{"id":9405,"date":"2013-03-04T12:31:00","date_gmt":"2013-03-04T18:31:00","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=9405"},"modified":"2013-03-04T11:31:30","modified_gmt":"2013-03-04T17:31:30","slug":"sharpening-endpoint-security","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=9405","title":{"rendered":"Sharpening Endpoint Security"},"content":{"rendered":"<blockquote><p>Endpoints are as hard to define as they are to protect. The term traditionally referred to desktops and laptops, but endpoints now encompass smartphones, tablets, point-of-sale machines, bar code scanners, multifunction printers and practically any other device that connects to the company network. Without a well-conceived strategy, keeping track of and securing these devices is difficult and frustrating.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.darkreading.com\/security\/client-security\/240149740\/sharpening-endpoint-security.html\">Sharpening Endpoint Security &#8211; Dark Reading<\/a>.<\/p>\n<blockquote><p>Some IT shops buy cleverly marketed products that promise off-the-shelf endpoint security using anti-malware and sandboxing. In most cases, attackers can easily bypass those defenses<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Endpoints are as hard to define as they are to protect. The term traditionally referred to desktops and laptops, but endpoints now encompass smartphones, tablets, point-of-sale machines, bar code scanners, multifunction printers and practically any other device that connects to &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=9405\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[170,761,101],"class_list":["post-9405","post","type-post","status-publish","format-standard","hentry","category-technical","tag-data-modeling","tag-endpoints","tag-security"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9405"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9405\/revisions"}],"predecessor-version":[{"id":9406,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9405\/revisions\/9406"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9405"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}