{"id":11626,"date":"2025-05-15T10:54:23","date_gmt":"2025-05-15T17:54:23","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11626"},"modified":"2025-05-15T10:56:42","modified_gmt":"2025-05-15T17:56:42","slug":"blocking-shadow-ai-using-protective-dns-simple-yet-powerful","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/","title":{"rendered":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful"},"content":{"rendered":"<p>Generative AI applications have exploded in usage by organizations in the last two years. More than <strong>100 million users<\/strong> are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation. More specifically, risks include the potential exposure of users to malicious domains and confidential data leakage from the use of shadow AI applications.  <\/p>\n<p>Organizations must adopt policies, tools and frameworks to manage these risks effectively. This includes implementing preemptive cyber defense approaches that go beyond detection and response, identifying and blocking unsanctioned AI usage and implementing other security best practices. <\/p>\n<h3>The Problem of Shadow AI<\/h3>\n<p>\u202f<br \/>\nThe problem of shadow AI is impacting almost every organization. A recent study by <a href=\"https:\/\/www.securityweek.com\/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools\/\" target=\"_blank\"><strong>Software AG<\/strong><\/a> reveals that approximately 50 percent of employees in companies are using unapproved AI tools, often referred to as \u201cShadow AI,\u201d to enhance their work efficiency. Despite potential security risks and corporate policies that prohibit the use of unsanctioned AI applications, employees continue to use these tools because of easy availability and the very positive impact these tools have on their productivity. Due to the fear of reprimands, many employees avoid disclosing their use of shadow AI applications. This results in IT teams not having visibility into AI applications that employees use and the potential risks that come with it.  <\/p>\n<p>According to <a href=\"https:\/\/www.harmonic.security\/resources\/the-ai-tightrope-balancing-innovation-and-exposure\" target=\"_blank\"><strong>Harmonic<\/strong><\/a>, companies averaged 254 AI applications and 45.4 percent of sensitive data submissions came from employees\u2019 personal accounts, such as Gmail. With such widespread use of AI, most of which is unmanaged \u201cShadow AI,\u201d there are significant risks, which include involuntary exposure of personally identifiable information (PII), such as customer data and employee data, as well as legal and financial data, intellectual property and sensitive code. <\/p>\n<p>The findings underscore the need for organizations to develop proactive strategies to address unsanctioned AI usage. This includes creating policies that balance security concerns with the productivity benefits that these tools offer and integrating approved alternatives that could be more beneficial for both employees and the organization.<\/p>\n<h3>Identifying and Blocking Unsanctioned AI Using DNS<\/h3>\n<p>In addition to implementing baseline security measures for use of GenAI applications, organizations should use effective strategies to gain visibility into use of AI applications and block or redirect shadow GenAI usage to avoid breaches.<\/p>\n<p>One such simple yet powerful method is to use a Protective DNS solution that can identify when users are accessing unsanctioned AI applications based on their DNS activity. You can then either block that access or redirect them to a corporate sanctioned GenAI application, again using DNS.<\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/products\/threat-defense\/\" target=\"_blank\"><strong>Infoblox Threat Defense\u2122<\/strong><\/a> is an industry-leading Protective DNS solution that:<\/p>\n<ul class=\"list-spacing\">\n<li>Uses predictive DNS-focused threat intelligence and algorithmic detections to block cyberthreats across an organization\u2019s entire hybrid, multi-cloud environment<\/li>\n<li>Has an <strong>Application Discovery<\/strong> feature, which provides visibility into the applications used by end users, such as business applications, cloud backup and storage, VPNs, communication tools, email, social networking and of course <strong>AI applications<\/strong>. It also points out which unapproved applications are in use by employees and which in-use applications could benefit from a review by the admin.<\/li>\n<\/ul>\n<p>A key strength of the Infoblox solution is that it is DNS based and can seamlessly leverage your existing DNS infrastructure to provide this security advantage with zero disruption. It delivers value almost immediately as it instantly begins to monitor all DNS activity and provides IT with tools to quickly filter activity to get useful insights and make informed policy decisions.<\/p>\n<p>Using this solution, IT and security admins can:<\/p>\n<ul class=\"list-spacing\">\n<li>Make decisions about which applications to allow, block or simply monitor, including AI applications<\/li>\n<li>Redirect users accessing an unsanctioned AI application to the corporate approved solution<\/li>\n<li>Extend these policies to any user, device or workload anywhere\u2014at scale, making it very easy to block unsanctioned AI applications for the entire enterprise<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-image1.jpg\" alt=\"Figure 1\" \/><\/p>\n<p>The evolving landscape of AI and the impact on security is significant. With the right approaches and strategies, such as the use of DNS-focused threat intelligence and DNS-based application discovery, companies can get ahead of these risks and ensure that they don\u2019t become patient zero.<\/p>\n<h3>Sign Up for a Free Security Workshop<\/h3>\n<p>To learn more about managing unsanctioned AI applications and all the ways threat actors can abuse DNS, sign up for a free security workshop <a href=\"https:\/\/www.infoblox.com\/resources\/workshop\/security-workshop\/\" target=\"_blank\"><strong>here<\/strong><\/a>.<\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Blocking Shadow AI Using Protective DNS<\/span>\u2014Simple yet Powerful');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation. More specifically, risks [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":11629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1224,242,930],"class_list":{"0":"post-11626","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-shadow-ai","9":"tag-ai","10":"tag-cybercrime","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful<\/title>\n<meta name=\"description\" content=\"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful\" \/>\n<meta property=\"og:description\" content=\"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-15T17:54:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T17:56:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful\" \/>\n<meta name=\"twitter:description\" content=\"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful\",\"datePublished\":\"2025-05-15T17:54:23+00:00\",\"dateModified\":\"2025-05-15T17:56:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg\",\"keywords\":[\"shadow AI\",\"AI\",\"Cybercrime\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/\",\"name\":\"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg\",\"datePublished\":\"2025-05-15T17:54:23+00:00\",\"dateModified\":\"2025-05-15T17:56:42+00:00\",\"description\":\"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful","description":"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/","og_locale":"en_US","og_type":"article","og_title":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful","og_description":"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/","og_site_name":"Infoblox Blog","article_published_time":"2025-05-15T17:54:23+00:00","article_modified_time":"2025-05-15T17:56:42+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_title":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful","twitter_description":"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful","datePublished":"2025-05-15T17:54:23+00:00","dateModified":"2025-05-15T17:56:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/"},"wordCount":726,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg","keywords":["shadow AI","AI","Cybercrime"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/","url":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/","name":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg","datePublished":"2025-05-15T17:54:23+00:00","dateModified":"2025-05-15T17:56:42+00:00","description":"Generative AI applications have exploded in usage by organizations in the last two years. More than 100 million users are now experimenting and using AI applications. But, as with any new tool, the adoption of GenAI by enterprises introduces unique risks in areas such as security, privacy, legal, safety and organizational reputation.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/blocking-shadow-ai-using-protective-dns-simple-yet-powerful\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Blocking Shadow AI Using Protective DNS\u2014Simple yet Powerful"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11626"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11626\/revisions"}],"predecessor-version":[{"id":11634,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11626\/revisions\/11634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/11629"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}