{"id":8365,"date":"2023-01-05T18:00:54","date_gmt":"2023-01-06T02:00:54","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8365"},"modified":"2023-01-05T18:00:54","modified_gmt":"2023-01-06T02:00:54","slug":"infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/","title":{"rendered":"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents"},"content":{"rendered":"<p>As the COVID era began to play out over the past few years, cybercriminals gleefully embraced ransomware as their preferred malicious attack methodology for monetizing data breaches. How much so? Damages from ransomware alone are expected to <a href=\"https:\/\/iapp.org\/news\/a\/report-ransomware-attacks-on-the-rise-in-2022\/#:~:text=Ransomware%20damages%20are%20expected%20to,2022%20began%20with%20stolen%20credentials.\" target=\"_blank\" rel=\"noopener\">exceed $30 billion worldwide in 2023<\/a>. The actual number of individual attacks rose from approximately 300 million in 2020 to well over 600 million in 2021. But while ransomware as a trend was gaining headlines, the underlying hacking techniques that cybercriminals deploy to effectuate the data breaches that make ransomware attacks possible aren\u2019t always as well understood. That needs to change if IT security organizations are to successfully protect the organization, the brand, users, devices and data going forward.<\/p>\n<p>Consider: according to a recent report from cybersecurity firm Acronis, almost half of all data breaches in 2022 began with stolen credentials. Six hundred malicious email campaigns were launched in the first half of 2022, 58% of which were phishing emails and 28% contained malware. Cybercriminals have shifted toward attacking key entry points on networks that rely on cloud services or seek unpatched or software vulnerabilities to launch attacks. They\u2019re also increasingly relying on techniques and methods including:<\/p>\n<ul>\n<li><strong>Phishing Sites \u2013<\/strong> Criminal websites set up in an attempt to steal user credentials with URLs very similar to the actual web address.<\/li>\n<li><strong>Malicious name servers \u2013<\/strong> A server that provides Authoritative Domain Name Services only for malicious domain names.<\/li>\n<li><strong>Stolen credentials or other content \u2013<\/strong> Stolen corporate proprietary information (e.g., access credentials, personally identifiable information, credit card data), usually found hosted in a forum or a fraudulent host account.<\/li>\n<li><strong>Malware file hosting location \u2013<\/strong> Malware existing on a publicly available site.<\/li>\n<li><strong>Malware command and control (C2) \u2013<\/strong> A host location identified as a C2 server for malware campaigns.<\/li>\n<\/ul>\n<p>The widespread adoption of these techniques points toward a larger trend: Internet fraud. The numbers aren\u2019t available yet, but it appears that ransomware attacks declined somewhat in 2022 as malicious actors sought to diversify into other methods. The general category of Internet fraud can be defined as any type of scheme that uses components of the internet (e.g., chat, email, website) to publish fraudulent solicitations, conduct fraudulent transactions, or transmit proceeds obtained through subterfuge. This shift in tactics means that IT security teams are now finding that breach prevention isn\u2019t always adequate to protect the organization. They also need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage.<\/p>\n<h3>How to Fight Back<\/h3>\n<p>Infoblox Domain Mitigation Services are designed to help businesses stop internet fraud and cyberincidents from impacting their operations. With features such as incident validation, mitigation, monitoring and reporting, Infoblox provides a comprehensive solution to protect your company from data breaches and malicious attacks.<\/p>\n<p>One of the key features of Infoblox Domain Mitigation Services is validation. Our team offers a unique and proprietary human-driven review of potential internet fraud, providing a detailed summary of our in-depth review. We respond quickly to potential incidents, with initial response times of five minutes or less during regular business hours. Once our review is underway, we can typically remove domestic internet fraud within 24 hours.<\/p>\n<p>Once internet fraud or a cyberincident has been confirmed, Infoblox initiates the mitigation process. Our team applies a continuous removal effort to each case, with multiple escalations for cases that cannot be resolved within 24 hours. We leverage our established relationships with ISPs and communication service providers to prioritize your case in abuse queues and ensure the issue is resolved quickly. We also offer registered trademark enforcement to protect your brand reputation.<\/p>\n<p>In addition to our validation and mitigation services, Infoblox also provides monitoring and reporting to keep track of potential threats. If we determine that suspicious activity does not pose a threat, we will continue to monitor the reported web content for potential malicious changes. We also monitor mitigated threats to address potential reactivation, which we will remove at no additional cost to our clients. Our mitigation services remain in effect for up to 30 days.<\/p>\n<p>Infoblox has deep ties to the ISP and communication service provider community, as well as global regulatory agencies. If we determine that criminal activity has taken place, our team is ready to help clients notify local law enforcement and other government agencies when providers fail to address fraud activity.<\/p>\n<p>With Infoblox Domain Mitigation Services, you can protect your business from internet fraud and cyberincidents and get back on track fast. Our team is dedicated to providing the protection you need to keep your business running smoothly. Don&#8217;t let internet fraud and cyberincidents impact your company &#8211; choose Infoblox Domain Mitigation Services today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the COVID era began to play out over the past few years, cybercriminals gleefully embraced ransomware as their preferred malicious attack methodology for monetizing data breaches. How much so? Damages from ransomware alone are expected to exceed $30 billion worldwide in 2023. The actual number of individual attacks rose from approximately 300 million in [&hellip;]<\/p>\n","protected":false},"author":376,"featured_media":8366,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[40,228,792,793,794,795],"class_list":{"0":"post-8365","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-threat-intelligence","9":"tag-bloxone-threat-defense","10":"tag-domain-mitigation-services","11":"tag-internet-fraud","12":"tag-incident-validation","13":"tag-threat-monitoring-and-reporting","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How To Stop Internet Fraud &amp; Cyberincidents From Impacting Operations | Infoblox<\/title>\n<meta name=\"description\" content=\"Security teams need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage. Learn how Infoblox can help in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents\" \/>\n<meta property=\"og:description\" content=\"Security teams need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage. Learn how Infoblox can help in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-06T02:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-08.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Smith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/\"},\"author\":{\"name\":\"Michael Smith\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d5f160c422287b5965aca25941eec86\"},\"headline\":\"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents\",\"datePublished\":\"2023-01-06T02:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/\"},\"wordCount\":771,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-08.jpg\",\"keywords\":[\"Threat Intelligence\",\"BloxOne\u00ae Threat Defense\",\"Domain Mitigation Services\",\"Internet Fraud\",\"Incident Validation\",\"Threat Monitoring and Reporting\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/\",\"name\":\"How To Stop Internet Fraud & Cyberincidents From Impacting Operations | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-08.jpg\",\"datePublished\":\"2023-01-06T02:00:54+00:00\",\"description\":\"Security teams need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage. Learn how Infoblox can help in this article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-08.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-08.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d5f160c422287b5965aca25941eec86\",\"name\":\"Michael Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_376_1672956572-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_376_1672956572-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_376_1672956572-96x96.jpg\",\"caption\":\"Michael Smith\"},\"description\":\"I am a seasoned IT professional with over 20 years of experience in the field. I am currently a Managing Consultant in the Professional Services department at Infoblox, a company that provides network control and automation solutions. In my role at Infoblox, I specialize in leading teams in the development of DDI (DNS, DHCP, and IP Address Management) implementation strategies for large-scale, complex network conversions and migrations. I am skilled in using Python and other UNIX tools to migrate data, identify and document critical success factors, and develop data mapping and transformation methods. I also have experience creating comprehensive implementation plans and performing pre-migration testing and implementation process validation. Throughout my career, I have demonstrated a strong background in network engineering, administration, and support in mixed computing environments. I am known for my solutions-oriented approach and my ability to develop and publish scripts and other tools that simplify the adoption of my company\u2019s products.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-smith\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How To Stop Internet Fraud & Cyberincidents From Impacting Operations | Infoblox","description":"Security teams need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage. Learn how Infoblox can help in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/","og_locale":"en_US","og_type":"article","og_title":"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents","og_description":"Security teams need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage. Learn how Infoblox can help in this article.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/","og_site_name":"Infoblox Blog","article_published_time":"2023-01-06T02:00:54+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-08.jpg","type":"image\/jpeg"}],"author":"Michael Smith","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Smith","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/"},"author":{"name":"Michael Smith","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3d5f160c422287b5965aca25941eec86"},"headline":"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents","datePublished":"2023-01-06T02:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/"},"wordCount":771,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-08.jpg","keywords":["Threat Intelligence","BloxOne\u00ae Threat Defense","Domain Mitigation Services","Internet Fraud","Incident Validation","Threat Monitoring and Reporting"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/","url":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/","name":"How To Stop Internet Fraud & Cyberincidents From Impacting Operations | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-08.jpg","datePublished":"2023-01-06T02:00:54+00:00","description":"Security teams need to be able to uncover incidents that are already underway and mitigate those attacks to limit damage. Learn how Infoblox can help in this article.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-08.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-08.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-domain-mitigation-services-optimized-to-combat-emerging-internet-fraud-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Infoblox Domain Mitigation Services Optimized to Combat Emerging Internet Fraud Incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3d5f160c422287b5965aca25941eec86","name":"Michael Smith","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_376_1672956572-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_376_1672956572-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_376_1672956572-96x96.jpg","caption":"Michael Smith"},"description":"I am a seasoned IT professional with over 20 years of experience in the field. I am currently a Managing Consultant in the Professional Services department at Infoblox, a company that provides network control and automation solutions. In my role at Infoblox, I specialize in leading teams in the development of DDI (DNS, DHCP, and IP Address Management) implementation strategies for large-scale, complex network conversions and migrations. I am skilled in using Python and other UNIX tools to migrate data, identify and document critical success factors, and develop data mapping and transformation methods. I also have experience creating comprehensive implementation plans and performing pre-migration testing and implementation process validation. Throughout my career, I have demonstrated a strong background in network engineering, administration, and support in mixed computing environments. I am known for my solutions-oriented approach and my ability to develop and publish scripts and other tools that simplify the adoption of my company\u2019s products.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-smith\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/376"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8365"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8365\/revisions"}],"predecessor-version":[{"id":8367,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8365\/revisions\/8367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8366"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}