{"version":"1.0","provider_name":"Infoblox Blog","provider_url":"https:\/\/www.infoblox.com\/blog","author_name":"Evan Schuman","author_url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/","title":"The Security Holes That Only DNS Can Plug","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"K50RiXbgpm\"><a href=\"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/\">The Security Holes That Only DNS Can Plug<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/embed\/#?secret=K50RiXbgpm\" width=\"600\" height=\"338\" title=\"&#8220;The Security Holes That Only DNS Can Plug&#8221; &#8212; Infoblox Blog\" data-secret=\"K50RiXbgpm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.infoblox.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","thumbnail_width":824,"thumbnail_height":583,"description":"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don't have a track record of having to leverage it. But now they must. It's not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone's permission before making those purchases. It took a couple of years before CISOs weighed and said \"Whoa! There is a massive difference.\""}