{"id":8689,"date":"2023-05-08T05:55:13","date_gmt":"2023-05-08T12:55:13","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8689"},"modified":"2023-08-23T10:32:19","modified_gmt":"2023-08-23T17:32:19","slug":"the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/","title":{"rendered":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises"},"content":{"rendered":"<p>It\u2019s no longer a question of if a cyber security attack will hit; but when. Companies need to do everything they can to keep a serious \u201cwhen\u201d from ever happening. In fact, in today\u2019s digitally dependent world, midsize enterprises across all industries receive hundreds of security alerts daily, of which only a small percentage can be investigated\u2014and only if security teams have the right security tools and staffing levels. The worst part? According to Gartner research, in 2021, only 5% of a midsize enterprise\u2019s IT spend was allocated to security\u20265%!<\/p>\n<p>Do you see the problem here? SecOps teams at midsize enterprises face an overwhelming amount of cyber threats to monitor with limited resources to address them. They are also hamstrung by siloed network and security tools that don\u2019t share full visibility and data. All of this is being managed by small SecOps teams which leads to burnout and job dissatisfaction. As if those concerns weren\u2019t enough, companies, when compromised, are getting hit with an average cost per data breach of $4 million.<sup>1<\/sup> We are talking about some serious repercussions here.<\/p>\n<p>How do midsize companies fall victim to cyber threats in the first place? Here\u2019s a look at how an attack cycle works from a kill chain perspective:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-8690 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-blog-attack-cycle-overview.jpg\" alt=\"\" width=\"981\" height=\"537\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-attack-cycle-overview.jpg 981w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-attack-cycle-overview-300x164.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-attack-cycle-overview-768x420.jpg 768w\" sizes=\"auto, (max-width: 981px) 100vw, 981px\" \/><\/p>\n<p>Typically the attacker creates a malicious payload in what\u2019s called the \u201cweaponization stage,\u201d and delivers the payload to a target, often through a spear-phishing email. When a user clicks on the link, the device requests a connection to the Internet location, and the lookup is done via the DNS server. Then, network security devices, such as next-gen firewalls and web gateways, process the traffic and establish the connection. Once the connection is established, the payload is downloaded and executed on the target device. This is how the malware inserts itself into an environment. After creating a foothold, the attacker can now remotely control the device via command and control (C&amp;C), move laterally, and finally carry out their intended goals such as data exfiltration.<\/p>\n<p>What\u2019s a resource-strapped midsized enterprise company to do? The answer is simple, ease the burden on perimeter defenses by utilizing a DNS-based security solution to \u201cshift left,\u201d and stop attacks at the beginning of the attack cycle, not after, when it is too late.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-8691 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-blog-security-through-dns.jpg\" alt=\"\" width=\"970\" height=\"507\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-through-dns.jpg 970w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-through-dns-300x157.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-through-dns-768x401.jpg 768w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/p>\n<p>The smartest way to disrupt the entire kill chain is to shut it down at the very outset\u2014at the point a device attempting to reach a malicious destination makes the initial lookup request to a DNS server. Using DNS as a first line of defense prevents resolution to a malicious domain at the beginning of the connection path\u2014before those requests even reach next-gen firewalls, web proxies, and gateways. In cybersecurity, this concept is known as \u201cshifting left,\u201d moving defense measures to the left in the connection path.<\/p>\n<p>Leveraging DNS for cybersecurity is critical when you consider that 92 percent of cyber attacks rely on DNS in their execution, according to the United States National Security Agency (NSA). And yet, according to IDC, only 42 percent of organizations are protected at the DNS layer.<\/p>\n<p>There\u2019s no doubt DNS is an essential network service. It is required for every device, including managed and unmanaged devices, and it spans the entire organization. As you can see in the above graphic, DNS-based security stops potential attacks sooner, taking the burden off security tools further down the line. As such, it is a vital component of defense-in-depth cybersecurity. Plus, DNS security can also include proactive machine learning (ML)-based threat hunting, which exposes DNS-based threats other security solutions would miss. This capability frees each security tool to do what it is designed to do in the most efficient way possible.<\/p>\n<p>But let\u2019s back it up a moment and discuss what a defense-in-depth strategy is and why it matters to midsized enterprises.<\/p>\n<h3>Defense in Depth and DNS<\/h3>\n<p>If yours is a midsize enterprise, implementing defense in depth is crucial for protecting against cyber threats. As your business grows, so do the risks you face. Hackers and cybercriminals often target midsize enterprises for two reasons. First, because they have valuable data. And second, because these enterprises often lack the security protections larger organizations can deploy. As such, hackers view midsized enterprises as \u201ceasy\u201d targets.<\/p>\n<p>Defense in depth is a cybersecurity strategy that uses multiple layers of security to protect against cyber threats. The idea is to combine different security measures to make it more difficult for attackers to breach your network and steal your data. Traditionally, security layers often include firewalls, intrusion detection and prevention systems (IDS\/IPS), antivirus software, etc. I\u2019m advocating for the inclusion of an additional security layer to your security stack: DNS detection and response. This security layer does what other layers cannot\u2014it blocks a wide range of malware, ransomware, APTs, and other cyber threats from the start, at the initial DNS query. Moreover, it automatically bolsters protection for midsized organizations with limited staff, budget, and security expertise.<\/p>\n<p>Defenses that make use of DNS detection and response are readily deployable. If you have a network, you already have DNS in place. Since every device on your network relies on your DNS infrastructure, why not use DNS-layer security to deepen your defense in depth with every device interaction? Doing so imparts the following benefits:<\/p>\n<ul>\n<li><strong>Reduced load on downstream security devices\u2014<\/strong>Increase capacity, extend life, and improve ROI on a manageable set of security tools.<\/li>\n<li><strong>Increase staff productivity\u2014<\/strong>DNS Detection and Response approaches provide robust capabilities to speed up response to threats and make SecOps more productive.<\/li>\n<li><strong>Reduce security alerts to SecOps and SIEMs\u2014<\/strong>Lower SIEM costs while increasing SecOps efficiency with fewer alerts and false positives<\/li>\n<li><strong>Protect all, not just some, devices\u2014<\/strong>Every device uses DNS to resolve destinations before communicating, thus blocking malicious threats before they have a chance to enter the network.<\/li>\n<li><strong>Simplify Regulatory Compliance and Audits\u2014<\/strong>DNS-layer security fills existing gaps in risk assessment, security monitoring, and detection processes that are critical functions in meeting compliance and audit requirements.<\/li>\n<\/ul>\n<h3>Don\u2019t Forget About Employee Training<\/h3>\n<p>Adding DNS detection and response to your defense-in-depth strategy is a significant step forward, but security awareness training is another component to address. Employees can play a role in an organization&#8217;s security plan. Educating your employees about cybersecurity best practices is essential to reduce the risk of human error. Of course, we are human, and we all make mistakes. Having a baseline awareness of threats can help alleviate common errors.<\/p>\n<p>To implement an employee cybersecurity education program:<\/p>\n<ul>\n<li>Develop training that covers topics such as password security, phishing, and social engineering.<\/li>\n<li>Conduct regular training sessions, or at least send email or Slack summaries, to keep your employees up-to-date on the latest security threats and best practices.<\/li>\n<li>Encourage your employees to report any security incidents or suspicious activity before they click.<\/li>\n<li>Test your employees&#8217; knowledge of cybersecurity best practices through simulated phishing attacks.<\/li>\n<\/ul>\n<p>Again, when dealing with humans, mistakes are inevitable, even with security training. With DNS security as the first step in a defense-in-depth strategy, you can already feel some of the pressure on your SecOps team melting away.<\/p>\n<h3>Now\u2019s the Time for Midsize Enterprises to Act<\/h3>\n<p>As a midsized enterprise, you are in the crosshairs of cybercriminals who consider you an easy target. Prove them wrong! Using defense in depth, including DNS detection and response, midsize enterprises can reduce their risk of cyberattacks and protect their valuable network and data without negatively impacting costs, staff, and other resources. Foundational DNS detection and response solutions, like BloxOne\u00ae Threat Defense, work hand-in-hand with your other layered defenses. When combined with easy-to-understand employee security education, you are on the right track to creating a comprehensive strategy that addresses today\u2019s most worrisome cyber threats\u2014and potentially stopping a $4M breach from happening on your watch.<\/p>\n<p>1. Full Report: <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ibm.com\/security\/data-breach<\/a>; Summary: <a href=\"https:\/\/newsroom.ibm.com\/2022-07-27-IBM-Report-Consumers-Pay-the-Price-as-Data-Breach-Costs-Reach-All-Time-High\" target=\"_blank\" rel=\"noopener\">https:\/\/newsroom.ibm.com\/2022-07-27-IBM-Report-Consumers-Pay-the-Price-as-Data-Breach-Costs-Reach-All-Time-High<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s no longer a question of if a cyber security attack will hit; but when. Companies need to do everything they can to keep a serious \u201cwhen\u201d from ever happening. In fact, in today\u2019s digitally dependent world, midsize enterprises across all industries receive hundreds of security alerts daily, of which only a small percentage can [&hellip;]<\/p>\n","protected":false},"author":379,"featured_media":8388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3,2],"tags":[360,838,30,361,870,871,189,872,873,874],"class_list":{"0":"post-8689","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"category-security","9":"tag-dns-security","10":"tag-security-operations","11":"tag-dns","12":"tag-network-security","13":"tag-defense-in-depth","14":"tag-data-security","15":"tag-cybersecurity","16":"tag-cyber-threats","17":"tag-midsize-enterprise","18":"tag-data-protection","19":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises | Infoblox<\/title>\n<meta name=\"description\" content=\"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises\" \/>\n<meta property=\"og:description\" content=\"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T12:55:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T17:32:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Valerie Richards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises\" \/>\n<meta name=\"twitter:description\" content=\"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Valerie Richards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/\"},\"author\":{\"name\":\"Valerie Richards\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5633808664b6872222d51f7180c95096\"},\"headline\":\"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises\",\"datePublished\":\"2023-05-08T12:55:13+00:00\",\"dateModified\":\"2023-08-23T17:32:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/\"},\"wordCount\":1331,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-10.jpg\",\"keywords\":[\"DNS Security\",\"Security Operations\",\"DNS\",\"Network Security\",\"Defense-in-Depth\",\"Data Security\",\"Cybersecurity\",\"Cyber Threats\",\"Midsize Enterprise\",\"Data Protection\"],\"articleSection\":[\"Community\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/\",\"name\":\"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-10.jpg\",\"datePublished\":\"2023-05-08T12:55:13+00:00\",\"dateModified\":\"2023-08-23T17:32:19+00:00\",\"description\":\"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-10.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-image-10.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5633808664b6872222d51f7180c95096\",\"name\":\"Valerie Richards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_379_1677009711-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_379_1677009711-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_379_1677009711-96x96.jpg\",\"caption\":\"Valerie Richards\"},\"description\":\"Valerie is a Sr. Product Marketing Manager at Infoblox focusing on the Commercial (small to mid-size enterprise) market and the Channel. She brings over 20 years of experience in various B2B Marketing disciplines, including Product Marketing, Channel\\\/Partner Marketing, and Customer Marketing, as well as Customer Success. Valerie enjoys developing creative and compelling messaging, content, and programs to drive customer and partner awareness, acquisition, adoption, retention, and expansion, leading to measurable results.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/valerie-richards\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises | Infoblox","description":"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/","og_locale":"en_US","og_type":"article","og_title":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises","og_description":"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/","og_site_name":"Infoblox Blog","article_published_time":"2023-05-08T12:55:13+00:00","article_modified_time":"2023-08-23T17:32:19+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg","type":"image\/jpeg"}],"author":"Valerie Richards","twitter_card":"summary_large_image","twitter_title":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises","twitter_description":"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg","twitter_misc":{"Written by":"Valerie Richards","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/"},"author":{"name":"Valerie Richards","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5633808664b6872222d51f7180c95096"},"headline":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises","datePublished":"2023-05-08T12:55:13+00:00","dateModified":"2023-08-23T17:32:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/"},"wordCount":1331,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg","keywords":["DNS Security","Security Operations","DNS","Network Security","Defense-in-Depth","Data Security","Cybersecurity","Cyber Threats","Midsize Enterprise","Data Protection"],"articleSection":["Community","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/","url":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/","name":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg","datePublished":"2023-05-08T12:55:13+00:00","dateModified":"2023-08-23T17:32:19+00:00","description":"It\u2019s no longer a question of if a cyber security attack will hit; but when. Read how DNS Security is an important layer in midsize enterprises\u2019 defense-in-depth strategy.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-image-10.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/the-importance-of-dns-as-part-of-defense-in-depth-for-midsize-enterprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"The Importance of DNS as Part of Defense-in-Depth for Midsize Enterprises"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5633808664b6872222d51f7180c95096","name":"Valerie Richards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_379_1677009711-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_379_1677009711-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_379_1677009711-96x96.jpg","caption":"Valerie Richards"},"description":"Valerie is a Sr. Product Marketing Manager at Infoblox focusing on the Commercial (small to mid-size enterprise) market and the Channel. She brings over 20 years of experience in various B2B Marketing disciplines, including Product Marketing, Channel\/Partner Marketing, and Customer Marketing, as well as Customer Success. Valerie enjoys developing creative and compelling messaging, content, and programs to drive customer and partner awareness, acquisition, adoption, retention, and expansion, leading to measurable results.","url":"https:\/\/www.infoblox.com\/blog\/author\/valerie-richards\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/379"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8689"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8689\/revisions"}],"predecessor-version":[{"id":8696,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8689\/revisions\/8696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8388"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}