{"id":3085,"date":"2015-09-01T17:55:46","date_gmt":"2015-09-01T17:55:46","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3085"},"modified":"2020-05-06T10:30:10","modified_gmt":"2020-05-06T17:30:10","slug":"matching-dns-security-methodologies-to-threats","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/","title":{"rendered":"Matching DNS Security Methodologies To Threats"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3087\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Security-Methodologies.jpg\" alt=\"\" width=\"520\" height=\"358\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies-300x206.jpg 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<p>The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats. The problem is, there is no single kind of threat when it comes to DNS.<\/p>\n<p>Threats vary widely: attacks that can bring down servers; attacks that use DNS for command and control; and attacks that use DNS as a pathway for data exfiltration. Mitigating DNS threats effectively requires applying the right methodologies that work for the type of threat in question.<\/p>\n<p>Want to learn how to match the right detection techniques to the threat? Join this 30-minute webinar on Tuesday, September 8<sup>th\u00a0<\/sup>at 10 am Pacific to learn:<\/p>\n<ul>\n<li>The basics of each threat detection method: reputation, signature and behavior<\/li>\n<li>The pros and cons of each methodology<\/li>\n<li>The type of attacks effectively mitigated by each technique<\/li>\n<\/ul>\n<p>DNS is ubiquitous and can be used as an optimal enforcement point in an enterprise\u2019s network to improve security. But traditional security controls don\u2019t effectively secure DNS, and closing the DNS backdoor through a range of techniques is a key strategy for successful protection of infrastructure and data.<\/p>\n<p>Click\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1035422\/38D39A328C5891203878BE6670062C9E\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>\u00a0to register for this insightful webinar.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats. The problem is, there is no single kind of threat when it comes to DNS. Threats vary widely: attacks that can bring down servers; attacks that use DNS for command and control; and [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":3087,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,16,15],"class_list":{"0":"post-3085","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Matching DNS Security Methodologies To Threats<\/title>\n<meta name=\"description\" content=\"The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Matching DNS Security Methodologies To Threats\" \/>\n<meta property=\"og:description\" content=\"The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-01T17:55:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"Matching DNS Security Methodologies To Threats\",\"datePublished\":\"2015-09-01T17:55:46+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/\"},\"wordCount\":198,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Security-Methodologies.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/\",\"name\":\"Matching DNS Security Methodologies To Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Security-Methodologies.jpg\",\"datePublished\":\"2015-09-01T17:55:46+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"description\":\"The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Security-Methodologies.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Security-Methodologies.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/matching-dns-security-methodologies-to-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Matching DNS Security Methodologies To Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Matching DNS Security Methodologies To Threats","description":"The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/","og_locale":"en_US","og_type":"article","og_title":"Matching DNS Security Methodologies To Threats","og_description":"The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/","og_site_name":"Infoblox Blog","article_published_time":"2015-09-01T17:55:46+00:00","article_modified_time":"2020-05-06T17:30:10+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg","type":"image\/jpeg"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"Matching DNS Security Methodologies To Threats","datePublished":"2015-09-01T17:55:46+00:00","dateModified":"2020-05-06T17:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/"},"wordCount":198,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg","keywords":["DNS","Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/","url":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/","name":"Matching DNS Security Methodologies To Threats","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg","datePublished":"2015-09-01T17:55:46+00:00","dateModified":"2020-05-06T17:30:10+00:00","description":"The Domain Name System (DNS) is mission-critical infrastructure, so enterprises are increasingly \u2013 and justifiably \u2013 concerned about securing DNS from threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Security-Methodologies.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/matching-dns-security-methodologies-to-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Matching DNS Security Methodologies To Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3085"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3085\/revisions"}],"predecessor-version":[{"id":3088,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3085\/revisions\/3088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3087"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}