{"id":2419,"date":"2015-09-28T22:10:27","date_gmt":"2015-09-28T22:10:27","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2419"},"modified":"2020-05-06T10:30:09","modified_gmt":"2020-05-06T17:30:09","slug":"shining-the-spotlight-on-dns-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/","title":{"rendered":"Shining the Spotlight on DNS Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2420\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg\" alt=\"\" width=\"1024\" height=\"512\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity-300x150.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity-768x384.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year. These attacks are not just focused on bringing DNS down, but can also use DNS to steal personally identifiable information (PII), passwords or credit card numbers.<\/p>\n<p>Intrusion detection and prevention systems and next-generation firewalls don\u2019t adequately disrupt malicious DNS communications to command and control (C&amp;C) domains \u2013 and lack integration with standard network management tools. Further complicating matters is the fact that IT and security teams often function in silos, allowing DNS security to fall through the cracks.<\/p>\n<p>Optiv, a large cyber security solutions provider, recently decided to shine the spotlight on DNS security to help their customers understand DNS threats. They did an in-depth analysis of the challenges businesses face around DNS security and the gaps in security solutions these companies are using today. Their recommendations include use of industry leading tools in three strategic areas:<\/p>\n<ul>\n<li>Contextual analysis and enrichment to improve visibility into DNS traffic patterns and content.<\/li>\n<li>Network and security automation \u2013 intelligent blocking, packet analysis, and dynamic policy-controls closely coupled with contextual analysis.<\/li>\n<li>Integration with other security ecosystem solutions, allowing security teams to scale and shorten remediation times.<\/li>\n<\/ul>\n<p>In case you are wondering what other organizations are doing to address DNS threats, Optiv has included a case study on how the security division of a large county government entity was able to detect and disrupt communications from infected devices on their network to C&amp;C domains, using Infoblox DNS Firewall, while providing contextual analysis and holistic reporting with their integrated Infoblox DHCP and IP address management (IPAM) solution.<\/p>\n<p>To learn more, read the full report from Optiv\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/improving-security-dns-and-ip-address-management?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year. These attacks are not just focused on bringing DNS down, but can also use DNS to steal [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,15,36],"class_list":{"0":"post-2419","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-security","10":"tag-threats","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Shining the Spotlight on DNS Security<\/title>\n<meta name=\"description\" content=\"DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shining the Spotlight on DNS Security\" \/>\n<meta property=\"og:description\" content=\"DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-28T22:10:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Shining the Spotlight on DNS Security\",\"datePublished\":\"2015-09-28T22:10:27+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/\"},\"wordCount\":306,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"keywords\":[\"DNS\",\"Security\",\"Threats\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/\",\"name\":\"Shining the Spotlight on DNS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"datePublished\":\"2015-09-28T22:10:27+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"description\":\"DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/shining-the-spotlight-on-dns-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Shining the Spotlight on DNS Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shining the Spotlight on DNS Security","description":"DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/","og_locale":"en_US","og_type":"article","og_title":"Shining the Spotlight on DNS Security","og_description":"DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/","og_site_name":"Infoblox Blog","article_published_time":"2015-09-28T22:10:27+00:00","article_modified_time":"2020-05-06T17:30:09+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Shining the Spotlight on DNS Security","datePublished":"2015-09-28T22:10:27+00:00","dateModified":"2020-05-06T17:30:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/"},"wordCount":306,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","keywords":["DNS","Security","Threats"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/","url":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/","name":"Shining the Spotlight on DNS Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","datePublished":"2015-09-28T22:10:27+00:00","dateModified":"2020-05-06T17:30:09+00:00","description":"DNS-based attacks can be some of the most visible and damaging a business can suffer, and \u2013 according to recent reports \u2013 attacks on the Domain Name System are continuing to grow in frequency and volume every year.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/shining-the-spotlight-on-dns-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Shining the Spotlight on DNS Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2419"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2419\/revisions"}],"predecessor-version":[{"id":2421,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2419\/revisions\/2421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2420"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}