{"id":5921,"date":"2021-03-05T10:51:17","date_gmt":"2021-03-05T18:51:17","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5921"},"modified":"2021-01-21T10:58:51","modified_gmt":"2021-01-21T18:58:51","slug":"iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/","title":{"rendered":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS"},"content":{"rendered":"<p>Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners, and fax machines (remember those?) and today it&#8217;s happening with enterprise IoT lightbulbs, door locks, air conditioners, and thermostats.<\/p>\n<p>But what takes the IoT threat today from merely horrible and promotes it to disastrous is another 2020 network element that is changing the attack landscape: remote sites or, more precisely, the soaring number of remote sites and insecure remote sites at that. And yes, the fact that these remote sites were rushed into existence and therefore sidestepped any reasonable security due diligence doesn&#8217;t help.<\/p>\n<p>These remote sites\u2014the overwhelming majority of them home offices\u2014come with consumer-grade IoT security headaches. Ernst &amp; Young (EY) has labeled IoT <a href=\"https:\/\/urldefense.com\/v3\/__https:\/thecontentfirm.com\/images\/user\/other\/SCMag-IoT-2020-Story.pdf__;!!JYsgTRAg6ZQ!b0WPmywAJJ7JpnmrJPOsfVuZlzFGHkas_dlJ4IFK7vN6mETja6_CopSNtLUd9tGL$\">&#8220;the single largest addition to the enterprise attack surface.&#8221;<\/a> Home IoT that can now ride WiFi to your VPN and into your enterprise networks include IoT-based refrigerators, doorbells, IP cameras and Amazon Echos (\u201cAlexa, download all of my employer\u2019s payroll records\u201d).<\/p>\n<p>On the corporate side, the CISO&#8217;s top IoT Achilles&#8217; heel is a trust in the many manufacturers who create the enterprise IoT devices. But even if those manufacturers are indeed trustworthy, if that manufacturer&#8217;s security is compromised, bad actors can still do their evil with those devices. But on the consumer side, most people don&#8217;t even bother to check into the manufacturer&#8217;s claims, let alone their trustworthiness.<\/p>\n<p>By the way, IoT devices do not necessarily need a corporate or consumer network at all. Some have their own antennae, allowing those IoT devices to work around almost any network defenses\u2014except for DNS tracking.<\/p>\n<p>This is all happening during a time when an enterprise&#8217;s traditional security defenses are crumbling under the weight of the new attack landscapes. Firewall effectiveness, for example, is much lower than it was and, even then, it was still scattered, with one firewall for this IT cloud, one firewall for a LOB private cloud, one for on-prem. That doesn&#8217;t even consider the vast number of shadow IT clouds.<\/p>\n<p>But one defense that not only still works but works even better in this environment is DNS tracking. Security analysts can&#8217;t install endpoint software on IoT\u2014assuming they even knew and had access to all IoT, neither of which is true\u2014but DNS knows exactly what every IoT device is doing. And it provides this complete visibility through a massive pool of forensic data.<\/p>\n<p>DNS security analysis doesn&#8217;t rely on a device being authorized or being known to IT or even being part of an employee&#8217;s household devices (a neighbor&#8217;s IoT can tiptoe in). It simply needs a device to access the Internet, something that all IoT devices do. Some analysts have reported that as many as 90 percent of IoT devices are not known to that company&#8217;s CISO. But with DNS, all IoT devices are detected and tracked.<\/p>\n<p>This is where DNS, DHCP, and IPAM analysis can make a huge difference. Without DHCP data, it\u2019s hard to correlate disparate events related to the same device under investigation, especially in dynamic environments. Without DNS and DHCP, operations teams struggle to accurately identify compromised machines and have limited visibility into what resources that user has been accessing. And without public passive DNS and domain registration data, it&#8217;s difficult to fully understand the scope of adversaries\u2019 malicious infrastructure and link events.<\/p>\n<p>DHCP Discovery is much more effective than traditional network scanning techniques, which can be disruptive and need scheduling. That in turn means that such network scanning data is often out-of-date. Also, DHCP discovery is far more comprehensive, feeding into the IPAM database full characteristics of the device (type of device, OS, version) based on the initial DHCP request, along with username, switch port, access point, physical location, MAC Address, current IP\/historical IPs and locations and other user details. Using DHCP is a much better way to do discovery when compared to traditional network scanning techniques.<\/p>\n<p>Isn&#8217;t it that time that your enterprise reevaluated what it is doing with DNS?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners, and fax machines (remember those?) and today it&#8217;s happening with enterprise [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":4041,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[234,73,360],"class_list":{"0":"post-5921","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-iot","9":"tag-iot-attacks","10":"tag-dns-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS<\/title>\n<meta name=\"description\" content=\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS. Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners and fax machines (remember those?) and today it&#039;s happening with enterprise IoT lightbulbs, door locks, air conditioners and thermostats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS\" \/>\n<meta property=\"og:description\" content=\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS. Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners and fax machines (remember those?) and today it&#039;s happening with enterprise IoT lightbulbs, door locks, air conditioners and thermostats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-05T18:51:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/banner-Cities-Underattacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1471\" \/>\n\t<meta property=\"og:image:height\" content=\"434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS\",\"datePublished\":\"2021-03-05T18:51:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/banner-Cities-Underattacked.jpg\",\"keywords\":[\"IoT\",\"IoT Attacks\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/\",\"name\":\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/banner-Cities-Underattacked.jpg\",\"datePublished\":\"2021-03-05T18:51:17+00:00\",\"description\":\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS. Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners and fax machines (remember those?) and today it's happening with enterprise IoT lightbulbs, door locks, air conditioners and thermostats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/banner-Cities-Underattacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/banner-Cities-Underattacked.jpg\",\"width\":1471,\"height\":434},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS","description":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS. Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners and fax machines (remember those?) and today it's happening with enterprise IoT lightbulbs, door locks, air conditioners and thermostats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/","og_locale":"en_US","og_type":"article","og_title":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS","og_description":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS. Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners and fax machines (remember those?) and today it's happening with enterprise IoT lightbulbs, door locks, air conditioners and thermostats.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/","og_site_name":"Infoblox Blog","article_published_time":"2021-03-05T18:51:17+00:00","og_image":[{"width":1471,"height":434,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/banner-Cities-Underattacked.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS","datePublished":"2021-03-05T18:51:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/"},"wordCount":718,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/banner-Cities-Underattacked.jpg","keywords":["IoT","IoT Attacks","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/","url":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/","name":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/banner-Cities-Underattacked.jpg","datePublished":"2021-03-05T18:51:17+00:00","description":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS. Of the various new challenges of enterprise security in 2020, IoT devices are arguably the more pernicious because they sneakily follow the tradition of every dumb peripheral once it gets start (CPU) and gets an identity (IP Address). It happened with network printers, scanners and fax machines (remember those?) and today it's happening with enterprise IoT lightbulbs, door locks, air conditioners and thermostats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/banner-Cities-Underattacked.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/banner-Cities-Underattacked.jpg","width":1471,"height":434},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-is-a-nightmare-for-security-unless-the-ciso-is-leveraging-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"IoT Is A Nightmare For Security, Unless the CISO Is Leveraging DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5921"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5921\/revisions"}],"predecessor-version":[{"id":5922,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5921\/revisions\/5922"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4041"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}