{"id":5852,"date":"2021-01-13T17:48:17","date_gmt":"2021-01-14T01:48:17","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5852"},"modified":"2021-01-13T17:48:46","modified_gmt":"2021-01-14T01:48:46","slug":"the-security-holes-that-only-dns-can-plug","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/","title":{"rendered":"The Security Holes That Only DNS Can Plug"},"content":{"rendered":"<p>With the plethora of security tools that most enterprise Security operations use, on top of the various verticals, geographies, and platforms (cloud, remote site, IoT, partner sites, etc.) that need protecting, CISOs are faced with a frustrating reality: some of the threat landscape is well-protected (indeed some are double- and triple-protected) while others have gaping security holes that are all but completely unmonitored.<\/p>\n<p>This means two things. First, CISOs and others in Security must re-evaluate all tools and defense strategies to see which ones truly make sense in today&#8217;s new environments, while eliminating overlaps that inadvertently lead to yet more security holes. It&#8217;s akin to having four anti-virus packages. Contrary to the hope that this makes it more likely that any and all viruses will be detected and stopped, what is much more likely is that each anti-virus executable will react negatively to the others, offering a slew of false positives as well as false negatives.<\/p>\n<p>Second, though, CISOs must examine all existing resources for better ways to defend intellectual property. And among the most overlooked approaches is robust DNS analytics. Not only is DNS more comprehensive than other security mechanisms\u2014an attack can&#8217;t even begin without interacting with DNS, regardless of where the attack originates and the target\u2014but it is far superior at identifying and halting a wide range of attacks.<\/p>\n<p>One of the reasons that DNS is often overlooked by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don&#8217;t have a track record of having to leverage it. But now they must. It&#8217;s not dissimilar from how in-house IoT first became such a threat.<\/p>\n<p>Consider that IoT lightbulbs and IoT door locks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone&#8217;s permission before making those purchases. It took a couple of years before CISOs weighed and said &#8220;Whoa! There is a massive difference.&#8221;<\/p>\n<p>Different times demand different responses and today, it&#8217;s security analysts and the rest of the SOC that need to own DNS\u2014or, at the very least, have unfiltered access to all DNS records. Why? Because with today&#8217;s new threat landscape, DNS could be the best friend that a CISO needs. It provides the global enterprise-wide detection and control mechanisms that no other single tool has.<\/p>\n<p>How much of a security difference can DNS analysis make? This summer, the U.S. National Security Agency (NSA) <a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.politico.com\/newsletters\/morning-cybersecurity\/2020\/06\/19\/nsa-launches-secure-dns-788668__;!!JYsgTRAg6ZQ!apkXI8u_L83EJnQym-8XOb2gVPL41k0Zjb1-82BVdeErFJoME3v44CS5vIw8geJF$\">launched a pilot program<\/a> to bolster the U.S. defense industrial base against malware. The test opted to focus solely on DNS protections to see how much of a difference it would make. According to Anne Neuberger, the NSA&#8217;s head of it\u2019s Cybersecurity Directorate, &#8220;Our analysis highlighted that using Secure DNS would reduce the ability for 92 percent of malware attacks.&#8221;<\/p>\n<p>DNS stands alone in its ability to filter out almost all of these attacks because it gives the SOC visibility into literally every device in the enterprise, including process controls and ATM. DNS is the front-line of visibility into knowing what these devices can do and what outside entities are interacting with these devices. From a protection perspective, DNS shines a very visible spotlight on all of these devices.<\/p>\n<p>Even today&#8217;s more cutting-edge defense tactics can&#8217;t replicate what DNS can deliver, especially when fighting a large active attack. Maybe ML can find an attack pattern in a month but DNS delivers immediate visibility. This impacts all verticals\u2014and all geographies\u2014but some verticals tend to be much more device-friendly. Consider healthcare. Every medical device is a potential attack entry point and it&#8217;s well known how much cyberterrorists love hitting hospitals with ransomware attacks. DNS negates that risk quite effectively.<\/p>\n<p>In today&#8217;s scary environments, how can Security afford to not explore every aspect of DNS analysis?<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the plethora of security tools that most enterprise Security operations use, on top of the various verticals, geographies, and platforms (cloud, remote site, IoT, partner sites, etc.) that need protecting, CISOs are faced with a frustrating reality: some of the threat landscape is well-protected (indeed some are double- and triple-protected) while others have gaping [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":4249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[360,234,406,407],"class_list":{"0":"post-5852","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns-security","9":"tag-iot","10":"tag-ciso","11":"tag-soc","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Security Holes That Only DNS Can Plug<\/title>\n<meta name=\"description\" content=\"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don&#039;t have a track record of having to leverage it. But now they must. It&#039;s not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone&#039;s permission before making those purchases. It took a couple of years before CISOs weighed and said &quot;Whoa! There is a massive difference.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Security Holes That Only DNS Can Plug\" \/>\n<meta property=\"og:description\" content=\"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don&#039;t have a track record of having to leverage it. But now they must. It&#039;s not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone&#039;s permission before making those purchases. It took a couple of years before CISOs weighed and said &quot;Whoa! There is a massive difference.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-14T01:48:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-14T01:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"824\" \/>\n\t<meta property=\"og:image:height\" content=\"583\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"The Security Holes That Only DNS Can Plug\",\"datePublished\":\"2021-01-14T01:48:17+00:00\",\"dateModified\":\"2021-01-14T01:48:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"keywords\":[\"DNS Security\",\"IoT\",\"CISO\",\"SOC\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/\",\"name\":\"The Security Holes That Only DNS Can Plug\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"datePublished\":\"2021-01-14T01:48:17+00:00\",\"dateModified\":\"2021-01-14T01:48:46+00:00\",\"description\":\"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don't have a track record of having to leverage it. But now they must. It's not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone's permission before making those purchases. It took a couple of years before CISOs weighed and said \\\"Whoa! There is a massive difference.\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/sase-blog.jpg\",\"width\":824,\"height\":583,\"caption\":\"Projecting The Future\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-security-holes-that-only-dns-can-plug\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Security Holes That Only DNS Can Plug\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Security Holes That Only DNS Can Plug","description":"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don't have a track record of having to leverage it. But now they must. It's not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone's permission before making those purchases. It took a couple of years before CISOs weighed and said \"Whoa! There is a massive difference.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/","og_locale":"en_US","og_type":"article","og_title":"The Security Holes That Only DNS Can Plug","og_description":"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don't have a track record of having to leverage it. But now they must. It's not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone's permission before making those purchases. It took a couple of years before CISOs weighed and said \"Whoa! There is a massive difference.\"","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/","og_site_name":"Infoblox Blog","article_published_time":"2021-01-14T01:48:17+00:00","article_modified_time":"2021-01-14T01:48:46+00:00","og_image":[{"width":824,"height":583,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"The Security Holes That Only DNS Can Plug","datePublished":"2021-01-14T01:48:17+00:00","dateModified":"2021-01-14T01:48:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","keywords":["DNS Security","IoT","CISO","SOC"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/","name":"The Security Holes That Only DNS Can Plug","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","datePublished":"2021-01-14T01:48:17+00:00","dateModified":"2021-01-14T01:48:46+00:00","description":"The Security Holes That Only DNS Can Plug. One of the reasons that DNS is often overlook by CISOs and SOC teams is corporate history. DNS has typically been handled by the network side of the house so security analysts don't have a track record of having to leverage it. But now they must. It's not dissimilar from how in-house IoT first became such a threat. Consider that IoT lightbulbs and IoT doorlocks had traditionally been purchased by maintenance and facilities\u2014and they had never needed to get anyone's permission before making those purchases. It took a couple of years before CISOs weighed and said \"Whoa! There is a massive difference.\"","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/sase-blog.jpg","width":824,"height":583,"caption":"Projecting The Future"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-security-holes-that-only-dns-can-plug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The Security Holes That Only DNS Can Plug"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5852"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5852\/revisions"}],"predecessor-version":[{"id":5853,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5852\/revisions\/5853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4249"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}