<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Forescout</provider_name><provider_url>https://www.forescout.com</provider_url><author_name>A.J. Dunham</author_name><author_url>https://www.forescout.com/blog/author/dunham/</author_url><title>5 Steps to Unsticking a Stuck Network Segmentation Project</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="YWw1eLYCsg"&gt;&lt;a href="https://www.forescout.com/blog/5-steps-to-unsticking-a-stuck-network-segmentation-project/"&gt;5 Steps to Unsticking a Stuck Network Segmentation Project&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.forescout.com/blog/5-steps-to-unsticking-a-stuck-network-segmentation-project/embed/#?secret=YWw1eLYCsg" width="600" height="338" title="&#x201C;5 Steps to Unsticking a Stuck Network Segmentation Project&#x201D; &#x2014; Forescout" data-secret="YWw1eLYCsg" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.forescout.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Digital transformation has ushered in interconnected networks that enable information sharing and collaboration but also enable cyberthreats to move laterally, even across distributed environments. Oftentimes, unwanted communication links go unchecked and vulnerabilities hide in plain sight based on the assumption that assets and networks are separated when they are not. Network segmentation is a core tenet of zero trust and least-privilege access. The vast majority of cyber threats can be mitigated with segmentation that restricts traffic flows to only those assets that should be communicating with each other and isolating vulnerable devices until they can be remediated. Unfortunately, network segmentation projects experience a high failure rate, and many never progress beyond the planning stages. Without the right approach, network segmentation projects can be overly complex, costly and potentially harmful to operations. That doesn&#x2019;t have to be the case. Here&#x2018;s a practical approach that will get you unstuck.</description></oembed>
