{"id":1336,"date":"2019-03-13T21:17:43","date_gmt":"2019-03-13T21:17:43","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1336"},"modified":"2020-07-30T08:32:03","modified_gmt":"2020-07-30T15:32:03","slug":"dns-security-takes-center-stage-at-rsa-conference-2019","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/","title":{"rendered":"DNS Security Takes Center Stage at RSA Conference 2019"},"content":{"rendered":"<p>SANS Institute exposed\u00a0<strong><a href=\"https:\/\/www.healthcareitnews.com\/news\/rsa-2019-sans-shares-top-new-security-threats-%E2%80%93-and-what-do-about-them\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">today\u2019s top five new types of cybersecurity attack techniques<\/a>,<\/strong>\u00a0three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1339\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/rsac20192.jpg\" alt=\"DNS Security Takes Center Stage at RSA Conference 2019\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192-300x188.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>RSA Conference 2019 has come to a close, and the world\u2019s biggest cybersecurity event has left the thousands of attendees with many takeaways. One of the most significant takeaways came from the SANS Institute\u2019s keynote reporting on the top five most dangerous new attacks and what to do about them. The keynote consisted of three experts from SANS Institute who shared their insights . DNS Security took center stage throughout the entire keynote, as three of the top five emerging threats discussed were DNS-based attacks<\/p>\n<p>This blog summarizes the three DNS-based threats discussed in the keynote and provides further insights into the significance of how these threats impact \u00a0organizations.<\/p>\n<p><span style=\"font-size: medium;\"><strong>Today\u2019s Top New DNS-Based Attacks as Advised by SANS Institute<\/strong><\/span><\/p>\n<p><span style=\"font-size: medium;\"><strong>DNS Infrastructure Manipulation, or DNSpionage<\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1341\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/linkedin-In-Stream_Wide___file1.png\" alt=\"\" width=\"599\" height=\"316\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/linkedin-In-Stream_Wide___file1.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/linkedin-In-Stream_Wide___file1-300x158.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>Ed Skoudis, SANS Faculty Fellow and Director of SANS Cyber Ranges and Team-Based Training, kicked off the keynote by diving right into DNS-based threats. SANS has seen<strong>\u00a0<a href=\"https:\/\/krebsonsecurity.com\/tag\/dnspionage\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS infrastructure manipulation, or DNSpionage<\/a><\/strong>, significantly impact organizations over the past several months.<\/p>\n<p>Attackers are executing this sophisticated attack by hijacking and compromising millions of email and other credentials to log in as customers of DNS infrastructure providers and alter DNS records to point users to malicious web and mail servers. These DNS hijacks also allow attackers to have SSL encryption certificates issued for targeted domains, enabling them to decrypt intercepted email and web traffic and read it in plain text.<\/p>\n<p><span style=\"font-size: medium;\"><strong>Domain Fronting<\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1338\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/linkedin-In-Stream_Wide___file2-3.jpg\" alt=\"Domain Fronting\" width=\"599\" height=\"316\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/linkedin-In-Stream_Wide___file2-3.jpg 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/linkedin-In-Stream_Wide___file2-3-300x158.jpg 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>Skoudus then advised on the second most dangerous threat today, known as\u00a0<a href=\"https:\/\/resources.infosecinstitute.com\/domain-fronting\/#gref\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Domain Fronting<\/a>, a surprisingly easy DNS-based attack to carry out. Domain Fronting is an undocumented feature of Content Delivery Networks (CDNs) and Cloud Service Providers that allows clients to proxy web traffic through them covertly. Attackers use this technique to circumvent Internet censorship by obfuscating the domain of an HTTPS connection. Attackers can then connect to cloud services that may otherwise be blocked via domain name, IP address or using deep packet inspection. Skoudus explains that it is very useful for attackers to hide command-and-control channels and exfiltrate compromised data, even from the cloud, and advises against believing that such an issue will go away anytime soon.<\/p>\n<p><span style=\"font-size: medium;\"><strong>DNS over TLS (DoT) and DNS over HTTPS (DoH)<\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1337\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/linkedin-In-Stream_Wide___file.png\" alt=\"DNS over TLS (DoT) and DNS over HTTPS (DoH)\" width=\"599\" height=\"316\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/linkedin-In-Stream_Wide___file.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/linkedin-In-Stream_Wide___file-300x158.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>The third panelist, Johannas Ulrich, Dean of Research at SANS, spoke to the third of today\u2019s most dangerous attack techniques that\u2019s DNS-based. He spoke to security problems associated with DNS over TLS (DoT) and DNS over HTTPS (DoH). The story of\u00a0<strong><a href=\"https:\/\/community.infoblox.com\/t5\/Company-Blog\/DoT-DoH-and-the-DNS-Last-Mile-Security-Problem\/ba-p\/15468\" target=\"_blank\" rel=\"noopener noreferrer\">DoT, DoH and the \u201clast mile\u201d DNS security problem<\/a>\u00a0<\/strong>arose in the news several months ago when the IETF proposed DoT and DoH as two mechanisms to address the issue of securing communications between DNS clients and their local DNS servers.<\/p>\n<p>However, as Ulrich and Infoblox agree, both of these mechanisms can be used in ways that aren\u2019t in the best interest of any organization from a cybersecurity perspective. Both DoT and DoH provide important functionality of communications between DNS clients and DNS servers, which are encrypted and provide data privacy and integrity, and DNS clients may authenticate DNS servers using either protocol.<\/p>\n<p>DoH is meant as a \u201cpoor user\u2019s VPN\u201d to protect the \u201clast mile\u201d of security, and it should not be used on managed enterprise networks. Organizations will better benefit from blocking direct DNS traffic, including DoT and DoH, between internal IP addresses and DNS servers on the Internet, including those from Cloudflare. This simple solution forces users to use their company\u2019s internal DNS infrastructure, which allows their IT teams to apply DNS resolution policy and troubleshoot problems.<\/p>\n<p><span style=\"font-size: medium;\"><strong>What Enterprises Can Do<\/strong><strong>\u00a0to Migitage Risk from these Attacks<\/strong><\/span><\/p>\n<p>Infoblox is the leader in DNS Security and provides a comprehensive solution to keep enterprises free from the widest range of DNS-based cyberthreats.<\/p>\n<p>Using signature-based approaches and integrity checks, Infoblox\u2019s Advanced DNS Protection protects against DNS hijacking threats. This helps ensure that if DNS records are manipulated to point users to malicious web and mail servers, it will be detected, and admins will be notified. In addition, Advanced DNS Protection blocks DNS based DDoS attacks like amplification, reflection, NXDOMAIN, tunneling etc. to ensure that the DNS services are resilient and stay available even under attack.<\/p>\n<p>Organizations can also keep their data safe and detect malicious activity early and fast using Infoblox ActiveTrust\/ActiveTrust Cloud. But to do this, companies must force their users to use their company\u2019s internal DNS infrastructure, and block direct DNS traffic. ActiveTrust\/ActiveTrust Cloud provides foundational and scalable security using DNS as a first line of defense against known and zero day threats, including data exfiltration, DGA, Fast Flux and fileless malware.<\/p>\n<p>Take the free\u00a0<strong><a href=\"https:\/\/riskassessment.infoblox.com\/#\/\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Ponemon DNS risk assessment<\/a><\/strong>\u00a0to determine your enterprise\u2019s DNS risk level.<strong>\u00a0<a href=\"https:\/\/info.infoblox.com\/contact-sales?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Contact Infoblox<\/a>\u00a0<\/strong>to learn more about how to design a secure foundational architecture using DNS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SANS Institute exposed\u00a0today\u2019s top five new types of cybersecurity attack techniques,\u00a0three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help. RSA Conference 2019 has come to a close, and the world\u2019s biggest cybersecurity event has left the thousands of attendees with many takeaways. One [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":1339,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[195,189,14,16,191,192,88,15],"class_list":{"0":"post-1336","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-rsac","9":"tag-cybersecurity","10":"tag-events","11":"tag-infoblox","12":"tag-rsa","13":"tag-rsa-conference","14":"tag-rsa-conference-2019","15":"tag-security","16":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security Takes Center Stage at RSA Conference 2019<\/title>\n<meta name=\"description\" content=\"SANS Institute exposed today\u2019s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Security Takes Center Stage at RSA Conference 2019\" \/>\n<meta property=\"og:description\" content=\"SANS Institute exposed today\u2019s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-13T21:17:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-30T15:32:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"DNS Security Takes Center Stage at RSA Conference 2019\",\"datePublished\":\"2019-03-13T21:17:43+00:00\",\"dateModified\":\"2020-07-30T15:32:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rsac20192.jpg\",\"keywords\":[\"RSAC\",\"Cybersecurity\",\"Events\",\"Infoblox\",\"RSA\",\"RSA Conference\",\"RSA Conference 2019\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/\",\"name\":\"DNS Security Takes Center Stage at RSA Conference 2019\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rsac20192.jpg\",\"datePublished\":\"2019-03-13T21:17:43+00:00\",\"dateModified\":\"2020-07-30T15:32:03+00:00\",\"description\":\"SANS Institute exposed today\u2019s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rsac20192.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rsac20192.jpg\",\"width\":600,\"height\":375,\"caption\":\"DNS Security Takes Center Stage at RSA Conference 2019\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-takes-center-stage-at-rsa-conference-2019\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Security Takes Center Stage at RSA Conference 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security Takes Center Stage at RSA Conference 2019","description":"SANS Institute exposed today\u2019s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/","og_locale":"en_US","og_type":"article","og_title":"DNS Security Takes Center Stage at RSA Conference 2019","og_description":"SANS Institute exposed today\u2019s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/","og_site_name":"Infoblox Blog","article_published_time":"2019-03-13T21:17:43+00:00","article_modified_time":"2020-07-30T15:32:03+00:00","og_image":[{"width":600,"height":375,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"DNS Security Takes Center Stage at RSA Conference 2019","datePublished":"2019-03-13T21:17:43+00:00","dateModified":"2020-07-30T15:32:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/"},"wordCount":840,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg","keywords":["RSAC","Cybersecurity","Events","Infoblox","RSA","RSA Conference","RSA Conference 2019","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/","name":"DNS Security Takes Center Stage at RSA Conference 2019","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg","datePublished":"2019-03-13T21:17:43+00:00","dateModified":"2020-07-30T15:32:03+00:00","description":"SANS Institute exposed today\u2019s top five new types of cybersecurity attack techniques, three of which are DNS-based, and how to counter them. Here\u2019s what they had to say, and how Infoblox can help.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rsac20192.jpg","width":600,"height":375,"caption":"DNS Security Takes Center Stage at RSA Conference 2019"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-takes-center-stage-at-rsa-conference-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS Security Takes Center Stage at RSA Conference 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"predecessor-version":[{"id":5465,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1336\/revisions\/5465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1339"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}