{"id":7558,"date":"2019-04-25T12:41:40","date_gmt":"2019-04-25T16:41:40","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7558"},"modified":"2019-06-04T15:04:14","modified_gmt":"2019-06-04T19:04:14","slug":"what-dns-is-and-how-its-vulnerable","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/","title":{"rendered":"DNS: The Neglected Building Block, Part 1 &#8211; What DNS is and How it\u2019s Vulnerable"},"content":{"rendered":"\n<p><em>by Ken Linscott<\/em><\/p>\n\n\n\n<p>The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building block for every company\u2019s online presence. <\/p>\n\n\n\n<p>Websites each have a unique numeric internet protocol (IP) address, and\nDNS translates human-friendly web site names into IP addresses that are easier\nfor computers to manage. <\/p>\n\n\n\n<p>In this first installment of our DNS blog series, we explore how\nregardless of the type of business, reliable DNS is instrumental in a brand\u2019s\nonline presence, is tied to online business success, and can also help prevent cyber\nattacks. Keep reading to also find out exactly how DNS works. &nbsp;<\/p>\n\n\n\n<p><strong>Reliable DNS = brand success and\ncustomer trust<\/strong><\/p>\n\n\n\n<p>The holy grail for DNS is reliable uptime. The problem for businesses\nlies in vulnerable DNS, which opens up a whole host of cyber risks, as well as\nthe associated costs to mitigate the problems that result from vulnerable DNS.<\/p>\n\n\n\n<p>Recent cyber attacks highlight specific techniques bad actors use to\nintercept and manipulate a company\u2019s legitimate web traffic, harvest information\nlike credentials or email addresses, and perform other malicious activities,\nsuch as phishing. In some cases, free digital security certificates\u2014that\nrequire low validation\u2014were used to increase the credibility of the scams,\ncompounding the issue for brands and customers. Consumers are weary of their\npersonal information being accessible to and stolen by criminals, thus breaches\nhurt the reputation and bottom line of companies around the globe.<\/p>\n\n\n\n<p>If DNS fails, customers attempting to visit a website simply will not\nreach their destination. Nor will employees be able to send or receive company email.\nIf a company relies on voice over IP to make and receive phone calls, access is\ncut off if DNS goes down, and companies will have to resort to using landlines and\nmobile devices to reach customers. Lastly, the ability for remote employees to\naccess systems via virtual private network will evaporate, inevitably leaving a\ncompany short staffed at the exact time it needs all hands on deck.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg\" alt=\"\" class=\"wp-image-7559\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/slide-1-DBS-Blog-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/slide-1-DBS-Blog-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/slide-1-DBS-Blog.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>How DNS works<br \/>\n<\/strong>Internet queries first go to the internet service provider (ISP), and if the\nISP has the IP address cached, the computer will resolve to the right location.\nIf the ISP doesn\u2019t have the IP address cached, it will query the root DNS to\nask it which registry to visit. That registry tells computers which\nauthoritative DNS holds the answer to where the content is.<\/p>\n\n\n\n<p>This is a complex journey, which usually happens in the blink of an eye\nwith no issues whatsoever. However, it\u2019s that complexity\u2014and the multiple\npoints of possible failure in particular\u2014that enables attackers to compromise the\nprocess and steal or redirect traffic to fraudulent websites.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/Slide-2-DBS-Blog-1024x576.jpg\" alt=\"\" class=\"wp-image-7560\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/Slide-2-DBS-Blog-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/Slide-2-DBS-Blog-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/Slide-2-DBS-Blog-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/04\/Slide-2-DBS-Blog.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Next post<\/strong><\/p>\n\n\n\n<p>In our next post, we\u2019ll detail five DNS vulnerabilities bad actors\ntarget. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Subscribe to our blog to receive notification of new posts.<\/a> <\/p>\n\n\n\n<p>Read more posts in this series:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\">&gt;&gt; Part 2 \u2013 Four DNS Vulnerabilities You Need to Know About<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-3\/\">&gt;&gt; Part 3 \u2013 Six More DNS Vulnerabilities That Make Security Crucial<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-4\/\">&gt;&gt; Part 4 \u2013 The Growing Threat of DNS Hijacking and Domain Shadowing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-5\/\">&gt;&gt; Part 5 \u2013 Mitigating the Risks of 10 Serious DNS Vulnerabilities<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-6\/\">&gt;&gt;\nPart 6 &#8211; DNS Management is a Boardroom Discussion<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building block for every company\u2019s online presence. Websites each have a unique numeric internet protocol (IP) address, and DNS translates human-friendly web site names into IP addresses that are easier for computers to manage. In [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171],"tags":[],"class_list":["post-7558","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS: The Neglected Building Block, Part 1 - What DNS is and How it\u2019s Vulnerable | CSC<\/title>\n<meta name=\"description\" content=\"by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: The Neglected Building Block, Part 1 - What DNS is and How it\u2019s Vulnerable | CSC\" \/>\n<meta property=\"og:description\" content=\"by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-25T16:41:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-04T19:04:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS: The Neglected Building Block, Part 1 &#8211; What DNS is and How it\u2019s Vulnerable\",\"datePublished\":\"2019-04-25T16:41:40+00:00\",\"dateModified\":\"2019-06-04T19:04:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/\"},\"wordCount\":553,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/slide-1-DBS-Blog-1024x576.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/\",\"name\":\"DNS: The Neglected Building Block, Part 1 - What DNS is and How it\u2019s Vulnerable | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/slide-1-DBS-Blog-1024x576.jpg\",\"datePublished\":\"2019-04-25T16:41:40+00:00\",\"dateModified\":\"2019-06-04T19:04:14+00:00\",\"description\":\"by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/slide-1-DBS-Blog-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/slide-1-DBS-Blog-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/what-dns-is-and-how-its-vulnerable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS: The Neglected Building Block, Part 1 &#8211; What DNS is and How it\u2019s Vulnerable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS: The Neglected Building Block, Part 1 - What DNS is and How it\u2019s Vulnerable | CSC","description":"by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/","og_locale":"en_US","og_type":"article","og_title":"DNS: The Neglected Building Block, Part 1 - What DNS is and How it\u2019s Vulnerable | CSC","og_description":"by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building","og_url":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-04-25T16:41:40+00:00","article_modified_time":"2019-06-04T19:04:14+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS: The Neglected Building Block, Part 1 &#8211; What DNS is and How it\u2019s Vulnerable","datePublished":"2019-04-25T16:41:40+00:00","dateModified":"2019-06-04T19:04:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/"},"wordCount":553,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg","articleSection":["Brand Protection","Cyber security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/","url":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/","name":"DNS: The Neglected Building Block, Part 1 - What DNS is and How it\u2019s Vulnerable | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg","datePublished":"2019-04-25T16:41:40+00:00","dateModified":"2019-06-04T19:04:14+00:00","description":"by Ken Linscott The domain name system\u2014or DNS\u2014is the infrastructure behind the internet. Technology professionals know DNS is the fundamental building","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/04\/slide-1-DBS-Blog-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS: The Neglected Building Block, Part 1 &#8211; What DNS is and How it\u2019s Vulnerable"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7558"}],"version-history":[{"count":7,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7558\/revisions"}],"predecessor-version":[{"id":7729,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7558\/revisions\/7729"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}