{"id":4410,"date":"2020-01-21T14:56:50","date_gmt":"2020-01-21T22:56:50","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4410"},"modified":"2020-05-06T10:26:52","modified_gmt":"2020-05-06T17:26:52","slug":"making-dns-security-threats-visible-and-actionable","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/","title":{"rendered":"Making DNS Security Threats Visible and Actionable"},"content":{"rendered":"<p>DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment. When (and not if) you\u2019re attacked, your ability to effectively lessen the impact depends on automated, real-time detection, visibility, threat context, triage, communications and quick defensive action. Yet for many companies, it takes an average of 197 days\u2014over 6.5 months\u2014just to identify a breach and another 69 days on average to contain it (<a href=\"https:\/\/securityintelligence.com\/ponemon-cost-of-a-data-breach-2018\/\">Ponemon Institute, 13<sup>th<\/sup> annual Cost of Data Breach Study, 7\/11\/18<\/a>). But with DNS, real-time network data is already available on your network, so the key begins with discovery, context and how to access it.<\/p>\n<p>Complicating matters is the rapidly expanding threat surface and increase in bad actors seeking to infiltrate networks and extract sensitive information. Users are now accessing cloud applications anytime, anywhere through an escalation of devices. Remote and branch offices with direct Internet access are seldom fully protected by the headquarters security suite. And endpoints, like lightweight IoT devices, are susceptible without robust endpoint security.<\/p>\n<p>While DNS threats and attacks are growing, Infoblox Reporting and Analytics, integrated with core network services, can make security threats visible in real-time for quick response and remediation. While an exhaustive threat review is out of scope, this blog focuses on detecting three major attacks\u2014DNS NXDOMAIN \/ NOERROR, Malware and Tunneling and DNS RPZ violations\u2014to help you better protect your infrastructure and data.<\/p>\n<p><strong><em>DNS NXDOMAIN \/ NOERROR<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-4412\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/NXDOMAIN-NOERROR.png\" alt=\"\" width=\"500\" height=\"271\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NXDOMAIN-NOERROR.png 737w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NXDOMAIN-NOERROR-300x163.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>DNS attacks target network infrastructure to compromise availability.\u00a0 A barrage of DNS queries can quickly fill-up the DNS server cache with non-existing domains.\u00a0 When filled, the network grinds to a halt and legitimate queries don\u2019t get answered quickly, if at all.<\/p>\n<p>The Infoblox Reporting &amp; Analytics NXDOMAIN \/ NOERROR report helps <strong><em>network teams<\/em><\/strong> quickly identify problems with domains or clients that have been mistyped, misspelled, misconfigured, renamed, changed, expired or removed by showing live queries actively seeking the target.\u00a0 For <strong><em>security teams, <\/em><\/strong>this report identifies when a client is doing something harmful on the network.\u00a0 For example, data exfiltration malware might use a domain name generation algorithm, searching among thousands of generated names to find one active attack vector.\u00a0 This generates a lot of NXDOMAIN activity, filling-up the cache and degrading server response to legitimate queries.<\/p>\n<p>The NXDOMAIN \/ NOERROR report is a standard report available through the DNS Dashboard and requires Advanced DNS Protection (ADP).\u00a0 Filtering is robust, flexible and intuitive making it quick and easy to get the needed information.\u00a0 Flexible configurations can be set for monitored timeframes, data displays (e.g., from visualized bar charts to raw data tables), top domains identified, filtration by members, DNS views and more.\u00a0 The Splunk interface allows a view of the raw dataset, and custom dashboards or reports can be created without starting from scratch. All of this gives you quick visibility to see a troubled or malware-infected domain rather than getting caught long after the damage is done.<\/p>\n<p><strong><em>Top Malware and DNS Tunneling by Client<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4413 alignright\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Malware_Tunneling-300x96.png\" alt=\"\" width=\"500\" height=\"160\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Malware_Tunneling-300x96.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Malware_Tunneling.png 739w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>This report lists clients with the most outbound queries (via Response Policy Zone (RPZ) hits) and DNS tunneling activities in a given timeframe.\u00a0 For <strong><em>network and security teams<\/em><\/strong>, it identifies the top infected clients making outbound malicious queries. It also identifies IP addresses tied to DNS tunneling, helps prioritize DNS security efforts to prevent malware spread and damage and reveals bad actors trying to remove data from the network.<\/p>\n<p>This report requires BloxOne\u2122 Threat Defense and is accessed through the Security Dashboard.\u00a0 A variety of filters are available. BloxOne Threat Defense displays the top client IP culprits, the number of associated tunneling events, the number of malicious queries and the date\/time last seen. The admin can drill down for historical data, sort by the top number of queries, the most recent, or most prolific to identify and arrest bad actors engaged in malware or data exfiltration activities.<\/p>\n<p><strong><em>DNS Top RPZ Hits<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4414 alignright\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/RPZ-300x128.png\" alt=\"\" width=\"500\" height=\"213\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/RPZ-300x128.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/RPZ.png 747w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The DNS Top RPZ Hits report shows which clients have the most malicious activities using threat intel RPZ rules defined through BloxOne Threat Defense.\u00a0 <strong><em>Network admins<\/em><\/strong> need to know which clients are conducting harmful DNS network queries for monitoring and pre-emptive action.\u00a0 <strong><em>Security admins<\/em><\/strong> need to identify malicious real-time and historical clients and domains to cut response time for damage mitigation and resolution.<\/p>\n<p>This report is also located through the Security Dashboard and utilizes BloxOne Threat Defense.\u00a0 Powerful search and flexible filtering can quickly parse the domains that are of major concern to initiate virus scans or further action by the security team.\u00a0 This report can also be saved to run automatically at regular intervals, and if rules are violated, it can be programed to trigger alerts, transfer processing files, run scripts, send emails, share data with the security ecosystem and more.<\/p>\n<p>These DNS security reports are just a sampling of the over 100 customizable dashboards and reports available to increase network visibility, protect your data and infrastructure, automate and better manage network security and operations. For more information, see our recorded <a href=\"https:\/\/www.infoblox.com\/resources\/webinar\/ipam-quickstart-for-visibility-automation-control-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">Reporting &amp; Analytics Security Visibility webinar<\/a> and download your copy of the <a href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-datasheet-infoblox-reporting-and-analytics-sample-report.pdf\">Sample Report Guide<\/a>. You can also contact your Infoblox sales rep or reseller to learn how Infoblox can further help you address your network visibility and reporting needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment. When (and not if) you\u2019re attacked, your ability to effectively lessen the impact depends on automated, real-time detection, visibility, threat context, triage, communications and quick defensive action. Yet for many companies, it takes an average of 197 [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":2761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[32,187,64,188,15,121],"class_list":{"0":"post-4410","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-malware","9":"tag-nxdomain-noerror","10":"tag-reporting-and-analytics","11":"tag-response-policy-zones-rpz","12":"tag-security","13":"tag-tunneling","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Making DNS Security Threats Visible and Actionable<\/title>\n<meta name=\"description\" content=\"DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making DNS Security Threats Visible and Actionable\" \/>\n<meta property=\"og:description\" content=\"DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-21T22:56:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Making DNS Security Threats Visible and Actionable\",\"datePublished\":\"2020-01-21T22:56:50+00:00\",\"dateModified\":\"2020-05-06T17:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/\"},\"wordCount\":870,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"keywords\":[\"Malware\",\"NXDOMAIN \\\/ NOERROR\",\"Reporting and Analytics\",\"Response Policy Zones (RPZ)\",\"Security\",\"Tunneling\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/\",\"name\":\"Making DNS Security Threats Visible and Actionable\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"datePublished\":\"2020-01-21T22:56:50+00:00\",\"dateModified\":\"2020-05-06T17:26:52+00:00\",\"description\":\"DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/making-dns-security-threats-visible-and-actionable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Making DNS Security Threats Visible and Actionable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making DNS Security Threats Visible and Actionable","description":"DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/","og_locale":"en_US","og_type":"article","og_title":"Making DNS Security Threats Visible and Actionable","og_description":"DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/","og_site_name":"Infoblox Blog","article_published_time":"2020-01-21T22:56:50+00:00","article_modified_time":"2020-05-06T17:26:52+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Making DNS Security Threats Visible and Actionable","datePublished":"2020-01-21T22:56:50+00:00","dateModified":"2020-05-06T17:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/"},"wordCount":870,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","keywords":["Malware","NXDOMAIN \/ NOERROR","Reporting and Analytics","Response Policy Zones (RPZ)","Security","Tunneling"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/","url":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/","name":"Making DNS Security Threats Visible and Actionable","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","datePublished":"2020-01-21T22:56:50+00:00","dateModified":"2020-05-06T17:26:52+00:00","description":"DNS provides extensive insight about what\u2019s actually happening on your network\u2014whether on-premises or in your hybrid, multi-cloud environment.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","width":660,"height":454,"caption":"Fighting Point-of-Sale (POS) Malware by Using DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/making-dns-security-threats-visible-and-actionable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Making DNS Security Threats Visible and Actionable"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4410"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4410\/revisions"}],"predecessor-version":[{"id":4543,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4410\/revisions\/4543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2761"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}