{"id":3189,"date":"2015-07-27T19:38:35","date_gmt":"2015-07-27T19:38:35","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3189"},"modified":"2020-05-06T10:30:11","modified_gmt":"2020-05-06T17:30:11","slug":"introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/","title":{"rendered":"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2562\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/may-20-2-1.jpg\" alt=\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\" width=\"529\" height=\"364\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1-300x206.jpg 300w\" sizes=\"auto, (max-width: 529px) 100vw, 529px\" \/><\/p>\n<p>Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0<a href=\"http:\/\/www.infoblox.com\/dns-threat-index?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox DNS Threat Index<\/a>, powered by\u00a0<a href=\"http:\/\/internetidentity.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IID<\/a>. The index is unique because it tracks the\u00a0<em>creation\u00a0<\/em>of malicious domains. Before cyber criminals can execute an attack, they must first build infrastructure, which often includes exploitation of the Domain Name System (DNS).<\/p>\n<p>So what did our research find? The index, which is built on data going back to the beginning of 2013, hit a record high of 133 in the second quarter of 2015, up 58 percent from the same quarter in 2014. The rise was due largely to a surge in phishing attacks. Phishing, a time-tested weapon of cybercriminals, involves sending emails that point users to fake web sites\u2014mimicking a bank\u2019s home page, for example, or a company\u2019s employee portal\u2014to collect confidential information such as account names and passwords or credit-card numbers.<\/p>\n<p>We also saw a growing demand for exploit kits, which are packages of malicious software that are typically hidden on web sites and appear to be innocuous until they download malware when a user visits.<\/p>\n<p>Knowing and differentiating between different attacks and the different threat levels of DNS-based malware can help organizations to prepare by prioritizing investments in infrastructure and host protection as well as technologies that provide visibility into malware outbreaks.<\/p>\n<p>Another trend Infoblox and IID found is a phenomenon we\u2019re calling \u201cseasons\u201d of cybercrime. Our research indicates that effectively, there are two seasons that are constantly cycling back and forth: planting and harvesting. The planting season is when cybercriminals build infrastructure for malicious attacks. Then attackers begin to harvest their extensive infrastructure, stealing data and generally causing harm to their target victims. Our new index helps organizations to understand where attackers are in this endless cycle.<\/p>\n<p>Find out more about DNS threats and malicious domain creation in our full report, available for free with no registration required at:\u00a0<a href=\"http:\/\/www.infoblox.com\/dns-threat-index?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/dns-threat-index<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID. The index is unique because it tracks the\u00a0creation\u00a0of malicious domains. Before cyber criminals can execute an attack, they must first build infrastructure, which often includes exploitation of the Domain Name System (DNS). So what did [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":2562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[111],"class_list":{"0":"post-3189","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-threat-index","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks<\/title>\n<meta name=\"description\" content=\"Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks\" \/>\n<meta property=\"og:description\" content=\"Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-27T19:38:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks\",\"datePublished\":\"2015-07-27T19:38:35+00:00\",\"dateModified\":\"2020-05-06T17:30:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/\"},\"wordCount\":334,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"keywords\":[\"Threat Index\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/\",\"name\":\"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"datePublished\":\"2015-07-27T19:38:35+00:00\",\"dateModified\":\"2020-05-06T17:30:11+00:00\",\"description\":\"Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks","description":"Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks","og_description":"Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2015-07-27T19:38:35+00:00","article_modified_time":"2020-05-06T17:30:11+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks","datePublished":"2015-07-27T19:38:35+00:00","dateModified":"2020-05-06T17:30:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/"},"wordCount":334,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","keywords":["Threat Index"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/","name":"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","datePublished":"2015-07-27T19:38:35+00:00","dateModified":"2020-05-06T17:30:11+00:00","description":"Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The\u00a0Infoblox DNS Threat Index, powered by\u00a0IID.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2-1.jpg","width":660,"height":454,"caption":"Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/introducing-the-infoblox-dns-threat-index-measuring-cybercrime-infrastructure-build-up-before-the-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3189"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3189\/revisions"}],"predecessor-version":[{"id":3190,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3189\/revisions\/3190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2562"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}