{"id":4646,"date":"2020-02-05T16:25:42","date_gmt":"2020-02-06T00:25:42","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4646"},"modified":"2020-05-06T10:26:51","modified_gmt":"2020-05-06T17:26:51","slug":"what-is-shadow-iot-how-it-teams-can-defend-their-networks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/","title":{"rendered":"What is Shadow IoT? How IT Teams Can Defend Their Networks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4647 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Shadow_IoT-1024x682.jpg\" alt=\"What is Shadow IoT? How IT teams can defend their networks\" width=\"1024\" height=\"682\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Shadow_IoT-1024x682.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Shadow_IoT-300x200.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Shadow_IoT-768x512.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>S<\/strong><strong>ha<\/strong><strong>dow IoT<\/strong> is the use of unauthorized connected devices or sensors in active use within an organization <strong><a href=\"https:\/\/iotbusinessnews.com\/2020\/02\/04\/35752-shadow-iot-devices-a-major-concern-for-corporate-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">without IT\u2019s knowledge<\/a><\/strong>. These devices can be any number of connected technologies, such as laptops, mobile phones, tablets, fitness trackers or smart home gadgets like voice assistants, that are managed outside of the IT department\u2019s view.<\/p>\n<p>As workforces evolve to include more remote locations and branch offices, and enterprises continue to go through digital transformations, organizations need to focus on protecting their cloud-hosted services the same way they do at their main offices. If not, enterprise IT teams will be left in the dark and will not have visibility over what\u2019s lurking on their networks.<\/p>\n<h3><strong>Cybersecurity Risks of Shadow IoT<\/strong><\/h3>\n<p>Shadow IoT devices are becoming <a href=\"https:\/\/www.darkreading.com\/shadow-iot-devices-pose-a-growing-problem-for-organizations\/d\/d-id\/1331797\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>increasingly problematic<\/strong><\/a> for organizations. Some 40 billion IoT devices are expected to be connected to the internet in the next five years, with 50 billion coming online by 2030. These devices are often built with limited cybersecurity controls, while others have no security measures whatsoever. They are also often set up using default IDs and passwords that criminals can easily find, and are frequently added to an organization\u2019s main Wi-Fi networks without IT\u2019s knowledge.<\/p>\n<p>IT can\u2019t control or secure devices they can\u2019t see on the network. That\u2019s why \u201csmart\u201d devices can be such easy targets for cybercriminals.<\/p>\n<p>Over the past 12 months, a staggering 80% of IT leaders discovered shadow IoT devices on their networks, and worryingly, nearly one-third (29%) of organizations saw more than 20; some saw as many as 50.<\/p>\n<p>So, with billions of new IoT devices expected to connect to the internet over the next few years, how can IT teams mitigate this threat?<\/p>\n<h3><strong>How to Mitigate Shadow IoT Threats<\/strong><\/h3>\n<p>Fortunately, protecting against shadow IoT threats is possible when organizations set cybersecurity and visibility at the foundation of their network and business strategies.<\/p>\n<p>Rethinking the approach to network security to include robust security policies for personal devices, ensure full visibility over the network, and use intelligent systems to detect and halt anomalous and potentially malicious communications will ensure organizations are always one step ahead of the threat posed by Shadow IoT devices.<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Infoblox has commissioned a new <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/whats-lurking-in-the-shadows-2020\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Shadow IoT Report<\/strong><\/a> to help enterprises gain a better understanding of the challenges that IT teams face in securely managing shadow IoT devices across enterprise networks. Download the report to read the latest research and learn recommendations on how to best manage threats posed by shadow IoT devices and more.<\/p>\n<p>What\u2019s lurking in the shadows on your network?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge. These devices can be any number of connected technologies, such as laptops, mobile phones, tablets, fitness trackers or smart home gadgets like voice assistants, that are managed outside of the IT department\u2019s view. As workforces [&hellip;]<\/p>\n","protected":false},"author":310,"featured_media":4727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[235,189,236,16,234,32,15,233,232],"class_list":{"0":"post-4646","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-byod","9":"tag-cybersecurity","10":"tag-cyberthreat","11":"tag-infoblox","12":"tag-iot","13":"tag-malware","14":"tag-security","15":"tag-shadow-it","16":"tag-threat-defense","17":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Shadow IoT? How IT Teams Can Defend Their Networks<\/title>\n<meta name=\"description\" content=\"Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Shadow IoT? How IT Teams Can Defend Their Networks\" \/>\n<meta property=\"og:description\" content=\"Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-06T00:25:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shadow-iot-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"613\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Malcolm Murphy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Malcolm Murphy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/\"},\"author\":{\"name\":\"Malcolm Murphy\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e68fe29354b4393db769724affc0dc02\"},\"headline\":\"What is Shadow IoT? How IT Teams Can Defend Their Networks\",\"datePublished\":\"2020-02-06T00:25:42+00:00\",\"dateModified\":\"2020-05-06T17:26:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/\"},\"wordCount\":435,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/shadow-iot-featured.jpg\",\"keywords\":[\"BYOD\",\"Cybersecurity\",\"Cyberthreat\",\"Infoblox\",\"IoT\",\"Malware\",\"Security\",\"Shadow IT\",\"Threat Defense\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/\",\"name\":\"What is Shadow IoT? How IT Teams Can Defend Their Networks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/shadow-iot-featured.jpg\",\"datePublished\":\"2020-02-06T00:25:42+00:00\",\"dateModified\":\"2020-05-06T17:26:51+00:00\",\"description\":\"Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/shadow-iot-featured.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/shadow-iot-featured.jpg\",\"width\":613,\"height\":343,\"caption\":\"What is Shadow IoT? How IT teams can defend their networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is Shadow IoT? How IT Teams Can Defend Their Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e68fe29354b4393db769724affc0dc02\",\"name\":\"Malcolm Murphy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_310_1582323737-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_310_1582323737-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_310_1582323737-96x96.jpg\",\"caption\":\"Malcolm Murphy\"},\"description\":\"In a career spanning more than 20 years, Dr Malcolm Murphy has witnessed first-hand the evolution of the Internet from academic collaboration tool to the must-have utility we all take for granted today. He started his career building network and security infrastructure for one of the UK\u2019s largest ISPs, before subsequently working for a number of networking and security technology companies. In the late 1990s, Malcolm developed a proof-of-concept mechanism for using DNS as a covert communications channel. If there ever was a good reason for doing this, he can\u2019t remember what it is. But he freely admits that it was nowhere near as sophisticated or effective as the techniques that are being employed today to attack and exploit DNS. Malcolm has held a number of technology and sales leadership roles at Infoblox, working with Enterprises and Service Providers to help improve the security and robustness of their cloud, network and datacentre operations.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/malcolm-murphy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Shadow IoT? How IT Teams Can Defend Their Networks","description":"Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/","og_locale":"en_US","og_type":"article","og_title":"What is Shadow IoT? How IT Teams Can Defend Their Networks","og_description":"Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/","og_site_name":"Infoblox Blog","article_published_time":"2020-02-06T00:25:42+00:00","article_modified_time":"2020-05-06T17:26:51+00:00","og_image":[{"width":613,"height":343,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shadow-iot-featured.jpg","type":"image\/jpeg"}],"author":"Malcolm Murphy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Malcolm Murphy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/"},"author":{"name":"Malcolm Murphy","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e68fe29354b4393db769724affc0dc02"},"headline":"What is Shadow IoT? How IT Teams Can Defend Their Networks","datePublished":"2020-02-06T00:25:42+00:00","dateModified":"2020-05-06T17:26:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/"},"wordCount":435,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shadow-iot-featured.jpg","keywords":["BYOD","Cybersecurity","Cyberthreat","Infoblox","IoT","Malware","Security","Shadow IT","Threat Defense"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/","name":"What is Shadow IoT? How IT Teams Can Defend Their Networks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shadow-iot-featured.jpg","datePublished":"2020-02-06T00:25:42+00:00","dateModified":"2020-05-06T17:26:51+00:00","description":"Shadow IoT is the use of unauthorized connected devices or sensors in active use within an organization without IT\u2019s knowledge.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shadow-iot-featured.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shadow-iot-featured.jpg","width":613,"height":343,"caption":"What is Shadow IoT? How IT teams can defend their networks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-shadow-iot-how-it-teams-can-defend-their-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What is Shadow IoT? How IT Teams Can Defend Their Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e68fe29354b4393db769724affc0dc02","name":"Malcolm Murphy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_310_1582323737-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_310_1582323737-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_310_1582323737-96x96.jpg","caption":"Malcolm Murphy"},"description":"In a career spanning more than 20 years, Dr Malcolm Murphy has witnessed first-hand the evolution of the Internet from academic collaboration tool to the must-have utility we all take for granted today. He started his career building network and security infrastructure for one of the UK\u2019s largest ISPs, before subsequently working for a number of networking and security technology companies. In the late 1990s, Malcolm developed a proof-of-concept mechanism for using DNS as a covert communications channel. If there ever was a good reason for doing this, he can\u2019t remember what it is. But he freely admits that it was nowhere near as sophisticated or effective as the techniques that are being employed today to attack and exploit DNS. Malcolm has held a number of technology and sales leadership roles at Infoblox, working with Enterprises and Service Providers to help improve the security and robustness of their cloud, network and datacentre operations.","url":"https:\/\/www.infoblox.com\/blog\/author\/malcolm-murphy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/310"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4646"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4646\/revisions"}],"predecessor-version":[{"id":4654,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4646\/revisions\/4654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4727"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}