from other endpoints (for example, employees and contractors) to ensure that gateway attacks aren\u2019t possible.<\/li>\n \t<li>Understanding device risk is another important practice seeing as there is still only limited information about IoT security vulnerabilities. If IT professionals can track normal and abnormal behavior for the IoT device, they may be able to prevent breaches and attacks carried out by accessing IoT devices. In the absence of\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/feature\/IoT-security-companies-take-on-device-discovery-authentication\" rel=\"noopener\">authentication<\/a>, assigning risk scores to IoT devices based on their network behavioral patterns is a great way to control hidden threats.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c445d1d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c445d1d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea5afaf\" data-id=\"ea5afaf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c449c5 elementor-widget elementor-widget-text-editor\" data-id=\"9c449c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIoT may be the next big thing in enterprise technology, but the various types of connected devices that seem useful for a business have the potential to cause more harm than they help. If these risks are controlled with some of the abovementioned best practices, IoT can be engaged with in a healthier and safer fashion. If not, IoT has the potential to evolve into a minefield for cyber-risk in the enterprise.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-befe181 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"befe181\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec28847\" data-id=\"ec28847\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc87781 elementor-widget elementor-widget-text-editor\" data-id=\"fc87781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<em>Originally posted at <a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/The-evolution-of-enterprise-IoT-and-its-security-risks\" rel=\"noopener\">IoT Agenda<\/a><\/em>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ready to learn Internet of Things? Browse courses\u00a0like\u00a0Internet of Things (IoT) Training developed by industry thought leaders and Experfy in Harvard Innovation Lab.The internet of things is changing the world as we know it, connecting devices to the internet to collect, transfer and exchange data. While IoT has been around for some time as part<\/p>\n","protected":false},"author":91,"featured_media":3050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1642],"class_list":["post-547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1642,"user_id":91,"is_guest":0,"slug":"ofer-amitai","display_name":"Ofer Amitai","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Amitai","first_name":"Ofer","job_title":"","description":"Ofer Amitai is CEO and co-founder of&nbsp;<a href=\"https:\/\/www.portnox.com\/\" target=\"_blank\" rel=\"noopener\">Portnox<\/a>. With over 20 years&#039; experience in network security, he established the first IT security team in the Israeli Air Force. He managed the security division at Xpert Integrated Systems and served as Microsoft regional director of security. He is a proven innovator and thought leader in network security."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=547"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/547\/revisions"}],"predecessor-version":[{"id":37549,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/547\/revisions\/37549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3050"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=547"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}