{"id":7249,"date":"2021-11-14T11:21:24","date_gmt":"2021-11-14T19:21:24","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7249"},"modified":"2021-11-02T11:58:15","modified_gmt":"2021-11-02T18:58:15","slug":"in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/","title":{"rendered":"In Today&#8217;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical"},"content":{"rendered":"<p>The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, and what they were trained for.<\/p>\n<p>This change has meant that many long-trusted security tools (especially VPNs and SIEMs) are much less effective and security executives need to find replacements. Or do they? One area where enterprise security executives have routinely under-utilized existing resources is DNS tracking. By leveraging the DNS records that every company already uses, just about every interaction can be tracked, analyzed and, when needed, blocked. DNS doesn&#8217;t care whether the dataflow is headed into on-prem (which may or may not exist much longer), the cloud, to a remote site or in between different remote sites. In short, DNS tracking is impervious to the massive change implications of this 90-10 reversal and can deliver far better security than many CISOs realize.<\/p>\n<p>But this goes far beyond Authenticated DHCP. Enterprises in recent years have grown sloppy, partially due to Shadow IT (which does a lot more damage than merely spinning up hidden cloud accounts) and lax enforcement of governance rules. Mobile devices, for example, do not routinely use their enterprise&#8217;s corporate directory service. Some enterprises find themselves using multiple DNS from different sources\u2014which undercuts the centralized security that aggressively-used DNS can deliver. Companies need that birds&#8217; eye view of who is accessing what, when and how.<\/p>\n<p>So what <em>is<\/em> the path to better enterprise security via leveraging DNS, DHCP and IPAM for threat containment and security operations? The biggest initial hurdle is keeping up with the volume of alerts. Although that sounds like a very familiar age-old issue\u2014partially because, well, it is\u2014it is far worse in the era of COVID-19. With this 90-10 flip comes the sobering reality that the number of initially-unrecognized contact attempts is several orders of magnitude higher than they were as recently as February 2020.<\/p>\n<p>This is severely aggravated by the fact that enterprises were forced to rush these remote sites, pushing out sometimes more than 100,000 new remote sites in a few days, instead of the typical month or multiple months. And, yes, this was typically done with no additional budget (and sometimes done with budget cuts). In short, far more of these new dataflow contacts are going to be initially unrecognized. This is why attackers are having a field day, squeezing out as many attacks as they can before enterprise CISOs update their defense strategies to match their new environment. This is where DNS, DHCP and IPAM analysis can make a huge difference.<\/p>\n<p>Consider: Some 91 percent of malware relies on DNS as a control plane. Phishing attacks, the prelude to other attacks especially ransomware, may start with email or a text, but it can&#8217;t do much damage before encountering DNS. Even D-DOS attacks have to start with DNS and DNS is the ideal data source for anomaly based (zero day) threat detection leveraging machine learning and other forms of AI.<\/p>\n<p>Enterprises already use a wide range of threat feeds, but a properly managed DNS global threat feed can prove to be not only more effective but also far more all-encompassing, both in terms of the extensive and current nature of its data as well as the number of security defenses (network access controls, firewalls, SIEM, APT\/malware detection, etc.) it supports and defends.<\/p>\n<p>Without DHCP data, it\u2019s hard to correlate disparate events related to the same device under investigation especially in dynamic environments. Without DNS and DHCP, operations teams struggle to accurately identify compromised machines and have limited visibility into what resources that user has been accessing. And Without public passive DNS and domain registration data, it&#8217;s difficult to fully understand the scope of adversaries\u2019 malicious infrastructure and link events.<\/p>\n<p>Remember that there are many attacks that are specifically written to ride DNS and to explicitly sidestep threat intelligence defenses. Those attacks can be thwarted, but only by deeply analyzing DNS data. After increased cloud and remote sites, the biggest change to the security environment is IoT attacks. (Note that there is some overlap here with those new remote sites, as they are specifically opening the door to attacks leveraging consumer-grade IoT that try and travel through the VPN to corporate systems.) DNS is a common denominator for IP-connected IoT devices, which means that profiling based on DNS activity can provide early warnings of IoT-fueled compromise attempts.<\/p>\n<p>As enterprises today are being forced to both do-more-with-less as well as finding new ways to defend against a sharply-different attack surface, re-exploring your DNS capabilities is a highly attractive course.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":1149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[189,406,590,30,234],"class_list":{"0":"post-7249","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cybersecurity","9":"tag-ciso","10":"tag-enterprise-security","11":"tag-dns","12":"tag-iot","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>In Today&#039;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical<\/title>\n<meta name=\"description\" content=\"In Today&#039;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical. The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, what they were trained for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In Today&#039;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical\" \/>\n<meta property=\"og:description\" content=\"In Today&#039;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical. The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, what they were trained for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-14T19:21:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"In Today&#8217;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical\",\"datePublished\":\"2021-11-14T19:21:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/\"},\"wordCount\":812,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"keywords\":[\"Cybersecurity\",\"CISO\",\"Enterprise security\",\"DNS\",\"IoT\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/\",\"name\":\"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"datePublished\":\"2021-11-14T19:21:24+00:00\",\"description\":\"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical. The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, what they were trained for.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"In Today&#8217;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical","description":"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical. The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, what they were trained for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/","og_locale":"en_US","og_type":"article","og_title":"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical","og_description":"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical. The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, what they were trained for.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/","og_site_name":"Infoblox Blog","article_published_time":"2021-11-14T19:21:24+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"In Today&#8217;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical","datePublished":"2021-11-14T19:21:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/"},"wordCount":812,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","keywords":["Cybersecurity","CISO","Enterprise security","DNS","IoT"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/","url":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/","name":"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","datePublished":"2021-11-14T19:21:24+00:00","description":"In Today's Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical. The enterprise security world changed forever in March 2020, with almost all enterprises flipping from 90 percent of people and information flow happening inside to 90 percent (or more) happening outside. The implications of this, coupled with sharp increases in cloud and IoT, has forced CISOs to deal with an environment completely different than what they are used to, what they were trained for.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","width":660,"height":454,"caption":"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/in-todays-sharply-different-enterprise-security-environment-additional-dns-analysis-may-prove-critical-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"In Today&#8217;s Sharply Different Enterprise Security Environment, Additional DNS Analysis May Prove Critical"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7249"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7249\/revisions"}],"predecessor-version":[{"id":7251,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7249\/revisions\/7251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1149"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}