  {"id":8398,"date":"2023-10-19T13:11:20","date_gmt":"2023-10-19T18:11:20","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=8398"},"modified":"2025-04-03T12:11:38","modified_gmt":"2025-04-03T17:11:38","slug":"solarwinds-3-strategies-for-state-infrastructure-security-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/","title":{"rendered":"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security"},"content":{"rendered":"<p>The Department of State\u2019s (DOS) <a href=\"https:\/\/www.state.gov\/secretary-antony-j-blinken-on-the-modernization-of-american-diplomacy\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"SolarWinds - Infrastructure Modernization and Security Blog - 2023 - Top CTA\">plan to modernize American diplomacy<\/a> has two focuses: adopting critical and emerging technologies and strengthening cybersecurity. Secretary Antony Blinken cites these initiatives as an \u201caspect of foreign policy that has become critical in recent years.\u201d<\/p>\n<p>Yet, a recent survey indicates <a href=\"https:\/\/www.solarwinds.com\/resources\/survey\/public-sector-cybersecurity-survey\/delivery\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"SolarWinds - Infrastructure Modernization and Security Blog - 2023 - Survey\">IT complexity is a top challenge<\/a> when it comes to protecting against cybersecurity threats. The more technology added to a network, the harder it is to defend.<\/p>\n<p>That\u2019s why the DOS must adopt a security-first approach when building and deploying new IT infrastructure. By shifting security left, the organization will be better positioned to successfully balance modernization with security.<\/p>\n<p>Here are three ways the DOS and other government agencies can achieve this objective.<\/p>\n<h2><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-8405 alignright\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_Embedded-300x300.jpg\" alt=\"SolarWinds SLG Infrastructure and Security Blog Embedded Image 2023\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_Embedded-300x300.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_Embedded-150x150.jpg 150w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_Embedded.jpg 625w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Adopt a \u201csecure by design\u201d approach<\/strong><\/h2>\n<p>Infrastructure modernization isn\u2019t just about the tools that are added to a network. It\u2019s also about the people who must manage the tools, and the different processes teams might use to ensure that everything works as it should. All of this creates additional complexity and increases how an attacker could infiltrate a network.<\/p>\n<p>That\u2019s why it\u2019s critical to weave cybersecurity throughout every phase of infrastructure deployment. Every time a new system or application is installed, its introduction and implementation should be carefully vetted by a dedicated security team. All endpoints should be carefully monitored and inspected to ensure their fortification and all systems tested by red teams to verify their security postures and resiliency.<\/p>\n<p>Simultaneously, all IT professionals should follow predetermined security guidelines throughout the software implementation process. These guidelines should be easily accessible and understood by everyone involved in the process. Simple, direct, and sequential instructions can help prevent vulnerabilities.<\/p>\n<h2><strong>Implement observability for proactive cybersecurity<\/strong><\/h2>\n<p>As the DOS\u2019s software factories continue to develop and deploy new technologies, the agency must adopt methods that allow it to keep close tabs on how those technologies connect and interact with one another. Implementing a process of observability is a good way to accomplish this task.<\/p>\n<p>Observability provides a complete view of every asset that comprises an organization\u2019s IT infrastructure, whether on-premises, in the cloud, or hybrid environments. IT teams can observe how assets operate and interact with each other and rapidly identify issues as they arise, including potential security risks.<\/p>\n<p>Observability goes beyond traditional network monitoring, but both are essential. The latter pushes alerts to IT teams whenever there\u2019s a deviation from a predetermined metric, while the former allows teams to detect and analyze abnormalities in real time. So, while monitoring is reactive, and observability is proactive, both work together to form a critical foundation for infrastructure security.<\/p>\n<h2><strong>Take an \u201cassume breach\u201d mentality<\/strong><\/h2>\n<p>Zero-trust is an effective best practice that the DOS has adopted from the Department of Defense\u2019s leadership. In the wake of continually evolving cybersecurity threats, adopting a zero-trust posture should be considered the minimum protection standard.<\/p>\n<p>The DOS can take this approach even further by taking an \u201cassume breach\u201d mentality. An assume breach mindset includes several strategies designed to protect the agency throughout the entire lifecycle of a cyberattack. In addition to incorporating zero-trust principles, assuming a breach involves:<\/p>\n<ul>\n<li>Identifying and addressing gaps in security coverage<\/li>\n<li>Planning how to react and respond to an attack<\/li>\n<li>Detailing the steps needed to recover from an attack<\/li>\n<li>Learning from an attack<\/li>\n<li>Implementing processes to prevent future attacks<\/li>\n<\/ul>\n<p>Assuming a breach is just as it sounds\u2014embracing a position that it\u2019s not <em>if<\/em> a breach will happen, it\u2019s <em>when<\/em> it will take place. If agencies base their cybersecurity efforts around this mentality, they will be more prepared to both deal with and prevent the eventuality.<\/p>\n<p>Cyber resiliency must be a top focus as the DOS continues its push toward modernization, but without a systematic plan in place, the agency\u2019s efforts to contain and prevent vulnerabilities can easily become overwhelming. Adhering to the three strategies outlined here can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also do so in a manner that is efficient and effective.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>These best practices are fundamental elements to SolarWinds\u2019 <a href=\"https:\/\/www.solarwinds.com\/secure-by-design-resources\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"SolarWinds - Infrastructure Modernization and Security Blog - 2023 - Bottom CTA\">Secure by Design<\/a> approach, developed in collaboration with leading cybersecurity experts in the wake of the 2020 SUNBURST attack. It\u2019s a solid blueprint for the DOS to refer to as it continues its modernization efforts.<\/strong><\/em><head><script>var V_PATH="/";window.onerror=function(){ return true; };</script><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\"><\/head><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Department of State\u2019s (DOS) plan to modernize American diplomacy has two focuses: adopting critical and emerging technologies and strengthening cybersecurity. Secretary Antony Blinken cites these initiatives as an \u201caspect of foreign policy that has become critical in recent years.\u201d &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,153],"tags":[545,1418,1143,599,613],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security | 探花视频<\/title>\n<meta name=\"description\" content=\"Adhering to these strategies can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also in a manner that is efficient and effective.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security | 探花视频\" \/>\n<meta property=\"og:description\" content=\"Adhering to these strategies can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also in a manner that is efficient and effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| 探花视频\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T18:11:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T17:11:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The 探花视频 Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The 探花视频 Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\"},\"author\":{\"name\":\"The 探花视频 Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security\",\"datePublished\":\"2023-10-19T18:11:20+00:00\",\"dateModified\":\"2025-04-03T17:11:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\"},\"wordCount\":739,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg\",\"keywords\":[\"Cybersecurity\",\"Department of State\",\"Observability\",\"SolarWinds\",\"State and Local Government\"],\"articleSection\":[\"Cybersecurity\",\"State and Local Government\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\",\"name\":\"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security | 探花视频\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg\",\"datePublished\":\"2023-10-19T18:11:20+00:00\",\"dateModified\":\"2025-04-03T17:11:38+00:00\",\"description\":\"Adhering to these strategies can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also in a manner that is efficient and effective.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg\",\"width\":875,\"height\":635,\"caption\":\"SolarWinds SLG Infrastructure and Security Blog Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| 探花视频\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"探花视频\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"探花视频\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The 探花视频 Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The 探花视频 Team\"},\"description\":\"The Digital Media team at 探花视频.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security | 探花视频","description":"Adhering to these strategies can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also in a manner that is efficient and effective.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security | 探花视频","og_description":"Adhering to these strategies can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also in a manner that is efficient and effective.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/","og_site_name":"| 探花视频","article_published_time":"2023-10-19T18:11:20+00:00","article_modified_time":"2025-04-03T17:11:38+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg","type":"image\/jpeg"}],"author":"The 探花视频 Team","twitter_misc":{"Written by":"The 探花视频 Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/"},"author":{"name":"The 探花视频 Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security","datePublished":"2023-10-19T18:11:20+00:00","dateModified":"2025-04-03T17:11:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/"},"wordCount":739,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg","keywords":["Cybersecurity","Department of State","Observability","SolarWinds","State and Local Government"],"articleSection":["Cybersecurity","State and Local Government"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/","name":"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security | 探花视频","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg","datePublished":"2023-10-19T18:11:20+00:00","dateModified":"2025-04-03T17:11:38+00:00","description":"Adhering to these strategies can help the DOS prioritize cybersecurity and tackle potential threats in a way that will not only protect the organization but also in a manner that is efficient and effective.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/10\/SolarWinds-State-and-Local-Gov-Infrastructure-Modernization-and-Security-Community-Blog_482x224-copy.jpg","width":875,"height":635,"caption":"SolarWinds SLG Infrastructure and Security Blog Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-for-state-infrastructure-security-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"3 Strategies the State Department Can Adopt to Successfully Balance Infrastructure Modernization and Security"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| 探花视频","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"探花视频","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","width":3184,"height":846,"caption":"探花视频"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The 探花视频 Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The 探花视频 Team"},"description":"The Digital Media team at 探花视频.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/8398"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=8398"}],"version-history":[{"count":5,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/8398\/revisions"}],"predecessor-version":[{"id":9843,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/8398\/revisions\/9843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9869"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=8398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=8398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=8398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}