{"id":2065,"date":"2017-06-20T17:06:06","date_gmt":"2017-06-20T17:06:06","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2065"},"modified":"2020-05-06T10:27:58","modified_gmt":"2020-05-06T17:27:58","slug":"dns-security-risk-how-concerned-should-you-be","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/","title":{"rendered":"DNS Security Risk &#8211; How Concerned Should You Be?"},"content":{"rendered":"<p>In the wake of\u00a0Russian hacking, DDoS attacks and\u00a0DNS attacks\u00a0seem to be in full bloom.<\/p>\n<p>French President Emmanuel Macron,\u00a0fell prey to hacking &#8211; just before an election. \u00a0After a flurry of nearly 3000 attempts to take down then candidate Macron&#8217;s campaign, one DNS DDoS attack took down his website for a short while. \u00a0Then before this incident in October of 2016 DNS provider Dyn was attacked by the hacker group\u00a0Anonymous i causing a denial of service\u00a0to a multitude of sites in Europe and North America.<\/p>\n<p>For anyone who relies on their website to be up, running, and ready, standby for heavy seas.\u00a0\u00a0DDoS attacks are taking place at alarming rates and the worst may be yet to come.\u00a0\u00a0It\u00a0could be devastating.<\/p>\n<p>According to research conducted by Sterling, Virginia based Neustar Inc., DDoS attacks are becoming bigger, harder and stronger. \u00a0 \u00a0They report 849 out of 1,010 organizations surveyed were attacked. \u00a0The attacks weren&#8217;t concentrated in any particular industries, but spread out across a wide industry range. \u00a0The number of attacks has increased 15 percent since 2016 and 86% of those attacked were also hit more than once.<\/p>\n<p>Why DNS attacks? \u00a0 Because for cybercriminals DNS attacks are a surefire way to not just cause damage,\u00a0but insure that damage occurs on a broad scale. This is why every security professional in the digital stratosphere needs to be concerned.<\/p>\n<p>Gartner \u00a0advised in their 2016 report,\u00a0<em>Hype Cycle for Infrastructure Protection,<\/em>\u00a0that\u00a0\u201cDDoS mitigation services should be a standard part of business continuity\/disaster recovery planning, and should be included in all internet service procurements when the business depends on the availability of internet connectivity.\u201d<\/p>\n<p>So just what makes\u00a0a DNS attack such a concern?<\/p>\n<ol>\n<li>Its Potential.\u00a0\u00a0 \u00a0It\u00a0stops all activity for\u00a0a long time.\u00a0 When\u00a0hackers hit with a DNS attack, many\u00a0websites are affected.\u00a0\u00a0And downed web sites tend to stay offline for a while.\u00a0 While they&#8217;re down, so\u00a0are all your operations.\u00a0\u00a0\u00a0\u00a0\u00a0Research by Neustar found half of all companies they studied over the last five years experienced a downtime event lasting more than 8 hours. The frequency of events and perhaps their duration is likely to grow.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li>Its Pathway.\u00a0 \u00a0DNS is the sole gateway and thus a single point of failure.\u00a0 Even top domains\u00a0use only one\u00a0DNS provider.\u00a0 Attack the provider and you\u00a0take one attack and multiply it times the\u00a0affected domains.\u00a0 .\u00a0 That provider and all of its operations &#8211; customers, operations,\u00a0and interactions &#8211; are all offline until things are repaired and the situation remediated.\u00a0 When a single DNS provider, who serves multiple clients,\u00a0is attacked, so are all their clients.\u00a0 \u00a0The second bad practice, which is still being used by the majority of top domains, is single homing DNS management. Companies that relied on a single DNS provider suffered massive DNS outages after the famed worldwide outage last October. A major DNS provider was downed by a DDoS attack, which in turn knocked thousands of large domains offline. Top sites that rely on more than one DNS provider have reduced risk as their site may not be out entirely.\u00a0 It&#8217;s great for those who work with more than one provider, but many do not.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li>Its Vulnerability. \u00a0DNS\u00a0providers are more vulnerable to hackers. \u00a0According to Neustar, three fourths of US and UK-based organizations have experienced a DNS attack. Half of these uncovered some sort of DNS-based attack in the previous 12 months.\u00a0\u00a0With this frequency, everyone is vulnerable. \u00a0Hackers are able to cause most damage with a fixed amount of effort. \u00a0They may redirect visitors to a site that they control and commandeer.\u00a0 For the hacker, it fulfills their goal and inflicts the right amount of pain. \u00a0Every domain is vulnerable.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li>Its Cost.\u00a0\u00a0 Downtime is costly.\u00a0 No business is transacted when a site is down.\u00a0 Plus, it takes investment to find and patch the pathway of the attack.\u00a0 Then the damage requires &#8220;mopping up&#8221; as customer data is compromised, notifications are sent out, media stories are launched, and a flurry of calls are handled as the entire nightmare is remediated.\u00a0 Adrienne Lafrance wrote in\u00a0<em>The Atlantic<\/em>\u00a0(How Much Will Today\u2019s Internet Outage Cost?, October 21, 2016) \u00a0that &#8220;For some companies, the cost of an attack can exceed $100,000 per hour. \u00a0Given that the majority of attacks continue for more than six hours, these losses add up quickly. In a particularly stark example, the airline Virgin Blue\u00a0lost $20 million\u00a0in period of IT outages that spanned 11 days in 2010.&#8221;<\/li>\n<\/ol>\n<p>DDoS are taking place at alarming rates. DNS is a ripe platform of attack. \u00a0The worst may be yet to come.\u00a0 When it does, it could be devastating.\u00a0\u00a0 Be concerned, but be prepared.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the wake of\u00a0Russian hacking, DDoS attacks and\u00a0DNS attacks\u00a0seem to be in full bloom. French President Emmanuel Macron,\u00a0fell prey to hacking &#8211; just before an election. \u00a0After a flurry of nearly 3000 attempts to take down then candidate Macron&#8217;s campaign, one DNS DDoS attack took down his website for a short while. \u00a0Then before this [&hellip;]<\/p>\n","protected":false},"author":211,"featured_media":1790,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[15],"class_list":{"0":"post-2065","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security Risk - How Concerned Should You Be?<\/title>\n<meta name=\"description\" content=\"In the wake of Russian hacking, DDoS attacks and DNS attacks seem to be in full bloom.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Security Risk - How Concerned Should You Be?\" \/>\n<meta property=\"og:description\" content=\"In the wake of Russian hacking, DDoS attacks and DNS attacks seem to be in full bloom.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-20T17:06:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Romeo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Romeo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/\"},\"author\":{\"name\":\"Jim Romeo\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/eab1900edef140ffc8d15b6b3f9b5929\"},\"headline\":\"DNS Security Risk &#8211; How Concerned Should You Be?\",\"datePublished\":\"2017-06-20T17:06:06+00:00\",\"dateModified\":\"2020-05-06T17:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/\"},\"wordCount\":781,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/\",\"name\":\"DNS Security Risk - How Concerned Should You Be?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"datePublished\":\"2017-06-20T17:06:06+00:00\",\"dateModified\":\"2020-05-06T17:27:58+00:00\",\"description\":\"In the wake of Russian hacking, DDoS attacks and DNS attacks seem to be in full bloom.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-aug-5.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-security-risk-how-concerned-should-you-be\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Security Risk &#8211; How Concerned Should You Be?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/eab1900edef140ffc8d15b6b3f9b5929\",\"name\":\"Jim Romeo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c5b5bf6e1dedddc84569acc6ec7b2ed82348c02df1bd2c12397b0bd5f337155?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c5b5bf6e1dedddc84569acc6ec7b2ed82348c02df1bd2c12397b0bd5f337155?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c5b5bf6e1dedddc84569acc6ec7b2ed82348c02df1bd2c12397b0bd5f337155?s=96&d=blank&r=g\",\"caption\":\"Jim Romeo\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jim-romeo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security Risk - How Concerned Should You Be?","description":"In the wake of Russian hacking, DDoS attacks and DNS attacks seem to be in full bloom.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/","og_locale":"en_US","og_type":"article","og_title":"DNS Security Risk - How Concerned Should You Be?","og_description":"In the wake of Russian hacking, DDoS attacks and DNS attacks seem to be in full bloom.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/","og_site_name":"Infoblox Blog","article_published_time":"2017-06-20T17:06:06+00:00","article_modified_time":"2020-05-06T17:27:58+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","type":"image\/jpeg"}],"author":"Jim Romeo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Romeo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/"},"author":{"name":"Jim Romeo","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/eab1900edef140ffc8d15b6b3f9b5929"},"headline":"DNS Security Risk &#8211; How Concerned Should You Be?","datePublished":"2017-06-20T17:06:06+00:00","dateModified":"2020-05-06T17:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/"},"wordCount":781,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","keywords":["Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/","url":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/","name":"DNS Security Risk - How Concerned Should You Be?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","datePublished":"2017-06-20T17:06:06+00:00","dateModified":"2020-05-06T17:27:58+00:00","description":"In the wake of Russian hacking, DDoS attacks and DNS attacks seem to be in full bloom.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-aug-5.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-security-risk-how-concerned-should-you-be\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"DNS Security Risk &#8211; How Concerned Should You Be?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/eab1900edef140ffc8d15b6b3f9b5929","name":"Jim Romeo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c5b5bf6e1dedddc84569acc6ec7b2ed82348c02df1bd2c12397b0bd5f337155?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c5b5bf6e1dedddc84569acc6ec7b2ed82348c02df1bd2c12397b0bd5f337155?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c5b5bf6e1dedddc84569acc6ec7b2ed82348c02df1bd2c12397b0bd5f337155?s=96&d=blank&r=g","caption":"Jim Romeo"},"url":"https:\/\/www.infoblox.com\/blog\/author\/jim-romeo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/211"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2065"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2065\/revisions"}],"predecessor-version":[{"id":2075,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2065\/revisions\/2075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1790"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}