{"id":8388,"date":"2019-12-10T08:49:47","date_gmt":"2019-12-10T13:49:47","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8388"},"modified":"2019-12-11T12:11:36","modified_gmt":"2019-12-11T17:11:36","slug":"cyber-security-risk-postures","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","title":{"rendered":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures<\/h3>\n\n\n\n<a class=\"social\" id=\"linkedinShare\" style=\"float:left\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><\/a>\n<i><br \/> By <strong>Vincent D&#8217;Angelo<\/strong> <br \/> Global Director Corporate Development and Strategic Alliances<\/i><br \/><br \/><strong>Share this post<\/strong> \n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n\n\n\n<p>In 2019, we\u2019ve seen a surge in domain name system (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.\u2019s Cybersecurity Centre, ICANN, and other notable security experts. Although, the topic has gained popularity amongst CIOs and CISOs, most companies are still overlooking important security blind spots when it comes to securing their digital assets outside the enterprise firewalls\u2014domains, DNS, digital certificates. <\/p>\n\n\n\n<p>In fact, most\norganizations, regardless of geographic location or industry, are exposed to\nthese risks. Our most recent <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\/\">Domain Name Security report<\/a> featuring insights from the\ndefense, media, and financial sectors illustrates the risk trends.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Do you know who your domain name\nregistrar is (the domain name management company that holds the keys to the\nkingdom)?<\/li><li>What do you know about your\ndomain name registrar\u2019s controls, security, policies and processes?<\/li><\/ol>\n\n\n\n<p>I like to think of\nthis topic like the <a href=\"https:\/\/www.linkedin.com\/pulse\/domain-names-dns-ssls-electricity-vincent-d-angelo\/\">electricity that powers our homes<\/a>. Everyone expects their lights\nto work, but then, what happens when the power goes out? In the enterprise\nenvironment, domain names, DNS, and certificates are the lifeline to any internet-based\napplication including websites, email, apps, virtual private networks (VPNs), voice\nover IP (VoIP) and more. <\/p>\n\n\n\n<p>Unfortunately, the\nsecurity of these critical digital assets is often overlooked because management\nresponsibilities are often split between legal and IP, marketing, IT and security,\nand third parties, like agencies and law firms. As a result, cyber criminals\nand state-sponsored actors are capitalizing on these vulnerabilities to launch\nsocial engineering attacks in an attempt to hijack an organization\u2019s entire web\npresence. Most of these attacks are occurring by targeting critical nodes, such\nas <a href=\"https:\/\/krebsonsecurity.com\/2019\/10\/breaches-at-networksolutions-register-com-and-web-com\/\">domain name registrars<\/a>, which can lead to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Loss\nof control of business-critical internet assets like websites, email, apps, VPNs,\nand VoIP<\/li><li>Compliance\nrisks and data breaches, which can result in fines, especially with the\nintroduction of the EU\u2019s General Data Protection Regulation and new privacy\nlaws<\/li><li>Reputation\nloss, which leads to loss of revenue and a decrease in market valuation<\/li><li>Loss\nof business-critical intellectual property <\/li><li>Risk\nof transfer of funds to unauthorized third parties <\/li><\/ul>\n\n\n\n<p>To date, the focus\nof cyber security has primarily been to secure as much as possible behind the\nfirewall. The reality is that domain names, DNS, and digital certificates are\npublicly accessible and haven\u2019t been a focus in most organizations. Security\ngoes beyond the firewall, not just behind it. The \u201celectricity\u201d that powers\nyour business needs constant vigilance and management.<\/p>\n\n\n\n<p>A defense in depth\napproach can help companies apply the necessary multi-layered security controls\nrequired to defend their digital assets outside the firewall.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png\" alt=\"\" class=\"wp-image-8389\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE-300x169.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE-768x432.png 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Here are some resources that may be helpful\nin raising awareness of this topic in your organization:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.cscglobal.com\/service\/webinar\/DNS-Hijacking\">DNS Hijacking:<\/a> Security Learnings From the\nLatest Incidents <\/li><li>Mitigate\nSecurity Threats Through <a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/mitigate-security-threats\/\">Digital Certificate Policy Enforcement<\/a><\/li><li><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/confused-about-domain-locks\">Confused About Domain Locks?<\/a> Understand the Intricacies and Security\nEffectiveness<\/li><li>CSC\u2019s\nlatest innovation, <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/security-center\/\">CSC Security Center<\/a><sup>SM<\/sup>, the first-of-its-kind platform\nthat identifies and manages the aforementioned risks beyond the firewall<\/li><li>CSC\u2019s\n<a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\/\">Cyber Security Report<\/a> which references current domain\nsecurity trends and best practices<\/li><\/ul>\n\n\n\n<p>&gt;&gt;\n<a href=\"https:\/\/www.cscdigitalbrand.services\/en\/request-consultation\/\">Request for a complimentary domain security\nassessment<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D&#8217;Angelo Global Director Corporate Development and Strategic Alliances Share this post In 2019, we\u2019ve seen a surge in domain name system (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.\u2019s Cybersecurity Centre, ICANN, [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171],"tags":[],"class_list":["post-8388","post","type-post","status-publish","format-standard","hentry","category-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC<\/title>\n<meta name=\"description\" content=\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D&#039;Angelo Global Director Corporate Development and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC\" \/>\n<meta property=\"og:description\" content=\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D&#039;Angelo Global Director Corporate Development and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-10T13:49:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-11T17:11:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures\",\"datePublished\":\"2019-12-10T13:49:47+00:00\",\"dateModified\":\"2019-12-11T17:11:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\"},\"wordCount\":563,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\",\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\",\"name\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\",\"datePublished\":\"2019-12-10T13:49:47+00:00\",\"dateModified\":\"2019-12-11T17:11:36+00:00\",\"description\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D'Angelo Global Director Corporate Development and\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC","description":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D'Angelo Global Director Corporate Development and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","og_locale":"en_US","og_type":"article","og_title":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC","og_description":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D'Angelo Global Director Corporate Development and","og_url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-12-10T13:49:47+00:00","article_modified_time":"2019-12-11T17:11:36+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures","datePublished":"2019-12-10T13:49:47+00:00","dateModified":"2019-12-11T17:11:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/"},"wordCount":563,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","articleSection":["Cyber security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","name":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","datePublished":"2019-12-10T13:49:47+00:00","dateModified":"2019-12-11T17:11:36+00:00","description":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures By Vincent D'Angelo Global Director Corporate Development and","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8388"}],"version-history":[{"count":9,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8388\/revisions"}],"predecessor-version":[{"id":8429,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8388\/revisions\/8429"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}