{"id":8772,"date":"2020-03-24T12:48:40","date_gmt":"2020-03-24T16:48:40","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8772"},"modified":"2020-03-31T12:21:59","modified_gmt":"2020-03-31T16:21:59","slug":"beyond-the-firewall","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/","title":{"rendered":"Beyond the Firewall: DNS Defenses to Manage Online Threats"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/dns-defenses-to-manage-online-threats\/?utm_source=Blog&amp;utm_medium=Post&amp;utm_campaign=Beyond%20the%20Firewall%20Campaign\"><img loading=\"lazy\" decoding=\"async\" width=\"978\" height=\"501\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg\" alt=\"\" class=\"wp-image-8773\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg 978w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/03\/DBS_Beyond_the_Firewall-300x154.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/03\/DBS_Beyond_the_Firewall-768x393.jpg 768w\" sizes=\"auto, (max-width: 978px) 100vw, 978px\" \/><\/a><\/figure>\n\n\n\n<p>The domain name system (DNS) forms the underlying\ninfrastructure for how the internet works, serving as a directory to point\nusers to the right web content. When DNS goes down, websites, email, voice-over\nIP, and remote employee login goes down with it.<\/p>\n\n\n\n<p>Well-managed digital assets\u2014 DNS in particular\u2014is critical\nfor the smooth operation of business.<\/p>\n\n\n\n<p>Failure of\ndigital assets leads to a significant impact in terms of lost revenue and brand\nreputation because of the threats lurking from cyber criminals waiting for an\nopening. There are 10 major threats associated with DNS vulnerabilities and\nfour simple steps to defend against them all.<\/p>\n\n\n\n<p>Read our\nwhite paper, <em>Beyond the Firewall: Implementing DNS\nDefenses to Mitigate Online Vulnerabilities and Threats<\/em>, to find out why a firewall is just not\nenough in today\u2019s cyber crime environment.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/dns-defenses-to-manage-online-threats\/?utm_source=Blog&amp;utm_medium=Post&amp;utm_campaign=Beyond%20the%20Firewall%20Campaign\">Download it now. >><\/a><\/strong><\/p>\n\n\n\n<h3>Share this post<\/h3>\n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n","protected":false},"excerpt":{"rendered":"<p>The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web content. When DNS goes down, websites, email, voice-over IP, and remote employee login goes down with it. Well-managed digital assets\u2014 DNS in particular\u2014is critical for the smooth operation of business. [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171],"tags":[],"class_list":["post-8772","post","type-post","status-publish","format-standard","hentry","category-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beyond the Firewall: DNS Defenses to Manage Online Threats | CSC<\/title>\n<meta name=\"description\" content=\"The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond the Firewall: DNS Defenses to Manage Online Threats | CSC\" \/>\n<meta property=\"og:description\" content=\"The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-24T16:48:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-31T16:21:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Beyond the Firewall: DNS Defenses to Manage Online Threats\",\"datePublished\":\"2020-03-24T16:48:40+00:00\",\"dateModified\":\"2020-03-31T16:21:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/\"},\"wordCount\":149,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/DBS_Beyond_the_Firewall.jpg\",\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/\",\"name\":\"Beyond the Firewall: DNS Defenses to Manage Online Threats | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/DBS_Beyond_the_Firewall.jpg\",\"datePublished\":\"2020-03-24T16:48:40+00:00\",\"dateModified\":\"2020-03-31T16:21:59+00:00\",\"description\":\"The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/DBS_Beyond_the_Firewall.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/DBS_Beyond_the_Firewall.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/beyond-the-firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beyond the Firewall: DNS Defenses to Manage Online Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond the Firewall: DNS Defenses to Manage Online Threats | CSC","description":"The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/","og_locale":"en_US","og_type":"article","og_title":"Beyond the Firewall: DNS Defenses to Manage Online Threats | CSC","og_description":"The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web","og_url":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-03-24T16:48:40+00:00","article_modified_time":"2020-03-31T16:21:59+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Beyond the Firewall: DNS Defenses to Manage Online Threats","datePublished":"2020-03-24T16:48:40+00:00","dateModified":"2020-03-31T16:21:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/"},"wordCount":149,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg","articleSection":["Cyber security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/","url":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/","name":"Beyond the Firewall: DNS Defenses to Manage Online Threats | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg","datePublished":"2020-03-24T16:48:40+00:00","dateModified":"2020-03-31T16:21:59+00:00","description":"The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/03\/DBS_Beyond_the_Firewall.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/beyond-the-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Beyond the Firewall: DNS Defenses to Manage Online Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8772"}],"version-history":[{"count":2,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8772\/revisions"}],"predecessor-version":[{"id":8809,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8772\/revisions\/8809"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}