In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security…
From $400 toasters to robotics, AI seems to be showing up everywhere. But between doomsday predictions and the promises of a utopian future, what is a more realistic assessment of how AI can fit into the world of cybersecurity? Join us for a down-to-earth discussion with guests Karthik Haridoss and David Seeman, who are at the forefront of efforts to integrate AI into a variety of security tools.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.
From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.” Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.
Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.
Magicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.” Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing' to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team is well-funded to do everything internally, this episode is a “must-listen”. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
Is your DNS a security risk, or are you taking advantage of its strengths as a security tool? In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.” The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource. Learn more about The Hidden Potential of DNS in Security: https://a.co/d/dsE2gypTune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
Service Providers are pitching a growing range of options, to businesses of all sizes, in a world where cybersecurity has become so complex and resource intensive that no one can do it all on their own. Guest David Ayers, a veteran of the service provider space, will help us kick off a new series on service providers beginning with a review of where telecom started, where it is today, and what it might offer in a future of 5G, connected cars, and other imminent world-changing technologies.This series will be a great supplement to other episodes on consultant and channel partner service offerings, to help listeners balance the best ways to achieve their desired security posture within budget, time, people, and other realities.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
From world cup soccer to horse racing, the slightest mistake can turn a winning ‘favorite' into a loser. The same can be true for the various sources of threat intelligence that can make, or break, the effectiveness of our security tools.Join host Bob Hansmann and his guests, threat intelligence and analytics experts Druce MacFarlane and Karthik Haridoss, for a sneak peek into their decision-making process for when to keep, add, or even drop a threat intelligence resource.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
In the recent SANS 2022 SOC Survey, a lot of organizations reported that they used ‘outsourcing' to bolster a wide variety of their SOC functions. To understand the value of outsourcing, and tips on how to ensure a successful outsourced engagement better, ThreatTalk has invited back guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns. With years of experience providing a wide range of services to clients, Amit is an ideal resource to help us understand the outsourcing landscape.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
What were the hottest security topics discussed in the Infoblox security community during Q2 of 2023? Host Bob Hansmann is joined by Infoblox community manager Sunil Amanna, and VP of Product Management Craig Sanderson, to review the topics behind some of the quarter's more active discussions among your peers about cybersecurity.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
While it is easy to get distracted by the ‘threat of the day', there are those of us actively hunting instead for the infrastructures that drive and support those kinds of attacks before they are launched, so you can be prepared for the ‘threat of tomorrow'. Renée Burton, Head of Threat Intelligence for Infoblox, presented on this at the recent RSA conference and joins ThreatTalk to share what her team is learning about these infrastructures, the actors behind them, and why this matters so much.
While business line execs can get distracted by the latest media cyberthreat hype, effective security professionals stay on top of data-based security research and studies to constantly evolve their security programs. Tune into our latest podcast where we have invited Bill Brenner from the CyberRisk Alliance to discuss their 2023 Global State of Cybersecurity Study. Used to produce over a dozen global, regional, and country-level reports, we will discuss highlights from the study, as well as some insights from Bill that go beyond the report.View the full report here: https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-studyTune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Infoblox is excited to present season 4 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.
From how to get the most out of a specific tool, to general best practices, there is always a lot to learn and a lot to stay on top of for a security professional, and there are limits to how much any single team will know. In this episode, the community manager for Infoblox, Sunil Amanna, joins us on ThreatTalk to talk about the value of online communities (commonly available at no charge) as a source of information and inspiration, and how to get the most out of your community memberships. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
From storefronts and online box pushers to consultants and outsourcers, the channel partner landscape for cybersecurity continues to evolve. In this episode of ThreatTalk, guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns, helps us break down the partner landscape, understand how to identify relationships that can uplift our security profile, and share tips on how to qualify potential partners for the greatest chance at success.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Everyone talks about threat intelligence as if it was a ‘thing' you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. And the ‘best' blend can vary greatly from one organization to another. So how do you identify the right blend of feeds for your needs? And what are the tools to help you manage your threat intelligence, and apply it to maximum effectiveness?Join us for a replay of a highlight episode from Season 2 of ThreatTalk, where threat intel experts Druce MacFarlane and David Seeman walk us through some of the key issues that can help you get the most from your threat intelligence program.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Leveraging your DNS architecture can be a much more effective and efficient approach to securing critical business services than relying on DNS security features in a firewall or web gateway. This episode of ThreatTalk will review a new SANS paper on this topic with author John Pescatore, SANS Director of Emerging Security Trends and guest Cricket Liu, Infoblox Chief DNS Architect. Join host Bob Hansmann and his guests to understand how you can use DNS for more than just a phone book.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
In a world where most security tools are ‘user-centric', devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers. In this episode of ThreatTalk, we've invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
In a world where most security tools are ‘user-centric', devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers. In this episode of ThreatTalk, we've invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Shadow IT once conjured strong draconian responses from IT and security teams alike to prevent potential security and management nightmares. But in a world dominated by agility, hybrid work, and fast-moving technology, this approach has become unsustainable. Our guest, David Seeman, product manager at Infoblox, helps us understand how organizations are managing their risks while taking advantage of the benefits of Shadow IT.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Threat Actors are also incredible makeup artists. To penetrate defenses, both human and technological, they have a suitcase full of tools to make any threat look innocent and even desirable. Guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox joins us to talk about the current state of threat camouflage, and some of the key tools to reveal them before it's too late. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
There is no shortage of “Scary Stories” for Halloween or Cybersecurity Awareness month this year. But a lot of them, despite the media hype, won't cause most security professionals to lose any sleep. But others might. So we've invited back Ed Hunter, the CISO for Infoblox, to talk about the last year and what threats, trends or technologies landed on his list of things to be concerned about. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
The shift to the network edge is transforming the work environment but there is so much information about it, including some confusing marketing messaging, that many are unclear about why it matters, what it costs, and how they should go about assessing and altering their own operations. The Sr. PMM for cloud-managed core networking solutions at Infoblox, Rod Dixon, joins this episode of ThreatTalk to update us on the shift to the edge, and provide some thoughts that can help anyone trying to make decisions about the transition. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
It is easy to find headline stories of a breach that can be traced to poor security investments and practices. But such stories will continue to appear as many in management persist in restricting security investments. They often cite worker productivity, or even employee satisfaction, as factors. How can SecOps balance the needs for both productivity and protection? Anthony Ciarochi, SecOps Manager for Infoblox, returns to ThreatTalk to discuss. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
To deliver malware, threat actors depend on techniques like phishing and malvertising, but malvertising doesn't get as much visibility. To address this imbalance, we've invited Chance Tudor, an official “Threat Hunter” in the Infoblox threat research group, to talk about his recent work uncovering the Omnatour Malvertising network, an unusually large and persistent threat delivery system. Our discussion will focus on the behind-the-scenes investigation work, starting with how they even knew a threat even needed to be investigated. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
In previous episodes, we've discussed the broad array of threat intelligence (TI) available and how important it is to get the right blend of TI. But where does it all come from? Renee Burton is the Sr. Director of Threat Intelligence for Infoblox and her teams, produce or curate dozens of threat feeds of different types, so we've asked her to help us understand the different kinds of labs producing all of these different types of threat intelligence. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Vulnerabilities. The breadth of products impacted is growing, while our options for dealing with them are shrinking. For example, the luxury of having months to test patches in labs before deployment has, in many cases, completely disappeared. So, we have asked the SecOps Manager for Infoblox, Anthony Ciarochi, to be our guest for this episode of ThreatTalk and talk with us about how his security operations are adapting to the current state of vulnerabilities, exploits, and all the rest. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Since we are in the dog days of summer, we have decided to celebrate the hot weather by reviving our hottest episode from Season 2! In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
The SecOps benefits from device visibility is limited if that data is incomplete. Depending on DHCP alone can leave gaps in missed devices and partial data. Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore. This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies. As we investigate ‘discovery' technologies, we'll look at some additional security benefits they can provide in a world where any vulnerability can be exploited with devastating results. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
In the beginning… there was a desktop AV and a firewall. Today, security teams manage scores of security tools from dozens of vendors. With interest in DNS security growing significantly over the last few years, we need to ask why you would want to invest in it, what would DNS security do to the rest of the security stack, and how would it impact SecOps? To answer these questions and more, this week's guest is Anthony James, Infoblox products VP. An industry veteran with a broad vendor background, he will help us demystify DNS security and understand how it fits, or not, in a security profile. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
ThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We'll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Dark Reading magazine recently published a series of articles on DNS, shining a light on one of the most overlooked areas of cybersecurity despite the role of DNS at the foundation of modern communications. We've invited Krupa Srivatsan, a Director in the Infoblox security products team, to share her favorite highlights from this 17 page, in depth review by Dark Reading into the potential security benefits to be found in DNS and other core network services. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Have you figured out a recipe for blending your security solutions into a satisfying ecosystem that optimizes your SecOps while lowering overall risk levels? If not, join us and our guest Pallavi Singh, an Infoblox lead on security integrations for everything from endpoints to cloud services, as we go beyond the hype and drill into ecosystem pros and cons. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Security teams have always depended on network and login data to help connect events to users and devices. But is there more to be found in that raw data? What about the metadata being made available on modern hybrid and distributed networks? We've invited veteran networking guru Bob Rose to join us to take a deeper look at ‘metadata', and the hidden gems for security teams to be found buried in it. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
April first is a day full of mostly harmless pranks and hijinks; but what about cyber threats that are fooling your users year-round? Join Bob Hansmann and guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox for our annual discussion on the current state of phishing, lookalikes, social engineering, BECs and other evasion techniques. We will pull from recent examples and discuss trends that may help you prepare for future threats. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Nation-state threats are nothing new but, considering cyberactivity linked to the current crisis in Ukraine, we need to update our understanding of nation-state cyber threat potential, and the security strategies necessary to address them. Join host Bob Hansmann and his guests Ed Hunter, CISO for Infoblox, and Anthony Ciarochi, SecOps Manager for Infoblox, as they take us up a level on the current cyberthreat landscape. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
How long would it take your defenses to detect an intruder? Average breach dwell-time estimates range from 24 days to almost a year. So, unless your organization's acceptable dwell-time falls in that range, we've invited Gary Cox to talk about dwell-time and how to reduce it based on his extensive IT and security work throughout Europe. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
The “I Love You” virus was the first major, global cyberattack of the millennium, setting records for damage and speed of dissemination. So we've invited Infoblox Security Operations Manager Anthony Ciarochi to discuss the evolution of email into the #1 attack vector, and how defenders have adapted to deal with it. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Everyone talks about moving to the cloud and dreams of one day turning the data center into a VR gaming room. (For team-building exercises, certainly.) But, after several years of the ‘moving to cloud', the world seems to be stuck in a Hybrid state. So this week's ThreatTalk invites Vincent Berk, Author at Riverbed Blog, to help us look at the networking and security realities that may be dashing dreams of a 100% cloud future. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
The story around the Log4J vulnerability has been told and retold by countless security publications and vendors. Join us on January 18 as guests Renee Burton and Druce MacFarlane take us behindthe scenes to understand the threat posed by vulnerabilities, the threat actors exploiting them, andhow researchers work to counter those threats. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PDT). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Infoblox is excited to present season 3 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.
Everyone talks about threat intelligence as if it was a ‘thing' you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. Join us as guests Druce MacFarland and David Seeman discuss key concepts that can help you maximize the value of your own Threat Intel program. Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
From writing a few scripts using APIs, to full-fledge SOAR solutions, automation is getting a serious look from those who are seeing little success from throwing bodies at security problems. But choosing the right automation approach is a tough decision that demands a solid understanding of each option, what it can deliver, and what it will cost in time and money. Due to his extensive background in security ecosystems, and SOAR solutions in in particular, ThreatTalk has invited Craig Sanderson, VP of Product Management for security solutions at Infoblox, to join us for this discussion. We look forward to hearing both his technical and philosophical perspectives on important issues around automation including' “Just because you ‘can' automate a thing, it doesn't mean you ‘should' automate it.” Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Zero Trust Networking is typically discussed in the context of users or devices connecting to the network. But what about the devices that are already there? Security monitoring needs to include all aspects of the network, as well as the devices and users connected to it. Check out this week's ThreatTalk podcast with host Bob Hansmann and his guest, veteran networking technology expert Bob Rose of Infoblox, as they examine the security risks and benefits to be found in seldom discussed areas of networking. Learn about the tools for monitoring, managing, and automating security measures for these foundational areas of modern networks. Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Smart City development is accelerating and even expanding in response to the new world realities of how citizens access services. But solutions to make municipal services easier to access and consume require greater attention to the inherent security of those solutions and the connective foundation they operate on. Over the last year, vulnerability exposures, ransomware, and other headline news have only served to underscore the need for a solid foundation. Reliability, resiliency, and security need to be the building blocks for constructing modern Smart Cities. Guest Krupa Srivatsan, Security Products Director for Infoblox, has been working around the world with those on the front lines of Smart City planning and deployment. She will join host Bob Hansmann on Threat Talk to discuss risks imposed by our new world reality and essential steps that deliver significant, smart city-wide security benefits. Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility? In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality. Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
30 years ago, cyber security involved little more than firewalls and desktop AV. But today's security tools, expertise, and services are so numerous and complex that few if any, organizations can claim to have everything they need 'in-house'. Due to various needs and constraints, including budgets, it is a constant struggle to balance what capabilities should be in-house and which can be safely outsourced. This episode of ThreatTalk explores the fundamentals behind most outsourcing decisions with the help of telco and service provider veteran David Ayers. Join host Bob Hansmann and his guests for this exploratory discussion on "getting help" with your cybersecurity. Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
On the heels of our last podcast on the need for greater synergy between networking and security technologies, the recent T-Mobile cyberattack has been linked to an unsecured router as the original point of entry. So we are bringing back Bob Rose, a veteran network technologies expert and a former product manager for AT&T's Enterprise Mobility Management. Together, we will explore the security risks that can exist in our networks and how leading companies are controlling them. We'll pay particular attention to the current reality of IoT, BYOD, and the hybrid workplace that only helps to complicate security efforts. Visibility for Hybrid Networking and Security webinar: https://youtu.be/CptSuDpA51U?fbclid=IwAR0HH4fU7Kcqq-FFKaehmiEFA8UBr7YQ7u1qocrrCBQd4ktLJBP1fM5oADQ (https://youtu.be/CptSuDpA51U) Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities. Network data importance has only grown with global shifts toward IoT, BYOD, and the hybrid workplace. Infoblox veteran networking technologies expert Bob Rose joins us to dig into the gold mine of security benefits to be found in network data, tools, and technologies, much of which you probably already have. Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
A lot has changed on the ransomware landscape in just the last month, with three headline-grabbing breaches and a disappearing act by two of the largest black-market dealers of ransomware tools and services. Join us on ThreatTalk for the return of Michael Zuckerman, consulting senior product marketing manager and author/editor of the ‘Q2 2021 Cyber Threat Intelligence Report'. Michael will help us understand how this critical segment of cyber risk is changing and what it means for defenders and responders alike! Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
After a great discussion about using threat intelligence (TI) to improve threat blocking across the entire security stack, we bring back guest Druce MacFarlane for round 2 of this engaging topic. Investigators and responders need access to much more than IoCs to help guide their studies and reach effective response decisions as quickly as possible. But just as we discussed around threat defense last time, not all threat intelligence is created equal. Join host Bob Hansmann and his guest Druce MacFarlane on this week's quest for security enlightenment on ThreatTalk. Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.