{"id":2396,"date":"2015-10-06T21:50:12","date_gmt":"2015-10-06T21:50:12","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2396"},"modified":"2020-05-06T10:30:09","modified_gmt":"2020-05-06T17:30:09","slug":"no-hitchhiking","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/","title":{"rendered":"No Hitchhiking"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2397\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/noo-thumbs-down.jpg\" alt=\"\" width=\"594\" height=\"594\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg 594w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down-150x150.jpg 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down-300x300.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down-75x75.jpg 75w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/p>\n<p>Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face. According to a 2015 Ponemon Institute study, the average consolidated cost of a data breach is $3.8 million, which includes investigative and forensic efforts, resolution, and the consequences of customer defection. High profile breaches in recent months have crossed the $100 million mark in total cost.<\/p>\n<p>Hackers often use DNS as a pathway for exfiltrating data to avoid detection by standard security controls that primarily focus on the web and email. They can accomplish this using standard DNS tunneling toolkits- -or custom techniques that are far more sophisticated, low and slow, and harder to detect. Mitigating these threats effectively requires applying the right technique based on the exfiltration method used.<\/p>\n<p>Join us at 11 am on Tuesday, Oct. 13 for a webinar, co-sponsored by\u00a0<em>SC<\/em>\u00a0magazine, entitled\u00a0<a href=\"https:\/\/engage.vevent.com\/rt\/scwc~oct13infoblox\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Don&#8217;t Let Sensitive Data Hitch a Ride out of Your Network<\/a>. You\u2019ll learn about:<\/p>\n<ul>\n<li>Data theft and what\u2019s in it for the hackers<\/li>\n<li>Various ways data can be stolen over DNS<\/li>\n<li>Mitigation techniques for DNS tunneling and data exfiltration<\/li>\n<\/ul>\n<p>Traditional security controls don&#8217;t effectively secure DNS, and closing this critical gap is key to protecting your data. DNS is ubiquitous, and close to your endpoints. Attend this webinar and find out how you can use DNS as an optimal detection and enforcement point to strengthen your network security.<\/p>\n<p>To register, click\u00a0<a href=\"https:\/\/engage.vevent.com\/rt\/scwc~oct13infoblox\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face. According to a 2015 Ponemon Institute study, the average consolidated cost of a data breach is $3.8 million, which includes investigative and forensic efforts, resolution, and the consequences [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,72,15,36],"class_list":{"0":"post-2396","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-exfiltration","10":"tag-security","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>No Hitchhiking<\/title>\n<meta name=\"description\" content=\"Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No Hitchhiking\" \/>\n<meta property=\"og:description\" content=\"Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-06T21:50:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"594\" \/>\n\t<meta property=\"og:image:height\" content=\"594\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"No Hitchhiking\",\"datePublished\":\"2015-10-06T21:50:12+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/\"},\"wordCount\":247,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/noo-thumbs-down.jpg\",\"keywords\":[\"DNS\",\"Exfiltration\",\"Security\",\"Threats\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/\",\"name\":\"No Hitchhiking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/noo-thumbs-down.jpg\",\"datePublished\":\"2015-10-06T21:50:12+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"description\":\"Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/noo-thumbs-down.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/noo-thumbs-down.jpg\",\"width\":594,\"height\":594,\"caption\":\"Round button with the symbol of the negative review\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/no-hitchhiking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"No Hitchhiking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"No Hitchhiking","description":"Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/","og_locale":"en_US","og_type":"article","og_title":"No Hitchhiking","og_description":"Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-06T21:50:12+00:00","article_modified_time":"2020-05-06T17:30:09+00:00","og_image":[{"width":594,"height":594,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"No Hitchhiking","datePublished":"2015-10-06T21:50:12+00:00","dateModified":"2020-05-06T17:30:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/"},"wordCount":247,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg","keywords":["DNS","Exfiltration","Security","Threats"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/","url":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/","name":"No Hitchhiking","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg","datePublished":"2015-10-06T21:50:12+00:00","dateModified":"2020-05-06T17:30:09+00:00","description":"Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/noo-thumbs-down.jpg","width":594,"height":594,"caption":"Round button with the symbol of the negative review"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/no-hitchhiking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"No Hitchhiking"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2396"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2396\/revisions"}],"predecessor-version":[{"id":2399,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2396\/revisions\/2399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}