{"id":15383,"date":"2026-03-24T08:00:00","date_gmt":"2026-03-24T12:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=15383"},"modified":"2026-03-30T10:13:07","modified_gmt":"2026-03-30T14:13:07","slug":"cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/","title":{"rendered":"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors"},"content":{"rendered":"\n<p>Making sure that your own domain name portfolio has layers of security is a recognised fundamental, that is within your control and ensures that the portfolio is constantly monitored and necessary updates are made. However, do you check if companies in your supply chain are taking the same precautions? In the last year we have seen an increase in high profile breaches for large organizations, some of which has been due to vendors that were breached.<\/p>\n\n\n\n<p>In the recent <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report-2026\/\">Domain Security report<\/a> published by CSC, we highlight some of the key components that the Global 2000 and top 100 unicorns have in place to mitigate risks around their domain names. What we saw in the results is that the top 100 unicorns in many aspects did have better coverage of domain name security components.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1081\" height=\"616\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/2026\/03\/AITECH_CHART.png\" alt=\"\" class=\"wp-image-15409\" style=\"aspect-ratio:1.8641043239533288;width:597px;height:auto\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Over 50% of the Top 100 unicorns are in the technology sector and are more than likely within the supply chains of the Global 2000 companies. In comparison with the Global 2000 across 8 domain security attributes, unicorns have a higher scoring in 5 categories. Even though they score higher than the Global 2000, adoption of some attributes is still very low.<\/p>\n\n\n\n<p>The key areas where they are stronger are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email security with higher adoption of SPF, DKIM and DMARC.<\/li>\n\n\n\n<li>DNSSEC 16% adoption vs 10%<\/li>\n\n\n\n<li>CAA records had 33% adoption vs 11%<\/li>\n<\/ul>\n\n\n\n<p>What all of these have in common is that they are managed through DNS records, this suggests that teams managing the domain names for unicorns are likely IT professionals with good knowledge of security protocols available in DNS without incurring much costs for the company. Also, these companies which are by nature newer probably have a less complex set up, which makes it easier for them than for the large global organisations.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Governmental interventions<\/strong><\/h2>\n\n\n\n<p>In the EU we saw the introduction of the NIS2 directive which in a nutshell is GDPR for technology. In this directive it outlines how you should be adopting redundancy where possible and setting up checks on your supply chains. At present many countries are bringing this into local law. We are also seeing other governments around the world looking at adopting similar rules. This is all to make companies in critical industries more resilient against all different kinds of attacks that now are seen on a regular basis.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What should companies be doing?<\/strong><\/h2>\n\n\n\n<p>In short, security surveys should be part of your approach to vendors who provide technology as part of your supply chain. While such surveys are likely in place, you must ensure that you don\u2019t overlook how they protect their domains and DNS. Some of the critical questions should be:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What is your guaranteed uptime for DNS services?\n<ul class=\"wp-block-list\">\n<li>Please document your track records for the past 10 years<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Do you offer SOC II reporting?<\/li>\n\n\n\n<li>Do you use an enterprise-class registrar for your critical domains?<\/li>\n\n\n\n<li>Are your critical domains locked at the registries and registrars?<\/li>\n\n\n\n<li>Do your critical domains have DNSSEC-enabled?<\/li>\n\n\n\n<li>What email authentication protocols are used on your critical domains?<\/li>\n\n\n\n<li>Do you enforce policies on authorized certificate authorities for SSL certificates used?<\/li>\n\n\n\n<li>Do you proactively monitor your critical domains for fraudulent third-party lookalike domains?<\/li>\n<\/ul>\n\n\n\n<p>By asking these questions, you can quickly ascertain whether the providers are treating domain name security as seriously as you are. Domain security is still the missing element in a lot of companies\u2019 security posture, the more you can educate internally and through suppliers, the greater the chance of reducing risks that can severely damage your brand.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read the full report<\/strong><\/h2>\n\n\n\n<p>Download the <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report-2026\/\">2026 Domain Security Report<\/a> to see key domain name security components used by the Global 2000 and top 100 unicorns, and where adoption is still low.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions. <\/p>\n","protected":false},"author":17,"featured_media":10450,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,553,521],"tags":[],"class_list":["post-15383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-security","category-featured","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors | CSC<\/title>\n<meta name=\"description\" content=\"Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors | CSC\" \/>\n<meta property=\"og:description\" content=\"Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:13:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55030.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors\",\"datePublished\":\"2026-03-24T12:00:00+00:00\",\"dateModified\":\"2026-03-30T14:13:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/\"},\"wordCount\":611,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55030.jpg\",\"articleSection\":[\"Domain Security\",\"Featured\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/\",\"name\":\"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55030.jpg\",\"datePublished\":\"2026-03-24T12:00:00+00:00\",\"dateModified\":\"2026-03-30T14:13:07+00:00\",\"description\":\"Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55030.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55030.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors | CSC","description":"Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors | CSC","og_description":"Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions.","og_url":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2026-03-24T12:00:00+00:00","article_modified_time":"2026-03-30T14:13:07+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55030.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors","datePublished":"2026-03-24T12:00:00+00:00","dateModified":"2026-03-30T14:13:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/"},"wordCount":611,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55030.jpg","articleSection":["Domain Security","Featured","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/","url":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/","name":"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55030.jpg","datePublished":"2026-03-24T12:00:00+00:00","dateModified":"2026-03-30T14:13:07+00:00","description":"Read the report to learn what Global 2000 and top 100 unicorns are doing to mitigate domain name risk, and the questions to ask your supply chain. Learn how CSC can support your business in domain security solutions.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55030.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55030.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cybersecurity-throughout-your-supply-chain-domain-and-dns-questions-to-ask-vendors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Throughout Your Supply Chain: Domain and DNS Questions to Ask Vendors"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/15383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=15383"}],"version-history":[{"count":9,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/15383\/revisions"}],"predecessor-version":[{"id":15411,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/15383\/revisions\/15411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10450"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=15383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=15383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=15383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}