"Unless the threat evolves to not use DNS, which is very unlikely, the same mitigation strategy would be successful and could be continuously used," BeyondTrust VP of Technology Morey Haber told TechNewsWorld.