show episodes
 
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
 
Loading …
show series
 
It is easy to find headline stories of a breach that can be traced to poor security investments and practices. But such stories will continue to appear as many in management persist in restricting security investments. They often cite worker productivity, or even employee satisfaction, as factors. How can SecOps balance the needs for both productiv…
 
To deliver malware, threat actors depend on techniques like phishing and malvertising, but malvertising doesn’t get as much visibility. To address this imbalance, we’ve invited Chance Tudor, an official “Threat Hunter” in the Infoblox threat research group, to talk about his recent work uncovering the Omnatour Malvertising network, an unusually lar…
 
In previous episodes, we’ve discussed the broad array of threat intelligence (TI) available and how important it is to get the right blend of TI. But where does it all come from? Renee Burton is the Sr. Director of Threat Intelligence for Infoblox and her teams, produce or curate dozens of threat feeds of different types, so we’ve asked her to help…
 
Vulnerabilities. The breadth of products impacted is growing, while our options for dealing with them are shrinking. For example, the luxury of having months to test patches in labs before deployment has, in many cases, completely disappeared. So, we have asked the SecOps Manager for Infoblox, Anthony Ciarochi, to be our guest for this episode of T…
 
Since we are in the dog days of summer, we have decided to celebrate the hot weather by reviving our hottest episode from Season 2! In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness …
 
The SecOps benefits from device visibility is limited if that data is incomplete. Depending on DHCP alone can leave gaps in missed devices and partial data. Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore. This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert o…
 
In the beginning… there was a desktop AV and a firewall. Today, security teams manage scores of security tools from dozens of vendors. With interest in DNS security growing significantly over the last few years, we need to ask why you would want to invest in it, what would DNS security do to the rest of the security stack, and how would it impact S…
 
ThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We’ll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more. Tune in to the live broadcast o…
 
Dark Reading magazine recently published a series of articles on DNS, shining a light on one of the most overlooked areas of cybersecurity despite the role of DNS at the foundation of modern communications. We’ve invited Krupa Srivatsan, a Director in the Infoblox security products team, to share her favorite highlights from this 17 page, in depth …
 
Have you figured out a recipe for blending your security solutions into a satisfying ecosystem that optimizes your SecOps while lowering overall risk levels? If not, join us and our guest Pallavi Singh, an Infoblox lead on security integrations for everything from endpoints to cloud services, as we go beyond the hype and drill into ecosystem pros a…
 
Security teams have always depended on network and login data to help connect events to users and devices. But is there more to be found in that raw data? What about the metadata being made available on modern hybrid and distributed networks? We’ve invited veteran networking guru Bob Rose to join us to take a deeper look at ‘metadata’, and the hidd…
 
April first is a day full of mostly harmless pranks and hijinks; but what about cyber threats that are fooling your users year-round? Join Bob Hansmann and guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox for our annual discussion on the current state of phishing, lookalikes, social engineering, BECs and other evasion…
 
Nation-state threats are nothing new but, considering cyberactivity linked to the current crisis in Ukraine, we need to update our understanding of nation-state cyber threat potential, and the security strategies necessary to address them. Join host Bob Hansmann and his guests Ed Hunter, CISO for Infoblox, and Anthony Ciarochi, SecOps Manager for I…
 
How long would it take your defenses to detect an intruder? Average breach dwell-time estimates range from 24 days to almost a year. So, unless your organization’s acceptable dwell-time falls in that range, we’ve invited Gary Cox to talk about dwell-time and how to reduce it based on his extensive IT and security work throughout Europe. Tune in to …
 
The “I Love You” virus was the first major, global cyberattack of the millennium, setting records for damage and speed of dissemination. So we’ve invited Infoblox Security Operations Manager Anthony Ciarochi to discuss the evolution of email into the #1 attack vector, and how defenders have adapted to deal with it. Tune in to the live broadcast on …
 
Everyone talks about moving to the cloud and dreams of one day turning the data center into a VR gaming room. (For team-building exercises, certainly.) But, after several years of the ‘moving to cloud’, the world seems to be stuck in a Hybrid state. So this week’s ThreatTalk invites Vincent Berk, Author at Riverbed Blog, to help us look at the netw…
 
The story around the Log4J vulnerability has been told and retold by countless security publications and vendors. Join us on January 18 as guests Renee Burton and Druce MacFarlane take us behindthe scenes to understand the threat posed by vulnerabilities, the threat actors exploiting them, andhow researchers work to counter those threats. Tune in t…
 
Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. Join us as guests Druce MacFarland and David Seeman discuss key concepts that can help you maximize the value of your …
 
From writing a few scripts using APIs, to full-fledge SOAR solutions, automation is getting a serious look from those who are seeing little success from throwing bodies at security problems. But choosing the right automation approach is a tough decision that demands a solid understanding of each option, what it can deliver, and what it will cost in…
 
Zero Trust Networking is typically discussed in the context of users or devices connecting to the network. But what about the devices that are already there? Security monitoring needs to include all aspects of the network, as well as the devices and users connected to it. Check out this week’s ThreatTalk podcast with host Bob Hansmann and his guest…
 
Smart City development is accelerating and even expanding in response to the new world realities of how citizens access services. But solutions to make municipal services easier to access and consume require greater attention to the inherent security of those solutions and the connective foundation they operate on. Over the last year, vulnerability…
 
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on…
 
30 years ago, cyber security involved little more than firewalls and desktop AV. But today's security tools, expertise, and services are so numerous and complex that few if any, organizations can claim to have everything they need 'in-house'. Due to various needs and constraints, including budgets, it is a constant struggle to balance what capabili…
 
On the heels of our last podcast on the need for greater synergy between networking and security technologies, the recent T-Mobile cyberattack has been linked to an unsecured router as the original point of entry. So we are bringing back Bob Rose, a veteran network technologies expert and a former product manager for AT&T's Enterprise Mobility Mana…
 
Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, spe…
 
A lot has changed on the ransomware landscape in just the last month, with three headline-grabbing breaches and a disappearing act by two of the largest black-market dealers of ransomware tools and services. Join us on ThreatTalk for the return of Michael Zuckerman, consulting senior product marketing manager and author/editor of the ‘Q2 2021 Cyber…
 
After a great discussion about using threat intelligence (TI) to improve threat blocking across the entire security stack, we bring back guest Druce MacFarlane for round 2 of this engaging topic. Investigators and responders need access to much more than IoCs to help guide their studies and reach effective response decisions as quickly as possible.…
 
With ransoms in the millions called out in headlines, companies are taking a more serious look at cyber insurance. Brushing off scary ‘potential’ damage stories from the security team may be easy for some boards, they cannot easily ignore hard numbers like those in the press. ThreatTalk has invited Krupa Srivatsan, Director of Product Marketing for…
 
Enterprise security teams rarely buy tools based purely on the current set of features and functions. They also assess the vendors' ability to deliver timely support and updates so the solution will continue to provide value over the entire investment period. In particular, security solutions must be able to quickly adapt to shifts in technology, t…
 
Security teams consume threat intelligence (TI) in many ways but struggle to find just the right mix because not all TI is created equal. Defenders constantly struggle to find the balance between high detection rates and low false positives. Meanwhile, threat investigators and incident responders need TI they can leverage to make more effective dec…
 
While headlines declare the Colonial Pipeline breach a "wake-up call", experienced cybersecurity professionals are biting their tongues from declaring, "I told you so". So this episode of ThreatTalk will be light on the 'scary stories' of DarkSide to focus more on what we are learning from this latest real-world ransomware incident. Join host Bob H…
 
Michael Osterman of Osterman Research joins us on this week's ThreatTalk! Michael and host Bob Hansmann will be discussing the findings from an Osterman survey of security leaders about their long-term strategies and investment plans for a post-COVID world! For context, it will review their current security measures to understand what is working - …
 
This week our host Bob Hansmann is joined by Infoblox’s consulting senior product marketing manager, Michael Zuckerman. They will be talking about the latest trends and tactics uncovered in the Infoblox Q1 Cyberthreat Intelligence Report. The first quarter of 2021 saw many new cybersecurity issues, and this show is sure to provide some great discus…
 
ThreatTalk Season 2 kicks off with Bob Hansman and guest Druce MacFarlane, Sr. Product Manager at Infoblox, talking about the current state of phishing. We will discuss social engineering and lookalike tactics that hackers are using to steal valuable data. Tune in to the live event on LinkedIn at 11:00 am (PST). Subscribe to the ThreatTalk podcast …
 
Infoblox is excited to present season 2 of the ThreatTalk podcast series. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts. Infoblox Sr. Product Marketing Manager Bob Hansmann will be hosting ThreatTalk Season 2. Bob has been at the bleeding edge of cybersecurity since the early …
 
Security teams are at war. Every day, attackers, tactics, techniques, and procedures evolve and are used to assault IT security defenses. Enterprises must choose frameworks to help organize their cyber-defense playbooks and run their operations. The CIS framework provides one of the best options to develop an organization’s security strategies for …
 
Don’t be stuck in the IT stone age! The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation. The digital transformation constantly moves data away from traditional enterprise control: Rapid expansion of SaaS Applications hosted everywhere Branch offices on SDWANs Explo…
 
Most organizations think DNS security means that they must secure their various DNS systems. However, using DNS security strategically overlays an overarching layer of security capabilities across the enterprise. When harnessing DNS security, an organization can: Bypass the need to configure of hundreds or thousands of firewalls to block specific a…
 
How can an enterprise protect a surge of remote users? Everyone is scrambling to deal with the consequences of the COVID19 quarantine. Enterprises suddenly shifted their employees from primarily within the office to primarily working from home. Now security managers must somehow extend the corporate security stack to non-technical employees working…
 
How can a heralded new feature from Firefox be dangerous? When the consumer-protecting DNS over HTTPS (DoH) feature creates a default that dangerously bypasses enterprise security and exposes organizations to serious risks. Krupa Srivastan, Director of Product Marketing at Infoblox, discusses key issues with DoH and best practices to regain control…
 
The EVP Engineering and Chief DNS Architect at Infoblox, Cricket Liu, joins us on Threat Talk to talk about DNS Flag Days – why we need them and how they are improving the internet. DNS Flag Days serve notices to obsolete Domain Name System (DNS) servers that existing accommodations to provide them with compatibility for pre-1999 standards will be …
 
How can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD? A breach is going to happen so limit the impact using Zero Trust principles: Focus on the Data Trust no user Trust no communication Deny access by default and provide minimal access when required Consulting Senior Product Marketing M…
 
Did you know that over 90% of the malware incidents and over half of all ransomware and data theft attacks rely on DNS as a vector. In today’s day and age, securing your DNS has never been more critical. Today we’re joined by David Ayers, a member of the Infoblox product marketing team, who is responsible for service provider and DNS privacy messag…
 
Objectivity in cyber defense is the goal, but, too often, emotion of the room rules the day. In this episode, seasoned IT expert Michael Zuckerberg joins us to explain the MITRE ATT&CK framework and how to utilize it to reduce subjectivity and increase your cyber defense systems. Michael is a consulting senior product marketing manager at Infoblox,…
 
“Your employer’s firewall has blocked access to this website.” That’s a good way to protect a network. But its a bad way to cost effectively protect your network. There’s a better way, using DNS, which costs far less, and it’s extremely accurate. On this episode, Director of Product Marketing at Infoblox, Krupa Srivatsan, discusses how DNS can be u…
 
DNS, DHCP, IPAM — most people within IT understand how these ensure connectivity. But they can, and should, also be leveraged as the major defenses for your network. On this episode of the ThreatTalk podcast, Krupa Srivatsan joined us to discuss the security defense methodologies inherent within DHS, DHCP, & IPAM. Krupa is the Director of Product M…
 
There are new cybersecurity tools coming out every day it seems. Why, then, are so many security breaches happening still? Michael Katz, Security Sales Specialist at Infoblox, fills us in on today’s threatscape and what companies can do to protect themselves. In this episode, we cover: Michael’s biggest security concern for today Investing in secur…
 
Is there ever a victimless crime? Cryptojacking - a form of malware that secretly infiltrates your system to steal computing resources for mining cryptocurrency - has gained traction as a steady stream of income for criminal hackers. We sit down with the Technology Director of Western Europe Infoblox, Gary Cox, and the CEO of INSINIA Security, Mike…
 
Billions of devices are all connected together out there in the world... will it actually be possible to map and secure them all? If so, how? Whose responsibility should it be? In this episode we ask Gary Cox, Infoblox’s Technology Director for Western Europe, and Mike Godfrey, CEO of Insignia Security, for answers.…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login