{"id":7732,"date":"2022-05-17T15:15:07","date_gmt":"2022-05-17T22:15:07","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7732"},"modified":"2022-05-17T15:15:07","modified_gmt":"2022-05-17T22:15:07","slug":"dns-security-the-new-white-paper-from-dark-reading-and-infoblox","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/","title":{"rendered":"DNS Security: The New White Paper from Dark Reading and Infoblox"},"content":{"rendered":"<p>We were excited to publish a new white paper with Dark Reading earlier this spring that provides an in-depth overview of the state of DNS security, and why it\u2019s a topic that has moved to the center of the cyber security conversation. <a href=\"\/security\/advanced-persistent-threat-cyber-tools-targeting-industrial-control-systems-and-scada-devices\/\"><strong>Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal<\/strong><\/a> is a collection of articles, originally published in Dark Reading, that outline the proliferating threats targeting the domain name system (DNS). It also gets to the heart of the DNS technologies, techniques and best practices that security teams are deploying to better protect users and network infrastructure from malicious attacks.<\/p>\n<p>The goal of proactive DNS-layer security\u2014such as using DNS data to mitigate threats that other defenses may miss\u2014is to block threats before they hit the enterprise network or endpoints. In recent years, as DNS attacks have proliferated, there have been several important technological advances that are helping organizations significantly strengthen their overall security posture.<\/p>\n<p>The first, eponymous, article in the paper\u2014authored by longtime Dark Reading writer and editor Jai Vijayan\u2014looks at how phishing, malware, and ransomware attacks routinely exploit techniques like DNS beaconing to communicate with C2 servers and DNS tunneling to covertly deliver payloads and exfiltrate data from enterprise networks. To hide phishing and malware-hosting sites, threat actors often use domain-generation algorithms and DNS fast-flux (rapidly swapping out IP addresses associated with a domain) to churn out new domain names faster than static enterprise blocking tools can keep up.<\/p>\n<p>These types of attacks have become so commonplace in recent years, that a survey that analyst firm IDC conducted last year found 87% of organizations had experienced a DNS attack \u2014 mainly phishing, malware, and distributed denial-of-service (DDoS) \u2014 over the previous 12 months. Seventy-six percent of respondents viewed DNS security as critical to their threat mitigation efforts.<\/p>\n<p>Vijayan cites John Yeoh, global vice president of research at the Cloud Security Alliance (CSA), saying that \u201cas enterprises become more Internet-facing and cloud becomes the dominant form of computing, DNS is the front line for accessing data and information.\u201d<\/p>\n<p><strong>DNS Name Server Hijack Attack Exposed Businesses, Government Agencies<\/strong><br \/>\nThe second piece in the paper, from Kelly Jackson Higgins, Editor-in-Chief at Dark Reading, recounts how security researchers at Wiz.io found a \u201cnovel\u201d class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings. With one simple registration step, they were able to set up a fake DNS instance that collected sensitive information on dozens of corporate and government customers.<\/p>\n<p>All told, they got traffic from more than 15,000 different AWS customers and a million endpoint devices, all after registering a phony AWS name server as ns-852.awsdns-42. net, the same name as an actual AWS name server. The attack took advantage of a gray area in the DNS infrastructure: an unintended and unexpected consequence of the combination of traditional, old-school DNS technology on some Windows machines and today\u2019s cloud DNS service features. Traditional DNS client software is old\u2014some of which was written 20 years ago \u2014 and not built for cloud-based enterprise infrastructures, but instead for trusted internal enterprise domains.<\/p>\n<p>The researchers say they can\u2019t confirm whether any attackers employed this weakness in the DNS, but they sounded the alarm that it could also exist in other DNS providers\u2019 services. \u201cIt\u2019s important for all DNS providers\u201d to ensure they\u2019re not leaving their customers exposed via this vulnerable DNS setup, said Ami Luttwak, co-founder and CTO of Wiz.io as well as a former member of Microsoft\u2019s cloud security team.<\/p>\n<p><strong>Researchers Connect Complex Specs to Software Vulnerabilities<\/strong><br \/>\nThe third article in the paper takes a look at six common mistakes in implementing network software that have led to scores of vulnerabilities, highlighting the impact that complex design requirements and ambiguous specifications can have on software security. Written by Dark Reading Contributing Writer Rob Lemos, the piece recounts a presentation by two security researchers who spoke at 2021\u2019s Black Hat Asia conference: Daniel dos Santos from Forescout and Shlomi Oberman from security consultancy JSOF.<\/p>\n<p>\u201cBecause of the complexity of the DNS specification, vulnerability types that we have known about for 20 years are appearing in implementations of network stacks,\u201d explained dos Santos. \u201cThe more complex the software or protocol gets, the more difficult the protocol is to implement, so we need to make them as least complex as possible, which is not always possible.\u201d<\/p>\n<p><strong>Newer Generic Top-Level Domains a Security \u2018Nuisance\u2019<\/strong><br \/>\nThe fourth piece, also written by Jai Vijayan, is based on an examination of ten years of passive DNS data, which showed that the of the Internet\u2019s top-level domains (TLDs)\u2014for instance, \u201c.com\u201d and .org\u201d\u2014many newer TLDs may present more of a security nuisance for organizations than anything else.<\/p>\n<p>From a security perspective, one concern with the growth in the number of TLDs over the past few years is that attackers have more opportunities for spoofing domains for phishing, cybersquatting, and other malicious activities. For instance, by registering a popular brand\u2019s domain name on a newer generic TLD and sending phishing emails from there, an attacker might have more success in getting victims to part with credentials and other sensitive information. In a 2019 Proofpoint study, nearly 96% of organizations found an exact match of their brand-owned domain on other TLDs.<\/p>\n<p><strong>See More, Secure More, with DNS<\/strong><br \/>\nThe final article in the paper, authored by Infoblox\u2019s Krupa Srivatsan, posits that security teams should be treating DNS as one of the key tools for getting full visibility over what they have in their network and what is happening on their network. She points out that next-gen firewalls, email security, endpoint security, and Web gateways are all crucial defense-in-depth tools to protect against various threat vectors. However, there are still gaps and open doors that allow attackers to infiltrate networks, propagate laterally, and steal data.<\/p>\n<p>The Domain Name System is critical network infrastructure that\u2019s needed for online connectivity. In fact, most malware, including ransomware, also relies on DNS for connecting to their command-and-control (C2) servers to download encryption software and other malicious tools onto the compromised device. And they can use DNS to exfiltrate data as well, bypassing DLP and other data defenses. The fact that many security tools don\u2019t inspect DNS is unfortunate as it provides attackers a \u201cfree ride\u201d to evade existing security defenses and carry out their campaigns.<\/p>\n<p>Knowing what\u2019s on the network is the first step toward protecting what\u2019s on the network. In today\u2019s world of physical data centers, multi-cloud deployments, direct-to-Internet branches, BYOD and IoT\/OT systems, full visibility seems almost a utopian concept. But there are network assets you already own that can help provide you with that visibility. You guessed right: DNS, along with DHCP and IP address management (IPAM) referred to collectively as DDI.<\/p>\n<p>The DHCP server can identify system characteristics, such as device type, MAC address and OS version, while IPAM maintains this data along with extensive metadata that it can collect from other sources, providing a single, on-demand resource for networking and security teams.. And real-time network discovery functions provide a valuable secondary device detection and data collection service to keep the IPAM data as complete and accurate as possible.<\/p>\n<p>This information becomes super critical for threat investigation or incident response because of the context it can provide about the users and devices involved. Moreover, DNS provides a trail of evidence of threat activity to tell you exactly what a given asset has been doing in the last hour, day, week, or month, which can be invaluable in a world where breaches can often be measured in months.<\/p>\n<p>So, whether your goal is seeing and stopping more highly evasive threat activity, or speeding investigation and response, you own it to yourself to <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/understanding-dns-threats-and-how-to-use-dns-to-expand-your-cybersecurity-arsenal\" target=\"_blank\" rel=\"noopener\"><strong>take a look at what DNS and other core network services have to offer<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We were excited to publish a new white paper with Dark Reading earlier this spring that provides an in-depth overview of the state of DNS security, and why it\u2019s a topic that has moved to the center of the cyber security conversation. Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal [&hellip;]<\/p>\n","protected":false},"author":334,"featured_media":7743,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,360],"class_list":{"0":"post-7732","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dns-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expanding Cybersecurity Effectiveness Through DNS Security | Infoblox<\/title>\n<meta name=\"description\" content=\"The goal of protective DNS is to block threats before they hit your network or endpoints. Learn how DNS security can stop threats other defenses may miss.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Security: The New White Paper from Dark Reading and Infoblox\" \/>\n<meta property=\"og:description\" content=\"The goal of protective DNS is to block threats before they hit your network or endpoints. Learn how DNS security can stop threats other defenses may miss.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-17T22:15:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-dark-reading.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"514\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Hansmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hansmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/\"},\"author\":{\"name\":\"Bob Hansmann\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\"},\"headline\":\"DNS Security: The New White Paper from Dark Reading and Infoblox\",\"datePublished\":\"2022-05-17T22:15:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/\"},\"wordCount\":1318,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-dark-reading.jpg\",\"keywords\":[\"DNS\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/\",\"name\":\"Expanding Cybersecurity Effectiveness Through DNS Security | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-dark-reading.jpg\",\"datePublished\":\"2022-05-17T22:15:07+00:00\",\"description\":\"The goal of protective DNS is to block threats before they hit your network or endpoints. Learn how DNS security can stop threats other defenses may miss.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-dark-reading.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-dark-reading.jpg\",\"width\":514,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Security: The New White Paper from Dark Reading and Infoblox\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\",\"name\":\"Bob Hansmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"caption\":\"Bob Hansmann\"},\"description\":\"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-hansmann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expanding Cybersecurity Effectiveness Through DNS Security | Infoblox","description":"The goal of protective DNS is to block threats before they hit your network or endpoints. Learn how DNS security can stop threats other defenses may miss.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/","og_locale":"en_US","og_type":"article","og_title":"DNS Security: The New White Paper from Dark Reading and Infoblox","og_description":"The goal of protective DNS is to block threats before they hit your network or endpoints. Learn how DNS security can stop threats other defenses may miss.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/","og_site_name":"Infoblox Blog","article_published_time":"2022-05-17T22:15:07+00:00","og_image":[{"width":514,"height":330,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-dark-reading.jpg","type":"image\/jpeg"}],"author":"Bob Hansmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Hansmann","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/"},"author":{"name":"Bob Hansmann","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8"},"headline":"DNS Security: The New White Paper from Dark Reading and Infoblox","datePublished":"2022-05-17T22:15:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/"},"wordCount":1318,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-dark-reading.jpg","keywords":["DNS","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/","name":"Expanding Cybersecurity Effectiveness Through DNS Security | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-dark-reading.jpg","datePublished":"2022-05-17T22:15:07+00:00","description":"The goal of protective DNS is to block threats before they hit your network or endpoints. Learn how DNS security can stop threats other defenses may miss.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-dark-reading.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-dark-reading.jpg","width":514,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-the-new-white-paper-from-dark-reading-and-infoblox\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS Security: The New White Paper from Dark Reading and Infoblox"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8","name":"Bob Hansmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","caption":"Bob Hansmann"},"description":"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-hansmann\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/334"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7732"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7732\/revisions"}],"predecessor-version":[{"id":7733,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7732\/revisions\/7733"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7743"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}