{"id":7969,"date":"2022-09-06T08:46:27","date_gmt":"2022-09-06T15:46:27","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7969"},"modified":"2022-10-26T14:47:33","modified_gmt":"2022-10-26T21:47:33","slug":"beyond-security-dns-is-a-cost-cutter","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/","title":{"rendered":"Beyond Security, DNS is a Cost-Cutter"},"content":{"rendered":"<p>DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all. In truth, given the reality of the threat environment, DNS can save money, accelerate blocking attacks and defend against a wide range of DNS-specific attacks that can\u2019t be blocked any other way.<\/p>\n<p>Let\u2019s start with cost reduction. Deployed properly, a DNS defense will block attacks at the DNS level, long before other areas of the enterprise environment are touched. That means fewer attacks for the firewall and other traditional defenses to fight. When the volume drops low enough, we have seen IT teams be able to repurpose some of their hardware firewalls as replacement units. In other words, by taking the load off of devices and applications, depending on how those systems charge, the ROI and cost-savings are quite real.<\/p>\n<p>Anthony James, a VP for product marketing at Infoblox, said that he sees that kind of load reduction often.<\/p>\n<h3>THE MAGIC OF DNS COST-SAVINGS<\/h3>\n<p>\u201cI get a DNS query going to a DNS server. If the DNS server says, \u2018You know what? Where you\u2019re going is bad. I\u2019m not going to give you the address to contact.\u2019 That means my firewall never saw it. My cloud security platform never saw it. \u201d James said during a recent podcast. \u201cI\u2019ve now saved a bunch of cycles by eliminating problematic network traffic\u201d.  In addition, I may be able to avoid overage charges from my cloud security platform.  \u201cI\u2019ve also reduced my firewall (load) because it reduced the burden of having to send traffic.\u201d<\/p>\n<p>Bob Hansmann, an Infoblox senior product marketing manager who was on that same podcast, said the nature of those other networking security mechanisms is what fuels this cost-savings.<\/p>\n<p>\u201cWhen they start doing more and more on that box, now it\u2019s going to be built for maximum I\/O. It\u2019s going to be built for maximum CPU analysis, maximum amount of RAM to cache things to be analyzed. They get very expensive,\u201d Hansmann said. \u201cI recall a company that had a rack of firewalls when they started blocking at the DNS level. Their load was so low, they said \u2018Hey, guess what? We got a couple of brand-new cold spares.\u2019 There was hardly any malware to analyze anymore.\u201d<\/p>\n<p>James agreed. <\/p>\n<p>\u201cWe all know that with firewalls, the size is based on how much traffic it can  handle. If we say that the top 5 percent (of the traffic) is malicious, a firewall has to do more work to process that because it\u2019s inspecting the traffic. But let\u2019s say I took that 5 percent and the DNS said \u2018You know what? I\u2019m not even going to send it to the firewall.\u2019 Now my processing is down,\u201d James said. \u201cThe more you can process at the DNS layer, that saves a firewall from having to accept the request in the first place. You\u2019ve just saved resources on the firewall. I don\u2019t have to upgrade it later. Or I can decommission a firewall because I\u2019ve saved so much traffic and use it as a spare.\u201d<\/p>\n<h3>BAD GUYS TAKE ADVANTAGE OF THE FACT THAT HARDLY ANYONE WATCHES THE DNS SPACE CAREFULLY<\/h3>\n<p>The sad truth is that attackers tend to be better financed than defenders (CISO teams), have more patience than defenders and are often better at watching their opponents than CISO teams are.<\/p>\n<p>Case in point: the DNS space still has elements of the Wild West, with hardly anyone truly watching what is going on. As James has said, \u201cNo one really inspects the content of a DNS query. They just assume that it\u2019s a valid query.\u201d<\/p>\n<p>Once the bad guys figured that out, they started launching a wide range of attacks in the DNS space, disguising their attacks as innocuous queries. <\/p>\n<p>Many years ago, when the Internet was in its infancy, it may have been possible to access services via static IP addresses, but that is no longer feasible. \u201cWe have all these other fancy tools that do load balancing and things like that. And there are services that rely heavily on a domain name versus a static IP address,\u201d James said. \u201cAttackers are leveraging DNS as this kind of open communication channel, because no one checks it. Firewalls, proxies, advanced malware detection tools, CASBs look at DNS as just a way to translate something from a good name that we can remember to an IP address. But the attackers have realized that they can start sending command and control communications through the DNS channel because no one cares. It\u2019s become this open channel of misuse that needs to be protected.\u201d<\/p>\n<p>And that situation can get a lot worse.<\/p>\n<p>\u201cIf I\u2019m an attacker, I\u2019ve now got this open channel of communication to my endpoints that I\u2019m controlling. So, I can either send commands or I can take data out and I can do whatever I need to do. Using DNS is like a party line. For an attacker, this is fantastic. I can get in. I can do what I want,\u201d James argued. \u201cNow as an enterprise, if you want to protect yourself, well, let\u2019s start doing some stuff on DNS. Now we\u2019ve compounded the issue because the standards bodies have said, you know what, DNS should be protected because if you see a DNS query on the open, you can kind of assume where people are traveling and that creates some privacy issues. So, let\u2019s implement DNS over TLS or DNS over HTTPS. So now that channel is not only open to the attackers, it is now encrypted from inside the network. So, the endpoint that got infected is now using DNS over HTTPS on TCP port 443. So the traffic is encrypted all the way out to wherever the attacker wants it to go and you as an enterprise are now blind to the fact that this channel is open.\u201d James went on to point out that just using a static list of known bad domains is no longer sufficient. What is required to keep up with attackers is to have visibility into this communication channel and to apply AI and machine learning. Attackers continue to increase the sophistication of their attacks, trying to spread traffic across multiple different domain names or other \u201csophisticated DNS manipulation to get around threat intel.\u201d<\/p>\n<h3>SPEED IS CRITICAL WHEN DEFENDING AGAINST AN ACTIVE ATTACK, AND DNS WILL SEE THE ATTACK FIRST.<\/h3>\n<p>A fact of modern-day cybersecurity is that when an enterprise is under an active attack, speed is essential. You only have X minutes to learn everything you can about the attack, decide what to do and try and do it before the attackers can complete their evil plan.<\/p>\n<p>The beauty of a DNS defense is that, due to the very nature of DNS, it is the earliest point where an attack can be detected and blocked. That buys the SOC valuable minutes to do what they have to do.<\/p>\n<p>\u201cEvery device on the network, if it has to communicate to an outside entity, requires DNS, and this is the absolute pure value of DNS as a security control because it\u2019s a giant blanket over everything. We always talk about computers, servers, laptops, smart devices, phones and iPads, and so forth. They all use DNS as they browse different types of outside locations.\u201d \u201cThink about an IoT device: a thermostat, an ATM going to a management platform uses IP communications and DNS, OT technology even though the OT might be a particular protocol like SCADA, the management platform is probably IP and is going to [use] DNS. What do you do for this particular type of unique infrastructure?\u201d James said. \u201cThey\u2019re all going to use a centralized DNS infrastructure.\u201d \u201cIt\u2019s such an easy process where you can say \u2018Well, I already have DNS configured.\u2019\u201d \u201cYou just add some additional intelligence on that, or you have that redirect to another DNS server that has the intelligence, you\u2019re done for everything on your network.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all. In truth, given the reality of the threat environment, DNS can save money, accelerate blocking attacks and defend against a wide range of DNS-specific attacks that can\u2019t be blocked any other [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":7110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,360,16,201,32,413,252,407,754],"class_list":{"0":"post-7969","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dns-security","10":"tag-infoblox","11":"tag-firewall","12":"tag-malware","13":"tag-dot","14":"tag-doh","15":"tag-soc","16":"tag-port-53","17":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Beyond Security, DNS is a Cost-Cutter | Infoblox<\/title>\n<meta name=\"description\" content=\"DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond Security, DNS is a Cost-Cutter\" \/>\n<meta property=\"og:description\" content=\"DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-06T15:46:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-26T21:47:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"Beyond Security, DNS is a Cost-Cutter\",\"datePublished\":\"2022-09-06T15:46:27+00:00\",\"dateModified\":\"2022-10-26T21:47:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/\"},\"wordCount\":1360,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"keywords\":[\"DNS\",\"DNS Security\",\"Infoblox\",\"Firewall\",\"Malware\",\"DoT\",\"DoH\",\"SOC\",\"Port 53\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/\",\"name\":\"Beyond Security, DNS is a Cost-Cutter | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"datePublished\":\"2022-09-06T15:46:27+00:00\",\"dateModified\":\"2022-10-26T21:47:33+00:00\",\"description\":\"DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"width\":612,\"height\":350,\"caption\":\"Automatic software technology system for efficient work with the most advanced technology, business process concepts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/beyond-security-dns-is-a-cost-cutter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Beyond Security, DNS is a Cost-Cutter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Beyond Security, DNS is a Cost-Cutter | Infoblox","description":"DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/","og_locale":"en_US","og_type":"article","og_title":"Beyond Security, DNS is a Cost-Cutter","og_description":"DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/","og_site_name":"Infoblox Blog","article_published_time":"2022-09-06T15:46:27+00:00","article_modified_time":"2022-10-26T21:47:33+00:00","og_image":[{"width":612,"height":350,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"Beyond Security, DNS is a Cost-Cutter","datePublished":"2022-09-06T15:46:27+00:00","dateModified":"2022-10-26T21:47:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/"},"wordCount":1360,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","keywords":["DNS","DNS Security","Infoblox","Firewall","Malware","DoT","DoH","SOC","Port 53"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/","url":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/","name":"Beyond Security, DNS is a Cost-Cutter | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","datePublished":"2022-09-06T15:46:27+00:00","dateModified":"2022-10-26T21:47:33+00:00","description":"DNS is the Rodney Dangerfield of network security. DNS is typically viewed as a fine method for a post-incident investigation, but that\u2019s about all.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","width":612,"height":350,"caption":"Automatic software technology system for efficient work with the most advanced technology, business process concepts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/beyond-security-dns-is-a-cost-cutter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Beyond Security, DNS is a Cost-Cutter"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7969"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7969\/revisions"}],"predecessor-version":[{"id":8217,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7969\/revisions\/8217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7110"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}