{"id":2505,"date":"2016-10-26T16:46:33","date_gmt":"2016-10-26T16:46:33","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2505"},"modified":"2020-05-06T10:28:03","modified_gmt":"2020-05-06T17:28:03","slug":"expert-perspective-how-to-defend-against-the-next-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/","title":{"rendered":"Expert Perspective: How to Defend Against the Next DDoS Attack"},"content":{"rendered":"<p>I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.<\/p>\n<p>The Dyn attack is a wake-up call to the world \u2013 not just to DNS providers, but to all parties involved, including the DNS community, Internet of Things (IoT) device manufacturers, businesses and consumers. The sheer volume of traffic involved and huge number of web sites affected may make the Dyn attack seem overwhelming, but the truth is, by following some simple best practices, we can not only survive attacks like this, but also reduce their size and scope.<\/p>\n<h2 id=\"toc-hId-649935032\">Get back to the basics: 3 best practices<\/h2>\n<ol>\n<li><strong>Build in redundancy.<\/strong>\u00a0Many companies rely on a single DNS provider like Dyn, leaving them vulnerable to attacks. Instead, businesses need to either deploy some on-premises appliances that can serve as external authoritative name servers \u2013 the servers that advertise their DNS data to the Internet \u2013 or bring in a second DNS provider. This is no different from ensuring that your company has redundant connections to the Internet. If one set of name servers goes down or is attacked, companies will still have name servers available. Making the external DNS infrastructure more heterogeneous ensures that companies are not putting all of their eggs in one basket.<\/li>\n<li><strong>Mix it up, manufacturers.<\/strong>\u00a0IoT devices are here to stay, from cameras to thermostats to fitness trackers. And traffic from IoT devices will continue to grow. But many IoT devices are inherently insecure from the get-go. Why? Many manufacturers sell these devices with the same default administrator password, which consumers rarely change. Or even if they want to change it, sometimes they can\u2019t figure out how to do it. Either way, attackers have access to a vast network of devices from which to launch DDoS attacks. Simply put, IoT devices cannot be sold to consumers without some basic security measures, starting with unique, randomly generated passwords for each device.<\/li>\n<li><strong>Lock it down, consumers.<\/strong>\u00a0In general, we have a terrible track record when it comes to protecting our information with passwords. The majority of passwords consumers use are easily guessable. We have to try harder. The same goes with Internet-connected devices. Consumers must be savvier about changing the default passwords on everything including cameras, DVRs, routers and printers. And, device manufacturers, in addition to providing each device with a unique preset password, must prompt consumers to create more sophisticated passwords and make it more intuitive for people to be able to do it. Finally, an attack should be a reminder to consumers to check the security of their devices: to make sure passwords aren\u2019t easily guessable, and that devices have been upgraded recently to versions of code without known vulnerabilities.<\/li>\n<\/ol>\n<h2 id=\"toc-hId-678564183\">Take action now<\/h2>\n<p>Gartner projects there will be 26\u00a0<em>billion<\/em>\u00a0IoT devices installed by 2020. That\u2019s more than three devices for every person on the planet. A survey Infoblox conducted of 400 IT executives revealed that although 75% of businesses already have Internet-connected equipment on their networks, 35% say they\u2019re not ready to support IoT yet. Even more eye-opening is that we found that nearly 60% of IT professionals say they\u2019re not doing anything to prepare for the impact of IoT. Do we really want to be ruled by toaster and refrigerator overlords? The IoT threat isn\u2019t even the future \u2013 it\u2019s already happening, as demonstrated by the Dyn attack. Implementing best practices for IoT device security must be a top priority for all of us.<\/p>\n<p>Missed the webcast? \u00a0You can watch it On Demand by clicking below!<\/p>\n<p><a href=\"http:\/\/info.infoblox.com\/resources-webinars-lessons-from-the-latest-ddos-attack?utm_source=blox-community&amp;utm_campaign=community-q2&amp;_ga=2.76067987.701277867.1570736216-914277325.1561734961\" target=\"_self\" rel=\"nofollow noopener noreferrer\"><span class=\"lia-message-image-wrapper lia-message-image-actions-narrow lia-message-image-actions-below\"><img decoding=\"async\" class=\"lia-media-image\" tabindex=\"0\" title=\"DDoS-on-demand-banner.jpeg\" src=\"https:\/\/cixhp49439.i.lithium.com\/t5\/image\/serverpage\/image-id\/868iCE335A85DBC01DE5\/image-size\/original?v=v2&amp;px=-1\" alt=\"DDoS-on-demand-banner.jpeg\" border=\"0\" \/><span class=\"lia-messages-message-image\"><i class=\"lia-fa lia-fa-external-link\"><\/i>\u00a0<i class=\"lia-fa lia-fa-search-plus lia-media-lightbox-trigger\" tabindex=\"0\" aria-label=\"Enlarge image\"><\/i><\/span><\/span><\/a><\/p>\n<p>_________________________________<\/p>\n<p><em>About the author<\/em><\/p>\n<p>Cricket Liu is one of the world\u2019s leading experts on the Domain Name System (DNS), and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an Internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition. He is the owner\/inventor of 10 DNS\/IP address management patents within the U.S.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one. The Dyn attack is a wake-up call to the world \u2013 not just to DNS providers, but to all parties [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[70,16,73,48],"class_list":{"0":"post-2505","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddos","9":"tag-infoblox","10":"tag-iot-attacks","11":"tag-threat","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expert Perspective: How to Defend Against the Next DDoS Attack<\/title>\n<meta name=\"description\" content=\"I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Perspective: How to Defend Against the Next DDoS Attack\" \/>\n<meta property=\"og:description\" content=\"I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-26T16:46:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Expert Perspective: How to Defend Against the Next DDoS Attack\",\"datePublished\":\"2016-10-26T16:46:33+00:00\",\"dateModified\":\"2020-05-06T17:28:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/\"},\"wordCount\":715,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-2.jpg\",\"keywords\":[\"DDoS\",\"Infoblox\",\"IoT Attacks\",\"Threat\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/\",\"name\":\"Expert Perspective: How to Defend Against the Next DDoS Attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-2.jpg\",\"datePublished\":\"2016-10-26T16:46:33+00:00\",\"dateModified\":\"2020-05-06T17:28:03+00:00\",\"description\":\"I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"Expert Perspective: How to Defend Against the Next DDoS Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/expert-perspective-how-to-defend-against-the-next-ddos-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expert Perspective: How to Defend Against the Next DDoS Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expert Perspective: How to Defend Against the Next DDoS Attack","description":"I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"Expert Perspective: How to Defend Against the Next DDoS Attack","og_description":"I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/","og_site_name":"Infoblox Blog","article_published_time":"2016-10-26T16:46:33+00:00","article_modified_time":"2020-05-06T17:28:03+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-2.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Expert Perspective: How to Defend Against the Next DDoS Attack","datePublished":"2016-10-26T16:46:33+00:00","dateModified":"2020-05-06T17:28:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/"},"wordCount":715,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-2.jpg","keywords":["DDoS","Infoblox","IoT Attacks","Threat"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/","url":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/","name":"Expert Perspective: How to Defend Against the Next DDoS Attack","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-2.jpg","datePublished":"2016-10-26T16:46:33+00:00","dateModified":"2020-05-06T17:28:03+00:00","description":"I\u2019m sure you\u2019ve been following the news the recent distributed denial of service (DDoS) attack against Dyn. Here\u2019s my take on what happened and what we need to do to survive the next big one.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-2.jpg","width":660,"height":454,"caption":"Expert Perspective: How to Defend Against the Next DDoS Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/expert-perspective-how-to-defend-against-the-next-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Expert Perspective: How to Defend Against the Next DDoS Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2505"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2505\/revisions"}],"predecessor-version":[{"id":2507,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2505\/revisions\/2507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2506"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}