{"id":12661,"date":"2023-07-13T07:00:00","date_gmt":"2023-07-13T11:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=12661"},"modified":"2026-01-15T11:10:33","modified_gmt":"2026-01-15T16:10:33","slug":"three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/","title":{"rendered":"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains"},"content":{"rendered":"\n<p>Companies today manage hundreds or even thousands of domain names that support their organization, their visitors from different countries, and their brands and trademarks. They register misspelling of their names as a defensive strategy to protect their brand from online fraud, or from losing traffic to simple user typos. &nbsp;<\/p>\n\n\n\n<p>So why should CISOs care?<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The<strong> <\/strong>internet is a known external attack surface where web domains can be compromised<\/h2>\n\n\n\n<p>Global businesses rely on the internet for everything\u2014websites, email, authentication, voice over IP (VoIP), and more. It\u2019s part of an organization\u2019s external attack surface and needs to be continuously monitored for cybercrime attacks and fraud. As cyber risks continue to increase, organizations and cyber insurers face greater challenges in quantifying them and addressing their capacity for harm. Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.<\/p>\n\n\n\n<p>Zero Trust models must extend beyond business systems, applications, and devices, and include a company\u2019s domain ecosystem as a real vulnerability to the attacks noted below. The following two domain security threats enable these attacks:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/CISO%201.png\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<p>In CSC\u2019s annual <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">Domain Security report<\/a>, it was noted that with the risks of not having domain security in place potentially leading to phishing or ransomware attacks, and many other cyberthreats, it would be prudent for an organizations overall security posture to have better implementation of domain security measures.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Not understanding who is managing your domains can lead to supply chain risk<\/h2>\n\n\n\n<p>Every business depends on a series of suppliers and vendors. These relationships form supply chains that can become increasingly complex, leaving organizations exposed to even more risk. Companies should conduct a yearly security review on the companies they work with\u2014including their domain registrar(s). Conducting a security audit each year lets organizations have insight into how they are maturing, developing, and adjusting.<\/p>\n\n\n\n<p>Also, when it comes to the complexities of the domain registrar ecosystem, vendor selection matters. Companies can select an enterprise-class registrar that specializes in working with corporations and brand owners that require advanced business practices, capabilities, expertise, and support staff in relation to domain and DNS management as well as security, brand and fraud protection, data governance and cyber security. They also offer defense-in-depth safeguards, along with DNS redundancy to provide a backup DNS to boost resiliency.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/CISO%202.png\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<p>Other consumer-grade registrars offer very transactional relationships with their clients, and don\u2019t go through the thorough review process an enterprise-class provider does. They don\u2019t offer solutions to mitigate all the digital risks of domain spoofing, domain\/DNS hijacking attacks, sub-domain takeovers, and phishing attacks.&nbsp; In addition to the lack of security, the hard truth is that consumer-grade domain registrars have been proliferating typosquatting, domain name auctioning services\u2014often infringing upon other brand names\u2014and name spinning services. These registrars monetize the goodwill brand owners have worked hard to establish, creating a revenue stream for themselves rather than protecting their clients.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Domain protection can stop phishing attacks at the source<\/h2>\n\n\n\n<p>Domain security is a critical component to help mitigate cyberattacks in the early stages\u2014<em>your first line of defense&nbsp;<\/em>in your organization\u2019s Zero Trust model. According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks\u2014including ransomware and business email compromise (BEC)\u2014begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don\u2019t adequately address phishing risks in the early stages of an attack because they don\u2019t include domain security measures to protect against the most common phishing attacks.<\/p>\n\n\n\n<p>Bad actors are using company domain names for malicious attacks more than ever before. Research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered and confusingly similar domain name, or via email spoofing.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/CISO%203.jpg\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Introducing CSC\u2019s 3D Domain Security and Enforcement solution<\/h2>\n\n\n\n<p>CSC\u2019s 3D Domain Security and Enforcement service provide a multi-dimensional view of various threat vectors outside the firewall targeting specific domains. With corporations operating multiple brands, with hundreds or even thousands of domains within their portfolio, rapid detection and de-activation of confusingly similar domains imitating brands are crucial. The 3D product is powered by one of the largest data lakes associated with domain name-centric data, equipped with a correlation engine, machine learning, and clustering technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.<\/p>\n","protected":false},"author":13,"featured_media":10429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,7,521],"tags":[],"class_list":["post-12661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-security","category-domains","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains | CSC<\/title>\n<meta name=\"description\" content=\"Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains | CSC\" \/>\n<meta property=\"og:description\" content=\"Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-13T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T16:10:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x5509.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains\",\"datePublished\":\"2023-07-13T11:00:00+00:00\",\"dateModified\":\"2026-01-15T16:10:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/\"},\"wordCount\":750,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x5509.jpg\",\"articleSection\":[\"Domain Security\",\"Domains\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/\",\"name\":\"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x5509.jpg\",\"datePublished\":\"2023-07-13T11:00:00+00:00\",\"dateModified\":\"2026-01-15T16:10:33+00:00\",\"description\":\"Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x5509.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x5509.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains | CSC","description":"Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/","og_locale":"en_US","og_type":"article","og_title":"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains | CSC","og_description":"Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.","og_url":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2023-07-13T11:00:00+00:00","article_modified_time":"2026-01-15T16:10:33+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x5509.jpg","type":"image\/jpeg"}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains","datePublished":"2023-07-13T11:00:00+00:00","dateModified":"2026-01-15T16:10:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/"},"wordCount":750,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x5509.jpg","articleSection":["Domain Security","Domains","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/","url":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/","name":"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x5509.jpg","datePublished":"2023-07-13T11:00:00+00:00","dateModified":"2026-01-15T16:10:33+00:00","description":"Every day, we learn about new developments involving supply chain attacks, ransomware, and phishing attacks, along with additional layers of complexity in terms of what coverage they require and how to stop them.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x5509.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x5509.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/three-reasons-why-cisos-need-to-know-how-their-company-is-managing-their-domains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Three Reasons Why CISOs Need to Know How Their Company is Managing Their Domains"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=12661"}],"version-history":[{"count":7,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12661\/revisions"}],"predecessor-version":[{"id":14794,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12661\/revisions\/14794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10429"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=12661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=12661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=12661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}