{"version":"1.0","provider_name":"Blog Iterati","provider_url":"https:\/\/www.iterati.com.mx\/posts","title":"White Paper: The New Standard in DNS Security - Blog Iterati","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ehrnCsN1B6\"><a href=\"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/\">White Paper: The New Standard in DNS Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/embed\/#?secret=ehrnCsN1B6\" width=\"600\" height=\"338\" title=\"&#8220;White Paper: The New Standard in DNS Security&#8221; &#8212; Blog Iterati\" data-secret=\"ehrnCsN1B6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.iterati.com.mx\/posts\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","thumbnail_width":451,"thumbnail_height":584,"description":"\u00bfPor qu\u00e9 fallan los enfoques de seguridad tradicionales en la lucha contra los ataques distribuidos de denegaci\u00f3n de servicio? Descargue esta nota t\u00e9cnica para explorar las trampas de las soluciones de seguridad DNS convencionales, y aprenda c\u00f3mo aprovechar la posici\u00f3n \u00fanica de DNS en la red para transformar los servidores DNS de talones de Aquiles en activos de seguridad. Luego, cont\u00e1ctate para obtener m\u00e1s informaci\u00f3n."}