show episodes
 
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
 
Loading …
show series
 
Security teams are at war. Every day, attackers, tactics, techniques, and procedures evolve and are used to assault IT security defenses. Enterprises must choose frameworks to help organize their cyber-defense playbooks and run their operations. The CIS framework provides one of the best options to develop an organization’s security strategies for …
 
Don’t be stuck in the IT stone age! The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation. The digital transformation constantly moves data away from traditional enterprise control: Rapid expansion of SaaS Applications hosted everywhere Branch offices on SDWANs Explo…
 
Most organizations think DNS security means that they must secure their various DNS systems. However, using DNS security strategically overlays an overarching layer of security capabilities across the enterprise. When harnessing DNS security, an organization can: Bypass the need to configure of hundreds or thousands of firewalls to block specific a…
 
How can an enterprise protect a surge of remote users? Everyone is scrambling to deal with the consequences of the COVID19 quarantine. Enterprises suddenly shifted their employees from primarily within the office to primarily working from home. Now security managers must somehow extend the corporate security stack to non-technical employees working…
 
How can a heralded new feature from Firefox be dangerous? When the consumer-protecting DNS over HTTPS (DoH) feature creates a default that dangerously bypasses enterprise security and exposes organizations to serious risks. Krupa Srivastan, Director of Product Marketing at Infoblox, discusses key issues with DoH and best practices to regain control…
 
The EVP Engineering and Chief DNS Architect at Infoblox, Cricket Liu, joins us on Threat Talk to talk about DNS Flag Days – why we need them and how they are improving the internet. DNS Flag Days serve notices to obsolete Domain Name System (DNS) servers that existing accommodations to provide them with compatibility for pre-1999 standards will be …
 
How can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD? A breach is going to happen so limit the impact using Zero Trust principles: Focus on the Data Trust no user Trust no communication Deny access by default and provide minimal access when required Consulting Senior Product Marketing M…
 
Did you know that over 90% of the malware incidents and over half of all ransomware and data theft attacks rely on DNS as a vector. In today’s day and age, securing your DNS has never been more critical. Today we’re joined by David Ayers, a member of the Infoblox product marketing team, who is responsible for service provider and DNS privacy messag…
 
Objectivity in cyber defense is the goal, but, too often, emotion of the room rules the day. In this episode, seasoned IT expert Michael Zuckerberg joins us to explain the MITRE ATT&CK framework and how to utilize it to reduce subjectivity and increase your cyber defense systems. Michael is a consulting senior product marketing manager at Infoblox,…
 
“Your employer’s firewall has blocked access to this website.” That’s a good way to protect a network. But its a bad way to cost effectively protect your network. There’s a better way, using DNS, which costs far less, and it’s extremely accurate. On this episode, Director of Product Marketing at Infoblox, Krupa Srivatsan, discusses how DNS can be u…
 
DNS, DHCP, IPAM — most people within IT understand how these ensure connectivity. But they can, and should, also be leveraged as the major defenses for your network. On this episode of the ThreatTalk podcast, Krupa Srivatsan joined us to discuss the security defense methodologies inherent within DHS, DHCP, & IPAM. Krupa is the Director of Product M…
 
There are new cybersecurity tools coming out every day it seems. Why, then, are so many security breaches happening still? Michael Katz, Security Sales Specialist at Infoblox, fills us in on today’s threatscape and what companies can do to protect themselves. In this episode, we cover: Michael’s biggest security concern for today Investing in secur…
 
Is there ever a victimless crime? Cryptojacking - a form of malware that secretly infiltrates your system to steal computing resources for mining cryptocurrency - has gained traction as a steady stream of income for criminal hackers. We sit down with the Technology Director of Western Europe Infoblox, Gary Cox, and the CEO of INSINIA Security, Mike…
 
Billions of devices are all connected together out there in the world... will it actually be possible to map and secure them all? If so, how? Whose responsibility should it be? In this episode we ask Gary Cox, Infoblox’s Technology Director for Western Europe, and Mike Godfrey, CEO of Insignia Security, for answers.…
 
Global volatile ransomware attacks are increasing by 11% year over year. And it’s only continuing to evolve. What do companies need to do to decrease the likelihood of a ransomware attack? What are the best products, toolsets, and controls? These are just a few of the questions we cover with Infoblox technology writer, Gary Cox, and CEO of Insignia…
 
DNS is everywhere — the public cloud, private cloud, the corporate network… That’s exactly why adversaries use it as a control plane for threats. It’s also exactly why it should become the foundational pillar of your cybersecurity architecture. On this episode of the Threat Talk podcast, Craig Sanderson (VP of Security Products at Infoblox) joins u…
 
Do we really want to dramatically increase cybersecurity? Enable DNSSEC… by default. Perhaps that sounds a bit self-serving from a cybersecurity company. But that wasn’t our suggestion. That’s from Matt Larson, VP of Research at ICANN. He joined us on this episode of our ThreatTalk podcast series to discuss how he sees cyber security… and that’s ju…
 
In this episode of Infoblox ThreatTalk, we will double click on security automation and how an integrated ecosystem approach can help speed up incident response. Organizations have reached a point where they are wary of putting in yet another security tool in their network, which will create more alerts and more cycles to manage. They just want the…
 
In this episode of Infoblox Threat Talk, we talk about using DNS (Domain Name Service) as a foundational security architecture for automated, scalable, and early detection of malicious activity. Digital transformations like SD-WAN, IoT, and hybrid cloud are causing an impact on security and are causing organizations to evaluate how to protect their…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login