{"id":2108,"date":"2017-07-10T18:07:00","date_gmt":"2017-07-10T18:07:00","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2108"},"modified":"2020-05-06T10:27:58","modified_gmt":"2020-05-06T17:27:58","slug":"you-should-ignore-dns-really-you-should-at-least-until-the-next","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/","title":{"rendered":"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe"},"content":{"rendered":"<p><span style=\"font-size: medium;\">As I sat down for dinner on Mother\u2019s Day, my phone rang. Guess what? WannaCry had just hit the news and our team was trying to reach me on what it means to our customers and how our security software responded to such threats. This is not the first time I\u2019ve received such a phone call. In fact we went through a similar exercise with\u00a0<u><span style=\"color: #0000ff;\"><a href=\"https:\/\/community.infoblox.com\/t5\/Security-Blog\/NotPetya-The-Ransomware-that-Spreads-like-a-Worm\/ba-p\/10241\" target=\"_self\" rel=\"noopener noreferrer\">Petya \/ NotPetya<\/a><\/span><\/u>. As part of my job at Infoblox, I get a real-time view of what\u2019s happening in the cyberspace, especially cyberattacks such as Dyn, WannaCry, Jaff, Petya, NotPetya and more. \u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium;\">As we try to educate our customers on the causes of these threats and how they can protect against them by securing their DNS, it occurred to me that DNS is like air. The clean, fresh air we breathe and we take it for granted. Most likely the clean air will remain clean assuming your environment is clean. However, the clean air can get corrupted and you get a rude jolt of reality when suddenly you no longer can breathe. \u00a0<\/span><\/p>\n<p><span style=\"font-size: medium;\">As I recall the frantic efforts of my team on the day WannaCry erupted, I can see very much how DNS is like the air we breathe. But every time there is a truck that is bellowing smoke or, worse still, a thick layer of smog, we pay attention. The same thing happens with DNS. No one thinks about DNS until something goes wrong.<\/span><\/p>\n<p><span style=\"font-size: medium;\">In the case of DNS, the problem is even worse. DNS is the blood of every network and it has developed the dubious distinction of being the most exploited threat vector. DNS is often not considered when organizations are transforming their networks, virtualizing their data centers, adopting a cloud first approach and in the realm of security it comes after other security infrastructure like web security, e-mail security, and firewalls. \u00a0While DNS has traditionally been the domain of the networking team, securing DNS falls into somewhere between the network and security teams. The networking team is responsible for the integrity of the infrastructure while the security team is responsible for identifying whether it is being exploited for stealing data, spreading malware or is the source of threat intelligence. As we all know aligning different groups is challenging, sharing data between systems is not easy and that is never a good situation when you need to detect and resolve issues rapidly.<\/span><\/p>\n<p><span style=\"font-size: medium;\">But, let us get back to ignoring the existence of DNS and the reasons why it is a good idea:<\/span><\/p>\n<ol>\n<li><span style=\"font-size: medium;\"><strong>It just works and is always available, open and ubiquitous<\/strong>: The beauty of the original design of DNS coupled with the maturity of DNS products from certain vendors makes network engineers very happy. DNS just works, so why worry about \u201cright\u201d architecture and redundancy until you have witnessed an outage. Be like others, why should you be any different. It is never blocked by a firewall and available in some form on every network.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>It is hidden and not sexy<\/strong>: DNS, DHCP and IPAM infrastructure (DDI) lives in the bowels of the network. When someone connects a device to a network, they just expect it to work. If someone wants to connect to an application, the domain gets resolved to the right IP address. The process by which it happens is certainly not important to the customer. It is not something that the network engineer thinks about, much less any executive. They are involved in the latest initiative to migrate the data center to the cloud, install the next hypervisor or implement a cloud first strategy.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>There is a free option and it must be good enough<\/strong>: Individual platforms sometimes give away DNS for free, but the DDI capability from one platform is not effective in managing a platform from another vendor. These issues compound when your company starts migrating to the cloud. In that case there is not a single interface to manage all DDI or get visibility into the network, where your applications are running and devices are connecting.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>Maybe my manual processes are even better than free:<\/strong>\u00a0I have managed my processes with a spreadsheet and it works, at least to an extent. As our environment gets complex we become better at using spreadsheets and I can put more people to managing the processes. I really do not need visibility into my virtual workloads that spin up and down multiple times a day and the public cloud just manages itself.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>Malicious actors know that it DNS is always available open and ubiquitous<\/strong>: So what if it is the most exploited protocol used to steal corporate data, bring down network infrastructure and enable malware to communicate with the command and control (C&amp;C) servers.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-size: medium;\">You can follow the advice above but it could leave your organization vulnerable.\u00a0 For example, you could experience an outage because someone mistyped an IP address or allocated an IP address to an application, creating conflicts and rendering your most valuable customer application inaccessible. Or worse still, \u00a0a piece of malware couldtunnel through DNS to steal data from your organization. Yes, DNS can have such an impact.<\/span><\/p>\n<p><span style=\"font-size: medium;\">Now let us see why you should ignore that advice and work to ensure the oxygen (DNS) keeps flowing to all parts of your body (network) instead. Here are four things I would recommend thinking about:<\/span><\/p>\n<ol>\n<li><span style=\"font-size: medium;\"><strong>The right architecture:<\/strong>\u00a0DNS is critical to everything: your data center, your Private Cloud, your Public Cloud, your Microsoft environment. It sits in the center of the network. Which also means that when you want to scale your network, guarantee 24x7x365 accessibility of your devices and applications, ensure multi-site DNS redundancy, and support IoT, you need a scalable, redundant and robust DDI infrastructure. Waiting to witness a failure before you think about the right instrumentation is counter to my advice, but probably the right thing to do.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>Unified visibility:\u00a0\u00a0<\/strong>As your infrastructure becomes more complex, you have virtual workloads spinning up and down across multiple cloud platforms, and knowing what is on your network is critical so you can provide business continuity. Visibility is key to security, because you cannot protect what you cannot see. But that is just part of it, the \u201cunified\u201d piece is just as relevant. Make sure that you share the benefit of the visibility your DDI infrastructure has with the security solutions you already have in place. Most customers I talk to have between 20 to 50 different security vendors on their network that often exist in silos.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>Secure DNS and use the data everywhere<\/strong>: Most, if not all, malicious activity involves some type of DNS communication in multiple stages of the cyber security kill chain. You can use that fact to stop the spread of malware. DNS is used for C&amp;C communication and to steal data, so just like you secure your e-mail and web communication, invest in securing DNS. DNS has rich data every device on the network that is critical to developing context required to resolve and prioritize threats. DNS can also be a rich source of intelligence that every part of your security infrastructure needs to be more effective.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>It is ignored because of its own success<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"font-size: medium;\">If you are ready to ignore the advice I cited above, it would be great to have a chat with you. Take a look at how we at Infoblox think about this critical issue and reach out to me for a conversation.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As I sat down for dinner on Mother\u2019s Day, my phone rang. Guess what? WannaCry had just hit the news and our team was trying to reach me on what it means to our customers and how our security software responded to such threats. This is not the first time I\u2019ve received such a phone [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":2111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[15],"class_list":{"0":"post-2108","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe<\/title>\n<meta name=\"description\" content=\"As I sat down for dinner on Mother\u2019s Day, my phone rang.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe\" \/>\n<meta property=\"og:description\" content=\"As I sat down for dinner on Mother\u2019s Day, my phone rang.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-10T18:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-18-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prakash Nagpal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prakash Nagpal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/\"},\"author\":{\"name\":\"Prakash Nagpal\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\"},\"headline\":\"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe\",\"datePublished\":\"2017-07-10T18:07:00+00:00\",\"dateModified\":\"2020-05-06T17:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/\"},\"wordCount\":1255,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-18-1.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/\",\"name\":\"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-18-1.jpg\",\"datePublished\":\"2017-07-10T18:07:00+00:00\",\"dateModified\":\"2020-05-06T17:27:58+00:00\",\"description\":\"As I sat down for dinner on Mother\u2019s Day, my phone rang.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-18-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-18-1.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/you-should-ignore-dns-really-you-should-at-least-until-the-next\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\",\"name\":\"Prakash Nagpal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"caption\":\"Prakash Nagpal\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/prakash-nagpal\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe","description":"As I sat down for dinner on Mother\u2019s Day, my phone rang.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/","og_locale":"en_US","og_type":"article","og_title":"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe","og_description":"As I sat down for dinner on Mother\u2019s Day, my phone rang.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/","og_site_name":"Infoblox Blog","article_published_time":"2017-07-10T18:07:00+00:00","article_modified_time":"2020-05-06T17:27:58+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-18-1.jpg","type":"image\/jpeg"}],"author":"Prakash Nagpal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prakash Nagpal","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/"},"author":{"name":"Prakash Nagpal","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804"},"headline":"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe","datePublished":"2017-07-10T18:07:00+00:00","dateModified":"2020-05-06T17:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/"},"wordCount":1255,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-18-1.jpg","keywords":["Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/","url":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/","name":"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-18-1.jpg","datePublished":"2017-07-10T18:07:00+00:00","dateModified":"2020-05-06T17:27:58+00:00","description":"As I sat down for dinner on Mother\u2019s Day, my phone rang.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-18-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-18-1.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/you-should-ignore-dns-really-you-should-at-least-until-the-next\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"You Should Ignore DNS: Really You Should, At Least Until the Next Catastrophe"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804","name":"Prakash Nagpal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","caption":"Prakash Nagpal"},"url":"https:\/\/www.infoblox.com\/blog\/author\/prakash-nagpal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2108"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2108\/revisions"}],"predecessor-version":[{"id":2112,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2108\/revisions\/2112"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2111"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}