{"id":1678,"date":"2018-10-18T18:00:21","date_gmt":"2018-10-18T18:00:21","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1678"},"modified":"2020-12-05T16:15:00","modified_gmt":"2020-12-06T00:15:00","slug":"visibility-and-anomaly-detection-in-the-age-of-iot","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/","title":{"rendered":"Visibility and Anomaly detection in the age of IoT"},"content":{"rendered":"<p>Historically, organizations have struggled to gain visibility of what users, devices and applications are accessing their network infrastructure. If the maxim \u201cyou can\u2019t protect what you can\u2019t see\u201d holds true then the prospect of the Internet of Things (IoT) business transition which will result in billions of devices connecting to IP networks is a nightmare in waiting. Identification and classification of IoT devices is particularly problematic because the range of new device types leveraging the IP network is going to explode making it harder for IT security teams to manage and control policies that protect these new devices from themselves and the existing IP connected services.<\/p>\n<p>Beyond controlling accessing and setting policy, IoT also presents a sizable headache when it comes to detecting breaches and enabling effective response. The plethora of protocols that IoT devices will leverage, spanning a broad range of vertical industries from Healthcare to Retail will make it hard for traditional security platforms to detect breaches. Malware sandboxes whose expertise is identifying abuse of well-known operating systems such as Windows servers will have a steep learning curve to apply the same detection for the bespoke applications running on proprietary software platforms. Instead organizations will have to rely heavily on secure IoT endpoint platforms to try and reduce the potential attack surface area. Surely there must be a simpler way to approach these problems. A common denominator that can cope with the breadth of platforms and devices that IoT will present.<\/p>\n<p>That common denominator could well be an infrastructure that is already prevalent across all IP networks, whether they be corporate network, public clouds, next generation data centers and even the Internet. That infrastructure would be the DHCP, DNS and IP address management (DDI) infrastructure which for the past 30 years has provided internet scale to all IP connected devices. How could this ubiquitous infrastructure be applied to the address the challenges of IoT?<\/p>\n<h3 id=\"toc-hId-1154294999\">Device Identification and Classification<\/h3>\n<p>Starting with device identification and classification. IP connected IoT devices are going to require an IP address. If the addresses are statically provisioned organizations will need an IP address management platform to manage the IP address space, even more so given the dramatic increase in consumption of addresses. Even if the devices are going to use IPv6 where address space is not constrained, managing and tracking those addresses is an important operational need. Similarly, if the devices obtain their addresses dynamically, they will still need a DHCP (Dynamic Host Configuration Protocol) server to provide those addresses. In either case the centralized platforms that manage the IP address space will have a comprehensive view of what devices are on the network. More so, through the static address management process there is the opportunity to classify the device at the moment of provisioning. In the case of DHCP, the DHCP request from the IoT device provides a fingerprint that would enable the DHCP server to classify what devices is requesting an address. There does not seem to be any better common way to identify and classify the broad range of IoT devices than with an IP address management and DHCP platform.<\/p>\n<h3 id=\"toc-hId-2041798680\">Threat Detection<\/h3>\n<p>In the case of threat detection there is an advantage to protecting devices over users. Anomaly detection for users is difficult because it\u2019s hard to predict what a user\u2019s normal behavior is. Machines on the other hand tend to be far more predictable which means anomaly detection could be a fruitful way of identifying compromised machines. One common means of applying anomaly detection across the breadth of IoT devices would be to leverage their DNS activity. Since statically configuring applications and services is impractical and not scalable, most IoT devices will leverage DNS to dynamically locate the services and platforms it needs to interact with. DNS provides that flexibility enabling services to be re-located between networks whilst maintaining a common point of reference: the fully qualified domain. On this premise, it\u2019s possible to monitor and model the services the IoT device seeks to communicate with. If for example there is an IoT thermostat made by a manufacturer in Germany, it may communicate back to the manufacturer for software updates, leveraging DNS to resolve the address of the update server in Germany. DNS servers could model that behavior and if the device began to deviate from its typical pattern of behavior, perhaps by attempting to resolve services in a previously unknown location, that would provide an indication of compromise. The common need for IoT devices to use DNS to locate services provides a simple, scalable and consistent model for detecting potential breaches.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1679\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/visibility-anomaly-detection-iot.png\" alt=\"Visibility and Anomaly Detection in the Age of IoT - Table\" width=\"600\" height=\"272\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visibility-anomaly-detection-iot.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visibility-anomaly-detection-iot-300x136.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Given the looming challenges of IoT, it\u2019s worth considering how the DNS and DHCP platforms that serve IT infrastructure today could be repurposed as a scalable tool for device classification and breach detection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Historically, organizations have struggled to gain visibility of what users, devices and applications are accessing their network infrastructure. If the maxim \u201cyou can\u2019t protect what you can\u2019t see\u201d holds true then the prospect of the Internet of Things (IoT) business transition which will result in billions of devices connecting to IP networks is a nightmare [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":1496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15,346],"class_list":{"0":"post-1678","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"tag-healthcare","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Reason to Celebrate<\/title>\n<meta name=\"description\" content=\"In a world of ever-multiplying deadlines, commitments, and distractions, it\u2019s not often that I get a chance to sit back and reflect upon my journey as CEO of Infoblox and how far we\u2019ve come.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Visibility and Anomaly detection in the age of IoT\" \/>\n<meta property=\"og:description\" content=\"In a world of ever-multiplying deadlines, commitments, and distractions, it\u2019s not often that I get a chance to sit back and reflect upon my journey as CEO of Infoblox and how far we\u2019ve come.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-18T18:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T00:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-coe-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"Visibility and Anomaly detection in the age of IoT\",\"datePublished\":\"2018-10-18T18:00:21+00:00\",\"dateModified\":\"2020-12-06T00:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/\"},\"wordCount\":809,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-coe-banner-1.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Healthcare\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/\",\"name\":\"A Reason to Celebrate\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-coe-banner-1.jpg\",\"datePublished\":\"2018-10-18T18:00:21+00:00\",\"dateModified\":\"2020-12-06T00:15:00+00:00\",\"description\":\"In a world of ever-multiplying deadlines, commitments, and distractions, it\u2019s not often that I get a chance to sit back and reflect upon my journey as CEO of Infoblox and how far we\u2019ve come.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-coe-banner-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-coe-banner-1.jpg\",\"width\":600,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/visibility-and-anomaly-detection-in-the-age-of-iot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Visibility and Anomaly detection in the age of IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Reason to Celebrate","description":"In a world of ever-multiplying deadlines, commitments, and distractions, it\u2019s not often that I get a chance to sit back and reflect upon my journey as CEO of Infoblox and how far we\u2019ve come.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/","og_locale":"en_US","og_type":"article","og_title":"Visibility and Anomaly detection in the age of IoT","og_description":"In a world of ever-multiplying deadlines, commitments, and distractions, it\u2019s not often that I get a chance to sit back and reflect upon my journey as CEO of Infoblox and how far we\u2019ve come.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/","og_site_name":"Infoblox Blog","article_published_time":"2018-10-18T18:00:21+00:00","article_modified_time":"2020-12-06T00:15:00+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-coe-banner-1.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"Visibility and Anomaly detection in the age of IoT","datePublished":"2018-10-18T18:00:21+00:00","dateModified":"2020-12-06T00:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/"},"wordCount":809,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-coe-banner-1.jpg","keywords":["Infoblox","Security","Healthcare"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/","url":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/","name":"A Reason to Celebrate","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-coe-banner-1.jpg","datePublished":"2018-10-18T18:00:21+00:00","dateModified":"2020-12-06T00:15:00+00:00","description":"In a world of ever-multiplying deadlines, commitments, and distractions, it\u2019s not often that I get a chance to sit back and reflect upon my journey as CEO of Infoblox and how far we\u2019ve come.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-coe-banner-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-coe-banner-1.jpg","width":600,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/visibility-and-anomaly-detection-in-the-age-of-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Visibility and Anomaly detection in the age of IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1678"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1678\/revisions"}],"predecessor-version":[{"id":1680,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1678\/revisions\/1680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1496"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}