{"id":4118,"date":"2019-10-22T23:22:10","date_gmt":"2019-10-22T23:22:10","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4118"},"modified":"2020-12-16T17:31:42","modified_gmt":"2020-12-17T01:31:42","slug":"guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/","title":{"rendered":"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom"},"content":{"rendered":"<p>\u201cRemember, Remember, the Fifth of November.\u201d So begins the infamous nursery rhyme associated with Great Britain\u2019s Bonfire Night, or Guy Fawkes Day. The fifth of November has also become a holiday associated with hacktivist group Anonymous by using Fawkes\u2019 mask as the iconic symbol of its movement.<\/p>\n<p>With that, there\u2019s no better date than Guy Fawkes Day to focus on the state of cybersecurity in the United Kingdom.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4119\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/guy-fawkes-day.jpg\" alt=\"\" width=\"600\" height=\"344\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day-300x172.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>A Comprehensive Approach to British Cybersecurity<\/strong><\/p>\n<p>The UK\u2019s National Cyber Security Centre (NCSC) was established in 2016 as the cyber arm of GCHQ with the intention of \u201cmaking the UK the safest place to live and work online.\u201d The organisation\u2019s mission is to also \u201creduce the harm from cybersecurity incidents in the UK\u201d via incident management and response.<\/p>\n<p>According to the <strong><a href=\"https:\/\/www.ncsc.gov.uk\/news\/annual-review-2019\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">NCSC\u2019s third annual review<\/a><\/strong>, the United Kingdom is taking an increasingly active and comprehensive approach to protecting organisations and users. The report describes the British cybersecurity strategy as revolving around the government\u2019s ability to constantly share threat indicators with organizations as \u201cactive defense\u201d.<\/p>\n<p><strong>Automating British Cyber Threat Intelligence<\/strong><\/p>\n<p>The UK is also looking to expand its cyber defense strategy using automation to improve its cyber threat intelligence and information sharing capabilities. For example,\u00a0<strong><a href=\"https:\/\/www.finextra.com\/pressarticle\/80338\/ncsc-operation-haulster-flagged-fraud-on-more-than-one-million-stolen-credit-cards\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Operation Haulster<\/a><\/strong>\u00a0automates the flagging of credit card fraud in the UK. The operation automatically flagged fraud on over one million stolen credit cards last year alone.<\/p>\n<p>As a result, the NCSC\u2019s Incident Management Team can now detect and stop threats in their tracks in a matter of seconds while threat intel is timely, as opposed to a matter of hours.<\/p>\n<p>This new level of automation also gives the team greater visibility into where threats are coming from and who they may be targeting. For the first time ever this year, the NCSC was able to report on which sectors needed the most support. Government, higher education, IT, managed service providers and healthcare topped the list.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>As cybercriminals continue to develop more sophisticated ways to steal data and dupe unsuspecting victims, remember, remember to stay safe online.<\/p>\n<p>Learn more about how you can\u00a0<strong><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">proactively detect malware<\/a><\/strong>\u00a0and protect your users and data via DNS. Visit the Infoblox website or start your free trial of <strong><a href=\"https:\/\/info.infoblox.com\/resources-evaluations-bloxone-threat-defense\/?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Infoblox\u2019s subscription-based cybersecurity<\/a><\/strong>\u00a0solution today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cRemember, Remember, the Fifth of November.\u201d So begins the infamous nursery rhyme associated with Great Britain\u2019s Bonfire Night, or Guy Fawkes Day. The fifth of November has also become a holiday associated with hacktivist group Anonymous by using Fawkes\u2019 mask as the iconic symbol of its movement. With that, there\u2019s no better date than Guy [&hellip;]<\/p>\n","protected":false},"author":310,"featured_media":4119,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[135,16,32,49,15,40,36,346,370,371],"class_list":{"0":"post-4118","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-incident-response","9":"tag-infoblox","10":"tag-malware","11":"tag-mitigate-threats","12":"tag-security","13":"tag-threat-intelligence","14":"tag-threats","15":"tag-healthcare","16":"tag-higher-education","17":"tag-education","18":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Guy Fawkes Day: The State of Cybersecurity in the United Kingdom<\/title>\n<meta name=\"description\" content=\"\u201cRemember, Remember, the Fifth of November.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom\" \/>\n<meta property=\"og:description\" content=\"\u201cRemember, Remember, the Fifth of November.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-22T23:22:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-17T01:31:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Malcolm Murphy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Malcolm Murphy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/\"},\"author\":{\"name\":\"Malcolm Murphy\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e68fe29354b4393db769724affc0dc02\"},\"headline\":\"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom\",\"datePublished\":\"2019-10-22T23:22:10+00:00\",\"dateModified\":\"2020-12-17T01:31:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/\"},\"wordCount\":390,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guy-fawkes-day.jpg\",\"keywords\":[\"incident response\",\"Infoblox\",\"Malware\",\"mitigate threats\",\"Security\",\"Threat Intelligence\",\"Threats\",\"Healthcare\",\"Higher Education\",\"education\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/\",\"name\":\"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guy-fawkes-day.jpg\",\"datePublished\":\"2019-10-22T23:22:10+00:00\",\"dateModified\":\"2020-12-17T01:31:42+00:00\",\"description\":\"\u201cRemember, Remember, the Fifth of November.\u201d\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guy-fawkes-day.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guy-fawkes-day.jpg\",\"width\":600,\"height\":344},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e68fe29354b4393db769724affc0dc02\",\"name\":\"Malcolm Murphy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_310_1582323737-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_310_1582323737-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_310_1582323737-96x96.jpg\",\"caption\":\"Malcolm Murphy\"},\"description\":\"In a career spanning more than 20 years, Dr Malcolm Murphy has witnessed first-hand the evolution of the Internet from academic collaboration tool to the must-have utility we all take for granted today. He started his career building network and security infrastructure for one of the UK\u2019s largest ISPs, before subsequently working for a number of networking and security technology companies. In the late 1990s, Malcolm developed a proof-of-concept mechanism for using DNS as a covert communications channel. If there ever was a good reason for doing this, he can\u2019t remember what it is. But he freely admits that it was nowhere near as sophisticated or effective as the techniques that are being employed today to attack and exploit DNS. Malcolm has held a number of technology and sales leadership roles at Infoblox, working with Enterprises and Service Providers to help improve the security and robustness of their cloud, network and datacentre operations.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/malcolm-murphy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom","description":"\u201cRemember, Remember, the Fifth of November.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/","og_locale":"en_US","og_type":"article","og_title":"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom","og_description":"\u201cRemember, Remember, the Fifth of November.\u201d","og_url":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/","og_site_name":"Infoblox Blog","article_published_time":"2019-10-22T23:22:10+00:00","article_modified_time":"2020-12-17T01:31:42+00:00","og_image":[{"width":600,"height":344,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg","type":"image\/jpeg"}],"author":"Malcolm Murphy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Malcolm Murphy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/"},"author":{"name":"Malcolm Murphy","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e68fe29354b4393db769724affc0dc02"},"headline":"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom","datePublished":"2019-10-22T23:22:10+00:00","dateModified":"2020-12-17T01:31:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/"},"wordCount":390,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg","keywords":["incident response","Infoblox","Malware","mitigate threats","Security","Threat Intelligence","Threats","Healthcare","Higher Education","education"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/","url":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/","name":"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg","datePublished":"2019-10-22T23:22:10+00:00","dateModified":"2020-12-17T01:31:42+00:00","description":"\u201cRemember, Remember, the Fifth of November.\u201d","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guy-fawkes-day.jpg","width":600,"height":344},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/guy-fawkes-day-the-state-of-cybersecurity-in-the-united-kingdom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Guy Fawkes Day: The State of Cybersecurity in the United Kingdom"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e68fe29354b4393db769724affc0dc02","name":"Malcolm Murphy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_310_1582323737-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_310_1582323737-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_310_1582323737-96x96.jpg","caption":"Malcolm Murphy"},"description":"In a career spanning more than 20 years, Dr Malcolm Murphy has witnessed first-hand the evolution of the Internet from academic collaboration tool to the must-have utility we all take for granted today. He started his career building network and security infrastructure for one of the UK\u2019s largest ISPs, before subsequently working for a number of networking and security technology companies. In the late 1990s, Malcolm developed a proof-of-concept mechanism for using DNS as a covert communications channel. If there ever was a good reason for doing this, he can\u2019t remember what it is. But he freely admits that it was nowhere near as sophisticated or effective as the techniques that are being employed today to attack and exploit DNS. Malcolm has held a number of technology and sales leadership roles at Infoblox, working with Enterprises and Service Providers to help improve the security and robustness of their cloud, network and datacentre operations.","url":"https:\/\/www.infoblox.com\/blog\/author\/malcolm-murphy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/310"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4118"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4118\/revisions"}],"predecessor-version":[{"id":4124,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4118\/revisions\/4124"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4119"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}