{"id":12071,"date":"2025-08-07T07:55:10","date_gmt":"2025-08-07T14:55:10","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12071"},"modified":"2025-08-06T02:25:01","modified_gmt":"2025-08-06T09:25:01","slug":"redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/","title":{"rendered":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control"},"content":{"rendered":"<p>For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant. Was it just Domain Name System Security Extensions (DNSSEC)? Was it about stopping distributed denial-of-service (DDoS) attacks? Or was it using DNS as a cyber security control to block malware, commonly known as Protective DNS. The result was confusion, fragmented approaches and missed opportunities. But with National Institute of Standards and Technology\u2019s (NIST) updated Special Publication (SP) 800-81 Secure Domain Name System (DNS) Deployment Guide<sup>1<\/sup> and the European Union\u2019s NIS2 Directive<sup>2<\/sup> reinforcing its themes, the industry finally has a more complete\u2014and practical\u2014definition to work with.<\/p>\n<p>In the original NIST publication, DNS security was often equated solely with DNSSEC. It still matters today, but it\u2019s only part of the picture. What\u2019s changed? A lot. From encrypted DNS standards to smarter threat intelligence, the landscape has shifted. Meanwhile, attackers have taken full advantage of the gaps, targeting poorly managed DNS systems and hijacking domains to fuel phishing campaigns.<\/p>\n<p>Even with Protective DNS gaining traction in government circles, many vendors downplayed its importance\u2014misleadingly defining DNS security as just another checkbox or a firewall feature. In frameworks like SASE and Zero Trust, DNS was often overlooked. And under tight budgets, many organizations didn\u2019t see it as a top priority. But ignoring DNS security has real consequences\u2014and real missed opportunities.<\/p>\n<p>That\u2019s changing. As highlighted in Rik Turner\u2019s recent analysis,<sup>3<\/sup> while some in the industry have shifted toward platform consolidation, NIST SP 800-81 introduces a more complete vision of secure DNS deployments and best practices. It centers on three pillars: protecting DNS infrastructure, ensuring DNS integrity and adopting Protective DNS as a proactive control. The first is protecting the DNS infrastructure itself. As a critical component of IT infrastructure, organizations should ensure DNS is deployed in a highly resilient architecture on purpose-built platforms that can withstand threats such as DDoS attacks. The second is protecting the integrity of the DNS system. Threat actors have proven to be successful at hijacking misconfigured domains as well as poisoning DNS caches to redirect users to fraudulent domains. Finally, there is the deployment of DNS as a cybersecurity control, often referred to as Protective DNS. This is where a DNS platform can apply policy, often based on DNS threat intelligence that blocks requests to known malicious sites. This is a modern, practical blueprint that spans cyber resilience and threat mitigation. You can read more in our <a href=\"https:\/\/insights.infoblox.com\/resources-whitepaper\/infoblox-whitepaper-dns-best-practices\" target=\"_blank\"><strong>whitepaper here<\/strong><\/a>. <\/p>\n<p>Infoblox Threat Intel continues to track adversaries who exploit DNS in increasingly creative ways\u2014whether it\u2019s hijacking legitimate domains or using lookalike URLs to run convincing phishing campaigns. As more governments adopt Protective DNS and security teams look to strengthen their defenses, one thing is clear: DNS security isn\u2019t optional anymore. It\u2019s foundational.<\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-81r3.ipd.pdf\" target=\"_blank\"><strong>NIST Special Publication 800-81 Secure Domain Name System (DNS) Deployment Guide<\/strong><\/a>, Rose, Scott, Liu, Cricket, Gibson, Ross, National Institute of Standards and Technology (NIST), April 2025.<\/li>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-06\/ENISA_Technical_implementation_guidance_on_cybersecurity_risk_management_measures_version_1.0.pdf\" target=\"_blank\"><strong>NIS2 Directive Technical Implementation Guidance<\/strong><\/a>, European Union Agency for Cybersecurity (ENISA), June 2025.<\/li>\n<li><a href=\"https:\/\/omdia.tech.informa.com\/om135919\/tighter-dns-security-requirements-present-opportunities-for-infoblox\" target=\"_blank\"><strong>Tighter DNS security requirements present opportunities for Infoblox<\/strong><\/a>, Turner, Rik, Omdia, June 20, 2025.<\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Redefining DNS Security<\/span>: New Guidance Signals a Strategic Shift in Cybersecurity Control');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant. Was it just Domain Name System Security Extensions (DNSSEC)? Was it about stopping distributed denial-of-service (DDoS) attacks? Or was it using DNS as a cyber security control to block malware, commonly known as Protective DNS. The result was confusion, [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":12072,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[576,15,357,167,775,740],"class_list":{"0":"post-12071","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-compliance","9":"tag-security","10":"tag-nist","11":"tag-sase","12":"tag-nis2","13":"tag-protective-dns","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control<\/title>\n<meta name=\"description\" content=\"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control\" \/>\n<meta property=\"og:description\" content=\"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-07T14:55:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control\" \/>\n<meta name=\"twitter:description\" content=\"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control\",\"datePublished\":\"2025-08-07T14:55:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/\"},\"wordCount\":534,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-security-defined-thumbnail.jpg\",\"keywords\":[\"compliance\",\"Security\",\"NIST\",\"SASE\",\"NIS2\",\"Protective DNS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/\",\"name\":\"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-security-defined-thumbnail.jpg\",\"datePublished\":\"2025-08-07T14:55:10+00:00\",\"description\":\"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-security-defined-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-security-defined-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control","description":"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/","og_locale":"en_US","og_type":"article","og_title":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control","og_description":"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/","og_site_name":"Infoblox Blog","article_published_time":"2025-08-07T14:55:10+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_title":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control","twitter_description":"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control","datePublished":"2025-08-07T14:55:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/"},"wordCount":534,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg","keywords":["compliance","Security","NIST","SASE","NIS2","Protective DNS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/","url":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/","name":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg","datePublished":"2025-08-07T14:55:10+00:00","description":"For a long time, the cybersecurity world couldn\u2019t quite agree on what DNS security actually meant.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-security-defined-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/redefining-dns-security-new-guidance-signals-a-strategic-shift-in-cybersecurity-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12071"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12071\/revisions"}],"predecessor-version":[{"id":12075,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12071\/revisions\/12075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12072"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}