{"id":1988,"date":"2017-05-11T16:06:47","date_gmt":"2017-05-11T16:06:47","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1988"},"modified":"2020-05-06T10:27:59","modified_gmt":"2020-05-06T17:27:59","slug":"using-dns-threat-intelligence-and-network-context-in-your","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/","title":{"rendered":"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle"},"content":{"rendered":"<p class=\"p1\">There is no shortage of security products in the market today. We have everything from Next-gen firewalls and intrusion detection systems to next-gen endpoint protection and application security solutions. While each category has an important role to play in securing an organization, something that is often overlooked but is a critical component of every network is DNS. Together with DHCP and IPAM, DNS servers contain a wealth of information on network activity including which device is accessing which resources, how often, where the network asset is etc. In addition, most malware (90%) starts with a DNS lookup once it has breached the perimeter and is inside the network. So making DNS a first line of defense and sharing threat intelligence and network context with the broader ecosystem should be an integral part of your security lifecycle.<\/p>\n<p class=\"p1\"><span class=\"s2\"><strong>Detection<\/strong><\/span><\/p>\n<p class=\"p1\"><span class=\"s2\">DNS can be used to detect and block APT and malware activity before it can spread laterally or download additional malicious software from its command and control(C&amp;C) site. This includes popular phishing malware and ransomware, exploit kit activity, and others. Enforcing security policy at the DNS level allows for protection without the need to deploy endpoint agents. This is especially helpful when IoT devices are being used. Using a hybrid DNS security solution that covers users on-premises or off-premises will ensure that protection follows your employees and users, wherever they go. You can also deploy self-protecting DNS servers that can intelligently detect DNS DDoS attacks like amplification, reflection, protocol exploits, cache poisoning etc. to maintain service availability even under an attack.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s2\"><strong>Prevention<\/strong><\/span><\/p>\n<p class=\"p1\"><span class=\"s2\">DNS based data exfiltration is on the rise as attackers seek to bypass traditional DLP solutions. Taking data out the DNS \u201cbackdoor\u201d is hard to detect especially when attackers use zero-day methods that don\u2019t use known malicious destinations or known DNS tunnels. Using a big data, machine learning and streaming analytics on DNS queries can help detect and prevent these zero day data exfiltration attempts from succeeding.<\/span><\/p>\n<p class=\"p1\"><span class=\"s2\"><strong>Analysis and Investigation<\/strong><\/span><\/p>\n<p class=\"p1\"><span class=\"s2\">There is a wealth of information that DNS, DHCP and IPAM services contain. Leveraging that network context and actionable intelligence can help assess risk and prioritize alerts, especially when security operations teams today are inundated with so many alerts and have no way to know which ones are important to address first. Further, automatic threat investigation tools can provide timely access to context for each threat indicator (<\/span><span class=\"s4\">what type of malware, associated campaigns, etc.). This<\/span><span class=\"s2\">\u00a0enables rapid threat investigation and frees up security personnel to work on more strategic tasks.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s2\"><strong>Orchestration<\/strong><\/span><\/p>\n<p class=\"p4\"><span class=\"s2\">Automatically sharing\u00a0DNS based indicators of compromise\/abnormalities with ecosystem technologies (Endpoint: Carbon Black, NAC: Cisco ISE, vulnerability scanner: Qualys, SIEM) can accelerate\u00a0remediation\u00a0and ease\u00a0security operations. For example, if a DNS security solution detects malicious\u00a0communications from a network device, automatically informing a vulnerability scanner to scan the device immediately instead of waiting for the next scan window can speed up the remediation.<\/span><\/p>\n<p class=\"p4\"><span class=\"s2\"><strong>Enforcement<\/strong><\/span><\/p>\n<p class=\"p1\"><span class=\"s2\">Using timely, consolidated and high quality threat intelligence is important for enforcing security policy. You can maximize the ROI on threat intelligence and enforce policies not just in one part of the infrastructure but across the board by using an exchange platform that distributes the threat intelligence to various security infrastructure elements.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s2\">Learn how Infoblox solutions provide all the capabilities described above and more by visiting our\u00a0<a href=\"https:\/\/www.infoblox.com\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"s5\">website<\/span><\/a>.<\/span><\/p>\n<p class=\"p1\"><span class=\"s2\">Contributors: Fredrik Moller &amp; Martin Van Son<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is no shortage of security products in the market today. We have everything from Next-gen firewalls and intrusion detection systems to next-gen endpoint protection and application security solutions. While each category has an important role to play in securing an organization, something that is often overlooked but is a critical component of every network [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":1892,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[15],"class_list":{"0":"post-1988","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle<\/title>\n<meta name=\"description\" content=\"There is no shortage of security products in the market today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle\" \/>\n<meta property=\"og:description\" content=\"There is no shortage of security products in the market today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-11T16:06:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle\",\"datePublished\":\"2017-05-11T16:06:47+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/\",\"name\":\"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"datePublished\":\"2017-05-11T16:06:47+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"description\":\"There is no shortage of security products in the market today.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"width\":600,\"height\":413,\"caption\":\"Podcast Episode #5: Carrier Grade NAT, Security, and IPv6\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/using-dns-threat-intelligence-and-network-context-in-your\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle","description":"There is no shortage of security products in the market today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/","og_locale":"en_US","og_type":"article","og_title":"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle","og_description":"There is no shortage of security products in the market today.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/","og_site_name":"Infoblox Blog","article_published_time":"2017-05-11T16:06:47+00:00","article_modified_time":"2020-05-06T17:27:59+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle","datePublished":"2017-05-11T16:06:47+00:00","dateModified":"2020-05-06T17:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/"},"wordCount":575,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","keywords":["Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/","url":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/","name":"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","datePublished":"2017-05-11T16:06:47+00:00","dateModified":"2020-05-06T17:27:59+00:00","description":"There is no shortage of security products in the market today.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","width":600,"height":413,"caption":"Podcast Episode #5: Carrier Grade NAT, Security, and IPv6"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/using-dns-threat-intelligence-and-network-context-in-your\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1988"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1988\/revisions"}],"predecessor-version":[{"id":1989,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1988\/revisions\/1989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1892"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}