{"id":1763,"date":"2018-12-20T19:33:48","date_gmt":"2018-12-20T19:33:48","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1763"},"modified":"2020-12-05T18:26:12","modified_gmt":"2020-12-06T02:26:12","slug":"ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/","title":{"rendered":"DDoS Attacks Make Their Big-Screen Debut &#8212; What Enterprises can Learn from Ralph"},"content":{"rendered":"<p>If you have young children, or are a fan of Disney movies, you may have seen \u201c<u><a href=\"https:\/\/movies.disney.com\/ralph-breaks-the-internet-wreck-it-ralph-2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Wreck It Ralph 2: Ralph Breaks the Internet<\/a><\/u>,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit. The film shows at a high-level the impact a DDoS attack can have on an end-user. But how can users \u2013 and enterprises \u2013 prevent these attacks from affecting their business?<\/p>\n<p>If you haven\u2019t seen the movie, here\u2019s a quick rundown of the scenario: Ralph and Vanellope are two video game characters and best friends living inside an arcade machine. When one day, Vanellope decides she wants to check out the new \u201cinternet\u201d the arcade owners have installed, she finds a racing game better than her own and decides she wants to live there permanently.<\/p>\n<p>It all goes downhill when Ralph, her hurt best friend, uses a black market \u201cinsecurity virus\u201d in a last-ditch effort to get her to change her mind. The virus seeks out \u201cinsecurities\u201d and when it catches sight of the needy aspects of Ralph\u2019s personality, it makes thousands of clones of Ralph. These turn into one large Ralph-like figure that wreaks havoc on the internet, shutting down major websites. There\u2019s even a short clip of a YouTube celebrity angrily trying to access a blank webpage that won\u2019t load.<\/p>\n<p>While not having access to the internet is frustrating, and the thought of hundreds of \u201cRalphs\u201d flooding the network is a cute way to personify network activity &#8212; the reality of DDoS attacks are far more serious. DDoS attacks make it impossible for users to access a website and can cost businesses and organizations thousands of dollars in lost revenue and brand reputation damage. In fact, one\u00a0<u><a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2018_ddos-breach-costs-rise-to-over-2m-for-enterprises-finds-kaspersky-lab-report\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">recent report<\/a>\u00a0<\/u>from Kaspersky found that the financial impact of a DDoS attack is rising globally, costing enterprises over $2 million on average per attack.<\/p>\n<p>There are three common and dangerous misconceptions about DDoS attacks. This first is that most people\/organizations are under the impression that it won\u2019t happen to them, and, as a result, fail to take the necessary preventative measures. Secondly, many believe they can only be attacked by cybercriminals from the outside world when in reality, the threat of a volumetric attack can come from inside their own network. Lastly, DDoS attacks don\u2019t just come from laptops or computers. IoT devices like smart refrigerators, thermostats or voice assistants can also be vehicles to watch out for.<\/p>\n<p>To better safeguard their networks, IT professionals should take a closer look at how they use DNS as a security tool. Not only is DNS the backbone of the internet, but it can also provide organizations with more visibility into the devices on their network and any potential malicious activity they maybe engaged in. For example, if a user has a smart thermostat made by GE, the thermostat will work by connecting and sending data to a GE server on a regular basis, and this \u00a0uses DNS communications. If the device comes under the control of an attacker and becomes part of a botnet, it can use DNS to connect to C&amp;C servers instead, before launching attacks. (i.e. the thermostat begins deviating from its normal pattern by connecting to a malicious server). Using DNS security, IT and security professionals can:<\/p>\n<ul>\n<li>detect and block such malicious C&amp;C communications<\/li>\n<li>look for an abnormal amount of DNS requests \u2013\u00a0one type of DDoS attack<\/li>\n<li>and drop DNS requests that are part of a DDoS attack, so that the servers continue to function and connectivity is not affected.<\/li>\n<\/ul>\n<p>In the instance of the movie, Ralph turns into one large DDoS attack and takes down the internet, which is exactly what happens in a real-world situation. Communication overwhelms the network to a point where it can no longer operate effectively and shuts down as a result. Where the movie deviates from reality, the impact of a DDoS attack far exceeds the annoyance of not having an internet connection. Network downtime is serious and can cost businesses their bottom line as network activity accounts for transactions, logistics and general business processes critical to generating revenue.<\/p>\n<p>Using DNS security, companies can spot Ralphs before they break the internet and cause serious harm to their business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit. The film shows at a high-level the impact a DDoS attack can have on an end-user. But how can users [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":1707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,15,374,375],"class_list":{"0":"post-1763","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-security","10":"tag-enterprises","11":"tag-enterprise","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph<\/title>\n<meta name=\"description\" content=\"If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph\" \/>\n<meta property=\"og:description\" content=\"If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-20T19:33:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T02:26:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"DDoS Attacks Make Their Big-Screen Debut &#8212; What Enterprises can Learn from Ralph\",\"datePublished\":\"2018-12-20T19:33:48+00:00\",\"dateModified\":\"2020-12-06T02:26:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/\"},\"wordCount\":722,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"enterprises\",\"enterprise\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/\",\"name\":\"DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"datePublished\":\"2018-12-20T19:33:48+00:00\",\"dateModified\":\"2020-12-06T02:26:12+00:00\",\"description\":\"If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Make DNS Your First Line of Defense Against Data Exfiltration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DDoS Attacks Make Their Big-Screen Debut &#8212; What Enterprises can Learn from Ralph\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph","description":"If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/","og_locale":"en_US","og_type":"article","og_title":"DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph","og_description":"If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/","og_site_name":"Infoblox Blog","article_published_time":"2018-12-20T19:33:48+00:00","article_modified_time":"2020-12-06T02:26:12+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"DDoS Attacks Make Their Big-Screen Debut &#8212; What Enterprises can Learn from Ralph","datePublished":"2018-12-20T19:33:48+00:00","dateModified":"2020-12-06T02:26:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/"},"wordCount":722,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","keywords":["Infoblox","Security","enterprises","enterprise"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/","url":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/","name":"DDoS Attacks Make Their Big-Screen Debut -- What Enterprises can Learn from Ralph","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","datePublished":"2018-12-20T19:33:48+00:00","dateModified":"2020-12-06T02:26:12+00:00","description":"If you have young children, or are a fan of Disney movies, you may have seen \u201cWreck It Ralph 2: Ralph Breaks the Internet,\u201d and noticed that (spoiler alert!) a DDoS attack was the culprit.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1.jpg","width":660,"height":454,"caption":"Make DNS Your First Line of Defense Against Data Exfiltration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/ddos-attacks-make-their-big-screen-debut-what-enterprises-can-learn-from-ralph\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DDoS Attacks Make Their Big-Screen Debut &#8212; What Enterprises can Learn from Ralph"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1763"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1763\/revisions"}],"predecessor-version":[{"id":5467,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1763\/revisions\/5467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1707"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}