{"id":5919,"date":"2021-02-07T10:42:14","date_gmt":"2021-02-07T18:42:14","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5919"},"modified":"2021-02-17T11:29:36","modified_gmt":"2021-02-17T19:29:36","slug":"dns-privacy-in-the-age-of-zero-trust","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/","title":{"rendered":"DNS Privacy In The Age Of Zero Trust"},"content":{"rendered":"<p>For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is <a href=\"https:\/\/urldefense.com\/v3\/__https:\/developer.apple.com\/videos\/play\/wwdc2020\/10047__;!!JYsgTRAg6ZQ!ehJuPnKHfoWYqTLsCpAwYsmpIhbDe2jkn1vP9NoVZoVaCilvVv-WiMN0XhpCQnEi$\">now pushing DoH and DoT<\/a>, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is <a href=\"https:\/\/urldefense.com\/v3\/__https:\/nakedsecurity.sophos.com\/2020\/05\/15\/microsoft-joins-encrypted-dns-club-with-windows-10-option\/__;!!JYsgTRAg6ZQ!ehJuPnKHfoWYqTLsCpAwYsmpIhbDe2jkn1vP9NoVZoVaCilvVv-WiMN0XqcYAURr$\">pursuing a similar approach<\/a>.<\/p>\n<p>The privacy concerns go beyond strict compliance issues\u2014although EU&#8217;s GDPR considers IP addresses PII and it&#8217;s far from alone among regulators\u2014and deal with the most core elements of privacy. Anyone, from cyberthieves to government bureaucrats and nosey neighbors, can track every domain inquiry and user posts, which is a roadmap to every Web site visited. Of far greater concern is that such individuals could, in theory, interfere with DNS searches and send users elsewhere, potentially to malware-laden sites or even just to ad-supported sites that pay for traffic. For some geographies, this will enable easy government censorship.<\/p>\n<p>In the United States, most businesses and consumers take it for granted that the major carriers have comprehensive browsing history for all who use their services. Given the reality that many companies try and gather sensitive information to sell\u2014or to precisely target users with ads that pay more for fine-tuned focus on desired segments\u2014enterprises need to rethink their DNS strategies immediately.<\/p>\n<p>Even aside from the need to protect customer information, DNS history can reveal what companies are being evaluated for acquisition, imminent terminations, future product plans, and other highly sensitive matters.<\/p>\n<p>That said, protecting DNS data is complicated and is riddled with exceptions. And DNS data privacy compliance issues go beyond the typical regulatory concerns. The U.S. FTC, for example, requires enterprises to strictly adhere to their own published privacy policies and terms of use. If those documents promise confidential browsing activity, those enterprises better have a secure means of conducting DNS inquiries.<\/p>\n<p>Even worse, both Apple&#8217;s and Microsoft&#8217;s encrypted DNS approaches are implemented at the application level. What happens in an enterprise if 140 applications start trying to resolve DNS in 140 different ways? Alternatively, what if an enterprise is using policies to control how devices attach into the network? Imagine the conflicts from having an OS that can bypass functions and an application that is doing exfiltration over the VPN? What about employees accessing hotel or airport WiFis and trying to surf the Web? What can the enterprise do to possibly protect the DNS activity records in those scenarios?<\/p>\n<p>As for complexity, in Apple&#8217;s approaches, enterprise MDMs require profiles to explicitly permit encrypted DNS activity on an enterprise network. From a consumer perspective, what if a parent wants to make sure that parental controls are working properly? Today&#8217;s hodgepodge of different controls means that parents likely have no meaningful insight into how well the app is working.<\/p>\n<p>There is an inherent sadness to the fact that we must protect DNS in this way, given that it&#8217;s initial openness was noble and trusting. It was well known that there was this gaping security hole in DNS, where it could be spoofed, hijacked and tracked\/monitored. Today, alas, enterprises have an obligation to protect all sensitive data, and DNS records absolutely qualify.<\/p>\n<p>It is critical today to manage DNS encryption centrally\u2014or via a trusted third-party\u2014so one set of rules manages all DNS inquiries from anywhere to anywhere. That is just as true for enterprises as it is for carriers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach. The privacy [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":4338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[405,360],"class_list":{"0":"post-5919","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-zero-trust","9":"tag-dns-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Privacy In The Age Of Zero Trust<\/title>\n<meta name=\"description\" content=\"DNS Privacy In The Age Of Zero Trust. For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Privacy In The Age Of Zero Trust\" \/>\n<meta property=\"og:description\" content=\"DNS Privacy In The Age Of Zero Trust. For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-07T18:42:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-17T19:29:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"613\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"DNS Privacy In The Age Of Zero Trust\",\"datePublished\":\"2021-02-07T18:42:14+00:00\",\"dateModified\":\"2021-02-17T19:29:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/\"},\"wordCount\":579,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"keywords\":[\"Zero Trust\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/\",\"name\":\"DNS Privacy In The Age Of Zero Trust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"datePublished\":\"2021-02-07T18:42:14+00:00\",\"dateModified\":\"2021-02-17T19:29:36+00:00\",\"description\":\"DNS Privacy In The Age Of Zero Trust. For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-featured-image.jpg\",\"width\":613,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-privacy-in-the-age-of-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Privacy In The Age Of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Privacy In The Age Of Zero Trust","description":"DNS Privacy In The Age Of Zero Trust. For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"DNS Privacy In The Age Of Zero Trust","og_description":"DNS Privacy In The Age Of Zero Trust. For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/","og_site_name":"Infoblox Blog","article_published_time":"2021-02-07T18:42:14+00:00","article_modified_time":"2021-02-17T19:29:36+00:00","og_image":[{"width":613,"height":343,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"DNS Privacy In The Age Of Zero Trust","datePublished":"2021-02-07T18:42:14+00:00","dateModified":"2021-02-17T19:29:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/"},"wordCount":579,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","keywords":["Zero Trust","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/","name":"DNS Privacy In The Age Of Zero Trust","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","datePublished":"2021-02-07T18:42:14+00:00","dateModified":"2021-02-17T19:29:36+00:00","description":"DNS Privacy In The Age Of Zero Trust. For the vast majority of its existence, DNS has been public by default, but renewed concerns about privacy have forced changes. Apple is now pushing DoH and DoT, which both allow devices to make DNS inquiries encrypted and to choose a trusted DNS server for most queries. Microsoft is pursuing a similar approach.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-featured-image.jpg","width":613,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-privacy-in-the-age-of-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS Privacy In The Age Of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5919"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5919\/revisions"}],"predecessor-version":[{"id":6033,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5919\/revisions\/6033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4338"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}