{"id":54173,"date":"2023-10-17T12:30:00","date_gmt":"2023-10-17T12:30:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3708752\/networking-and-security-teams-tasked-to-converge-collaborate.html#tk.rss_security"},"modified":"2023-10-17T12:30:00","modified_gmt":"2023-10-17T12:30:00","slug":"networking-and-security-teams-tasked-to-converge-collaborate","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/","title":{"rendered":"Networking and security teams tasked to converge, collaborate"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/03\/10\/10\/programming_development_programmers_developers_work_together_to_review_code_collaboration_by_joyseulay_shutterstock_1675024168_creative_digital-only_2400x1600-100892982-large-100938371-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups \u2013 or at least boosting collaboration between teams, according to research from Cato Networks.<\/p>\n<p>In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams \u201cmust work together,\u201d and another 30% said they \u201cmust have shared processes.\u201d Another 8% said they\u2019re working to create one networking and security group.<\/p>\n<p>The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have \u201cturf wars or struggle working together,\u201d and another 34% said they \u201coccasionally have problems working together.\u201d The remaining 54% reported that the <a href=\"https:\/\/www.networkworld.com\/article\/3640402\/3-steps-to-improve-collaboration-between-networking-and-security-pros.html\">two teams work well together<\/a> now.<\/p>\n<p>At the same time, 68% of organizations reported that they currently use different security and networking management and operations platforms. More than three-fourths (76%) said they believe that \u201cusing one platform for both purposes would improve collaboration between the networking and security teams.\u201d<\/p>\n<h2>SASE drives network and security collaboration<\/h2>\n<p>The survey also asked respondents which teams drive investments in secure access service edge (SASE) technology.<\/p>\n<p>For 47% of those polled, security teams take the lead and include their networking counterparts when necessary. Nearly 40% reported that their networking teams drive SASE evaluations and investments with their security peers becoming involved to vet the vendors.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Cato Networks offers SASE \u2013 along with a slew of competitors including Cisco, Fortinet, Netskope, Palo Alto Networks, Versa Networks, and VMware.<\/p>\n<p>Functionally, the five main pillars of SASE are&nbsp;<a href=\"https:\/\/www.networkworld.com\/article\/3031279\/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html\">SD-WAN<\/a>, firewall-as-a-service (<a href=\"https:\/\/www.networkworld.com\/article\/3631055\/what-is-firewall-as-a-service.html\">FWaaS<\/a>), secure web gateway (SWG), cloud access security broker (<a href=\"https:\/\/www.csoonline.com\/article\/3104981\/what-is-a-cloud-access-security-broker-and-why-do-i-need-one.html\">CASB<\/a>), and zero trust network access (<a href=\"https:\/\/www.networkworld.com\/article\/3487720\/the-vpn-is-dying-long-live-zero-trust.html\">ZTNA<\/a>).<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>\u201cThe opportunity to leverage a cloud-based architecture to enforce security policies to distributed locations and remote workers is the real value of SASE. It offers management efficiencies, it supports a modern workforce, and it supports an important integration between the network and security teams,\u201d said Brandon Butler, research manager for network infrastructure at IDC.<\/p>\n<p>In a recent&nbsp;IDC survey, 68% of 830 respondents said they would like to use the same vendor for their SD-WAN and security\/SASE solution.<\/p>\n<p>At the same time, Gartner expects organizations to be converging networking and security roles in the foreseeable future. \u201cAs the <a href=\"https:\/\/www.networkworld.com\/article\/3686538\/enterprises-turn-to-single-vendor-sase-for-ease-of-manageability.html\">single-vendor SASE Market<\/a> matures, we expect the capabilities gap to close with best-of-breed dual-vendor SASE architectures and organizations to consolidate networking and network security roles, which will drive the purchase of a single offering,\u201d states Gartner\u2019s recent Magic Quadrant for SD-WAN.<\/p>\n<p>Nearly one-fourth (24%) of those surveyed by Cato Networks reported that networking and security responsibilities currently are handled by one team within their organization. That\u2019s the case at Cato Networks\u2019 customer and brewer Carlsberg, which consolidated its networking and security teams.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cConverging networking and security teams lets us eliminate the turf wars so long played by IT. We can identify and act on potential back doors created by network changes and identify operational issues in security changes far faster because security and networking teams pull together as a single team,\u201d said Tal Arad, CISO and head of technology for Carlsberg, in a statement. \u201cFor Carlsberg, networking and security operations are ultimately about the same thing: ensuring the beer keeps flowing. Blurring the lines between networking and security people, I think, is the right way to achieve that goal.\u201d<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3708752\/networking-and-security-teams-tasked-to-converge-collaborate.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nCloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups \u2013 or at least boosting collaboration between teams, according to research from Cato Networks.In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams \u201cmust work together,\u201d and another 30% said they \u201cmust have shared processes.\u201d Another 8% said they\u2019re working to create one networking and security group.The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have \u201cturf wars or struggle working together,\u201d and another 34% said they \u201coccasionally have problems working together.\u201d The remaining 54% reported that the two teams work well together now.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54174,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1061,762,10313,1341],"class_list":["post-54173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-network-security","tag-networking","tag-sase","tag-sd-wan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Networking and security teams tasked to converge, collaborate 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Networking and security teams tasked to converge, collaborate 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-17T12:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/03\/10\/10\/programming_development_programmers_developers_work_together_to_review_code_collaboration_by_joyseulay_shutterstock_1675024168_creative_digital-only_2400x1600-100892982-large-100938371-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Networking and security teams tasked to converge, collaborate\",\"datePublished\":\"2023-10-17T12:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/\"},\"wordCount\":574,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/networking-and-security-teams-tasked-to-converge-collaborate.jpg\",\"keywords\":[\"Network Security\",\"Networking\",\"SASE\",\"SD-WAN\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/\",\"name\":\"Networking and security teams tasked to converge, collaborate 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/networking-and-security-teams-tasked-to-converge-collaborate.jpg\",\"datePublished\":\"2023-10-17T12:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/networking-and-security-teams-tasked-to-converge-collaborate.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/networking-and-security-teams-tasked-to-converge-collaborate.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/networking-and-security-teams-tasked-to-converge-collaborate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/network-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Networking and security teams tasked to converge, collaborate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Networking and security teams tasked to converge, collaborate 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/","og_locale":"en_US","og_type":"article","og_title":"Networking and security teams tasked to converge, collaborate 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-17T12:30:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/03\/10\/10\/programming_development_programmers_developers_work_together_to_review_code_collaboration_by_joyseulay_shutterstock_1675024168_creative_digital-only_2400x1600-100892982-large-100938371-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Networking and security teams tasked to converge, collaborate","datePublished":"2023-10-17T12:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/"},"wordCount":574,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/10\/networking-and-security-teams-tasked-to-converge-collaborate.jpg","keywords":["Network Security","Networking","SASE","SD-WAN"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/","url":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/","name":"Networking and security teams tasked to converge, collaborate 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/10\/networking-and-security-teams-tasked-to-converge-collaborate.jpg","datePublished":"2023-10-17T12:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/10\/networking-and-security-teams-tasked-to-converge-collaborate.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/10\/networking-and-security-teams-tasked-to-converge-collaborate.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/networking-and-security-teams-tasked-to-converge-collaborate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Network Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/network-security\/"},{"@type":"ListItem","position":3,"name":"Networking and security teams tasked to converge, collaborate"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54173"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54173\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54174"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}