{"id":47025,"date":"2026-03-26T18:25:13","date_gmt":"2026-03-26T22:25:13","guid":{"rendered":"https:\/\/netfoundry.io\/?p=47025"},"modified":"2026-03-26T18:46:06","modified_gmt":"2026-03-26T22:46:06","slug":"why-digital-transformation-left-traditional-ot-networking-in-the-dust","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/","title":{"rendered":"Rethinking Industrial Cybersecurity"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-why-digital-transformation-left-ot-s-traditional-broken-networking-in-the-dust\">Why Digital Transformation Left OT&#8217;s Traditional &#8220;Broken&#8221; Networking in the Dust<\/h3>\n\n\n\n<p>NetFoundry CEO Galeal Zino was recently interviewed by Larry O&#8217;Brien, VP of Research at ARC Advisory Group, where they discussed the realities of OT&#8217;s &#8220;broken&#8221; networking paradigm. <\/p>\n\n\n\n<p style=\"padding-top:46;padding-right:46;padding-bottom:46;padding-left:46\">The old strategy for Operational Technology (OT) security was simple: build a fortress. You air-gapped the systems, set up a flat network, and focused on keeping everyone out. But in the era of Industry 5.0, that model is officially broken. <br><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/U5P566JtDV0?si=xNHflHh1Kag-CyZT\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\n\n\n<p><br>With the rise of predictive maintenance, digital twins, and edge-to-cloud connectivity, today\u2019s OT networks are inherently porous. Traditional networking models (relying on IP addresses, VLANs, and firewalls) were not built for the modern era of digital transformation, AI, and Industry 5.0. Bolting security solutions onto these outdated networks stifles business agility, decreases velocity, and creates complexity\u2014which ultimately leads to insecurity.<\/p>\n\n\n\n<p>Galeal summed up this reality perfectly:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><em>&#8220;When we look at digital transformation, Industry 4.0, Industry 5.0, AI&#8230; they&#8217;re all great. However, in many ways what they left behind in the dust was the cyber security model, and the networking model. Our mission at NetFoundry is essentially to catch up and rebuild the secure networking model to fit this kind of digital transformation age.&#8221;<\/em><\/p>\n<\/blockquote>\n<\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-the-complexity-trap\"><strong>The Complexity Trap<\/strong><\/h4>\n\n\n\n<p>Attempting to force legacy networking to support modern digital transformation creates friction that kills business velocity. Even worse, it creates vulnerabilities. As Galeal noted, <em>&#8220;Actually, the complexity itself becomes insecurity. Nothing that&#8217;s complex is ever very secure.&#8221;<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-the-shift-to-identity-first-security\"><strong>The Shift to Identity-First Security<\/strong><\/h4>\n\n\n\n<p>Instead of relying on network perimeters, NetFoundry advocates for true Zero Trust based on cryptographically verifiable identities. This &#8220;assume breach&#8221; mentality allows organizations to solve three massive challenges without risking uptime or human safety:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Secure Inbound Access:<\/strong> Safely authenticating vendors and remote employees.<\/li>\n\n\n\n<li><strong>Secure Outbound Data:<\/strong> Routing crucial OT data to the cloud (like AWS) for analytics without opening dangerous inbound firewall ports.<\/li>\n\n\n\n<li><strong>Internal Segmentation:<\/strong> Isolating threats before they can spread and cause millions in unplanned downtime.<\/li>\n<\/ul>\n\n\n\n<p>The transition doesn&#8217;t require a &#8220;big bang&#8221; overhaul. By leveraging an open-source ecosystem (e.g., NetFoundry&#8217;s OpenZiti) and pre-installed integrations with major vendors like Siemens, organizations can start with a single, high-value use case\u2014and finally leave traditional networking in the dust.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-interested-in-learning-more-about-how-we-re-revolutionizing-industrial-cybersecurity-view-the-complete-interview-here\">Interested in learning more about how we&#8217;re revolutionizing industrial cybersecurity? View the complete interview here:<\/h4>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"3452613\",\n    formId: \"206415a9-1c46-4d06-b409-cab07799b8ee\",\n    region: \"na1\"\n  });\n<\/script>\n\n\n\n<iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/ycprOwxnmgw?si=NPoff2BV_B0Gv3nd\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Digital Transformation Left OT&#8217;s Traditional &#8220;Broken&#8221; Networking in the Dust NetFoundry CEO Galeal Zino was recently interviewed by Larry O&#8217;Brien, VP of Research at ARC Advisory Group, where they discussed the realities of OT&#8217;s &#8220;broken&#8221; networking paradigm. The old strategy for Operational Technology (OT) security was simple: build a fortress. You air-gapped the systems, [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":47028,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[698],"tags":[],"class_list":["post-47025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Rethinking Industrial Cybersecurity - NetFoundry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rethinking Industrial Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Why Digital Transformation Left OT&#8217;s Traditional &#8220;Broken&#8221; Networking in the Dust NetFoundry CEO Galeal Zino was recently interviewed by Larry O&#8217;Brien, VP of Research at ARC Advisory Group, where they discussed the realities of OT&#8217;s &#8220;broken&#8221; networking paradigm. The old strategy for Operational Technology (OT) security was simple: build a fortress. You air-gapped the systems, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T22:25:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T22:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/03\/ARCpodcast.00_01_08_02.Still001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stephen Mackey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stephen Mackey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/\"},\"author\":{\"name\":\"Stephen Mackey\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/a0d5c2430b6c57b805706b7b9d4ba9c3\"},\"headline\":\"Rethinking Industrial Cybersecurity\",\"datePublished\":\"2026-03-26T22:25:13+00:00\",\"dateModified\":\"2026-03-26T22:46:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/\"},\"wordCount\":389,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ARCpodcast.00_01_08_02.Still001.jpg\",\"articleSection\":[\"OT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/\",\"name\":\"Rethinking Industrial Cybersecurity - NetFoundry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ARCpodcast.00_01_08_02.Still001.jpg\",\"datePublished\":\"2026-03-26T22:25:13+00:00\",\"dateModified\":\"2026-03-26T22:46:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ARCpodcast.00_01_08_02.Still001.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/ARCpodcast.00_01_08_02.Still001.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ot\\\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rethinking Industrial Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/a0d5c2430b6c57b805706b7b9d4ba9c3\",\"name\":\"Stephen Mackey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9d50c829788657e92da5b3088e83fb0b67fb3edb27bf48a1f935578bbc0c9c9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9d50c829788657e92da5b3088e83fb0b67fb3edb27bf48a1f935578bbc0c9c9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9d50c829788657e92da5b3088e83fb0b67fb3edb27bf48a1f935578bbc0c9c9?s=96&d=mm&r=g\",\"caption\":\"Stephen Mackey\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/stephen_mackey\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Rethinking Industrial Cybersecurity - NetFoundry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/","og_locale":"en_US","og_type":"article","og_title":"Rethinking Industrial Cybersecurity","og_description":"Why Digital Transformation Left OT&#8217;s Traditional &#8220;Broken&#8221; Networking in the Dust NetFoundry CEO Galeal Zino was recently interviewed by Larry O&#8217;Brien, VP of Research at ARC Advisory Group, where they discussed the realities of OT&#8217;s &#8220;broken&#8221; networking paradigm. The old strategy for Operational Technology (OT) security was simple: build a fortress. You air-gapped the systems, [&hellip;]","og_url":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2026-03-26T22:25:13+00:00","article_modified_time":"2026-03-26T22:46:06+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/03\/ARCpodcast.00_01_08_02.Still001.jpg","type":"image\/jpeg"}],"author":"Stephen Mackey","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Stephen Mackey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/"},"author":{"name":"Stephen Mackey","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/a0d5c2430b6c57b805706b7b9d4ba9c3"},"headline":"Rethinking Industrial Cybersecurity","datePublished":"2026-03-26T22:25:13+00:00","dateModified":"2026-03-26T22:46:06+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/"},"wordCount":389,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/03\/ARCpodcast.00_01_08_02.Still001.jpg","articleSection":["OT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/","url":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/","name":"Rethinking Industrial Cybersecurity - NetFoundry","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/03\/ARCpodcast.00_01_08_02.Still001.jpg","datePublished":"2026-03-26T22:25:13+00:00","dateModified":"2026-03-26T22:46:06+00:00","breadcrumb":{"@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/03\/ARCpodcast.00_01_08_02.Still001.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/03\/ARCpodcast.00_01_08_02.Still001.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/ot\/why-digital-transformation-left-traditional-ot-networking-in-the-dust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Rethinking Industrial Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/a0d5c2430b6c57b805706b7b9d4ba9c3","name":"Stephen Mackey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a9d50c829788657e92da5b3088e83fb0b67fb3edb27bf48a1f935578bbc0c9c9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a9d50c829788657e92da5b3088e83fb0b67fb3edb27bf48a1f935578bbc0c9c9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9d50c829788657e92da5b3088e83fb0b67fb3edb27bf48a1f935578bbc0c9c9?s=96&d=mm&r=g","caption":"Stephen Mackey"},"url":"https:\/\/netfoundry.io\/author\/stephen_mackey\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/47025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=47025"}],"version-history":[{"count":16,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/47025\/revisions"}],"predecessor-version":[{"id":47043,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/47025\/revisions\/47043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/47028"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=47025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=47025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=47025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}