Look for any podcast host, guest or anyone
Showing episodes and shows of

Infoblox

Shows

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://isc.sans.edu/diary/Phishing%20e-mail%20that%20hides%20malicious%20link%20from%20Outlook%20users/32010 Amazon changing default logging from blocking to non-blocking Amazon will change the default logging mode from blocking to non-blocking. Non-blocking logging will not stop...2025-06-0505 minSANS Stormcast: Daily Cyber Security NewsSANS Stormcast: Daily Cyber Security NewsSANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerabili Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://isc.sans.edu/diary/Phishing%20e-mail%20that%20hides%20malicious%20link%20from%20Outlook%20users/32010 Amazon changing default logging from blocking to non-blocking Amazon will change the default logging mode from blocking to non-blocking. Non-blocking logging will not stop...2025-06-0505 minSANS Internet Storm Center\'s Daily Network Security News PodcastSANS Internet Storm Center's Daily Network Security News PodcastSANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released (#)SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email’s HTML code. Jan suggests that the phishing email is intented to not expose users of  https://isc.sans.edu/diary/Phishing%20e-mail%20that%20hides%20malicious%20link%20from%20Outlook%20users/32010 Amazon changing default logging from blocking to non-blocking Amazon wil...2025-06-0505 minTech Field Day PodcastTech Field Day PodcastSPOTLIGHT. Managing Hybrid Cloud Networks Complexity with InfobloxLearn More about Infoblox at Cloud Field DayManaging hybrid-cloud networks is complex due to differing architectures and naming between on-premises and the multiple public cloud platforms. This Tech Field Day Podcast episode features Glenn Sullivan, Senior Director of Product Management at Infoblox, Eric Wright, and Alastair Cooke. Each public cloud has a unique management console and network management paradigm; none provides deep integration with each other or with on-premises networking. It is left to individual customers to assemble a jigsaw of pieces into a coherent whole. Customers may not plan to use multiple public clouds, but...2025-05-1325 minThe Professional CISOThe Professional CISO🔐 From DNS to AI: Insights from CISO XC Austin | The Professional CISO Show EP60 sponsored by InfobloxGuests: Ryan Rene Rosado & Chris Boykin | Sponsor: Infoblox (www.infoblox.com)Recorded live at CISO XC AustinIn this special on-location episode of The Professional CISO Show, host David Malicoat brings you powerful conversations recorded at CISO XC in Austin, where cybersecurity leaders gathered to tackle today’s most pressing challenges—from career transitions to DNS-layer security.👩‍💼 First, we hear from Ryan Rene Rosado, a dynamic cybersecurity leader, Air Force veteran, and Harvard Extension School TA. Ryan shares candid reflections on consulting vs. in-house security work, why AI isn’t the true endgame, and h...2025-04-2135 minMAPS Talks Charlemos de Ciberseguridad Entre AmigosMAPS Talks Charlemos de Ciberseguridad Entre AmigosMAPS Talks - Charla con Ivan Sánchez - Sales Director LATAM de Infoblox - S01 E05Ivan Sánchez, Director de Ventas de LATAM de Infoblox, explica que el DNS es el corazón de Internet y que es esencial para la navegación y la habilitación de los negocios. También destaca que el protocolo DNS no es nuevo, pero que no fue diseñado con seguridad en mente. Esto ha llevado a que el DNS sea vulnerable a ataques cibernéticos. Infoblox ha desarrollado una solución que puede ayudar a las empresas a proteger sus redes DNS. Esta solución utiliza la automatización para detectar y responder a los ataques de manera...2024-11-0546 minMoor Insights & Strategy PodcastMoor Insights & Strategy PodcastInfoblox CEO Scott Harrell on Networking and Security — What NetOps and SecOps Should Focus On 94/100On this episode of the Moor Insights & Strategy Insider Podcast, host Patrick Moorhead is joined by Scott Harrell, Infoblox CEO. Their discussion explores: Scott’s first year as CEO and where he sees the company going Why DNS is so critical to securing, protecting, and improving performance of the network Key growth and market trends Scott sees across Networking and Security and what the C-Suite, NetOps, and SecOps teams should be thinking about Where Infoblox is headed and what customers and the industry can expect from the company in terms of innovation as they drive to unite networking an...2024-01-1934 minThis Week in Enterprise Tech (Video)This Week in Enterprise Tech (Video)Lost in Translation - Boosting security hygiene, DNS security with Infoblox iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness Month Josh Kuo, Senior Educator and SME in Cyber Security of Infoblox talks about why we need Punycode and how DNS can be a security solution for malicious Punycode. Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: Josh Kuo Download or subscribe to this show at...2023-10-281h 16Infoblox ThreatTalkInfoblox ThreatTalkBreaking Down Domain Takedown ServicesJoin us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am...2023-10-1834 minInfoblox ThreatTalkInfoblox ThreatTalkMeet the Authors: Countering Redirection and Misdirection with DNSMagicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.” Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podca...2023-10-0430 minInfoblox ThreatTalkInfoblox ThreatTalkOutsourcing Teaming, Testing, and Trust with Third PartiesA few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team is well-funded to do everything internally, this episode is a “must-listen”. Tune in to the live broadcast o...2023-09-2022 minInfoblox ThreatTalkInfoblox ThreatTalkMeet the Authors: DNS Insecurity, or DNS in Security?Is your DNS a security risk, or are you taking advantage of its strengths as a security tool?  In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.”  The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource. Learn more about The Hidden Potential of DNS in Security: https://a.co/d/dsE2gypTune in to the liv...2023-09-0629 minInfoblox ThreatTalkInfoblox ThreatTalkOverkill or ‘Just Right’? The Cybersecurity Role of Service ProvidersService Providers are pitching a growing range of options, to businesses of all sizes, in a world where cybersecurity has become so complex and resource intensive that no one can do it all on their own.  Guest David Ayers, a veteran of the service provider space, will help us kick off a new series on service providers beginning with a review of where telecom started, where it is today, and what it might offer in a future of 5G, connected cars, and other imminent world-changing technologies.This series will be a great supplement to other episodes on c...2023-08-1629 minInfoblox ThreatTalkInfoblox ThreatTalkThe Care and Feeding of an Effective Threat Intelligence SystemFrom world cup soccer to horse racing, the slightest mistake can turn a winning ‘favorite’ into a loser.  The same can be true for the various sources of threat intelligence that can make, or break, the effectiveness of our security tools.Join host Bob Hansmann and his guests, threat intelligence and analytics experts Druce MacFarlane and Karthik Haridoss, for a sneak peek into their decision-making process for when to keep, add, or even drop a threat intelligence resource.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month...2023-08-0230 minInfoblox ThreatTalkInfoblox ThreatTalkSecurity Outsourcing: Why, When and How to Make it WorkIn the recent SANS 2022 SOC Survey, a lot of organizations reported that they used ‘outsourcing’ to bolster a wide variety of their SOC functions.  To understand the value of outsourcing, and tips on how to ensure a successful outsourced engagement better, ThreatTalk has invited back guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns.  With years of experience providing a wide range of services to clients, Amit is an ideal resource to help us understand the outsourcing landscape.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the...2023-07-1923 minCuriosity with KristenCuriosity with Kristen6. Kristin Gault, (now) Senior Director at Infoblox, on her job search journeyKristin Gault has pivoted in her career from working at Cisco for 14 years in progressive management roles while reinventing herself from accounting to operations, shared services, customer service and more! Kristin shares her journey after leaving Cisco, being laid off after a year and her ongoing job search journey. Kristin also became an expert on how to leverage LinkedIn, while supporting other job searchers and shares some great tips! After this recording, Kristin landed as Senior Director of Customer Assurance at Infoblox. Congrats Kristin!!Find me on LinkedIn @ www.linkedin.com/in/krev/www.therevellgroup.com2023-06-231h 04Infoblox ThreatTalkInfoblox ThreatTalkThe community has spoken: Top Topics of Q2’ 23What were the hottest security topics discussed in the Infoblox security community during Q2 of 2023?  Host Bob Hansmann is joined by Infoblox community manager Sunil Amanna, and VP of Product Management Craig Sanderson, to review the topics behind some of the quarter’s more active discussions among your peers about cybersecurity.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2023-06-2129 minInfoblox ThreatTalkInfoblox ThreatTalkCenter Stage: Persistent Infrastructure Threat ActorsWhile it is easy to get distracted by the ‘threat of the day’, there are those of us actively hunting instead for the infrastructures that drive and support those kinds of attacks before they are launched, so you can be prepared for the ‘threat of tomorrow’. Renée Burton, Head of Threat Intelligence for Infoblox, presented on this at the recent RSA conference and joins ThreatTalk to share what her team is learning about these infrastructures, the actors behind them, and why this matters so much.2023-06-0729 minInfoblox ThreatTalkInfoblox ThreatTalkMeet the Author: Bill Brenner on the 2023 Global State of Cybersecurity StudyWhile business line execs can get distracted by the latest media cyberthreat hype, effective security professionals stay on top of data-based security research and studies to constantly evolve their security programs. Tune into our latest podcast where we have invited Bill Brenner from the CyberRisk Alliance to discuss their 2023 Global State of Cybersecurity Study. Used to produce over a dozen global, regional, and country-level reports, we will discuss highlights from the study, as well as some insights from Bill that go beyond the report.View the full report here: https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-study...2023-05-1730 minInfoblox ThreatTalkInfoblox ThreatTalkThreatTalk Season 4 PreviewInfoblox is excited to present season 4 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts. 2023-05-0201 minInfoblox ThreatTalkInfoblox ThreatTalkGet FREE 3rd Party Help to Combat Your Cybersecurity Skill ShortageFrom how to get the most out of a specific tool, to general best practices, there is always a lot to learn and a lot to stay on top of for a security professional, and there are limits to how much any single team will know.  In this episode, the community manager for Infoblox, Sunil Amanna, joins us on ThreatTalk to talk about the value of online communities (commonly available at no charge) as a source of information and inspiration, and how to get the most out of your community memberships. Tune in to the live broadcast o...2023-03-2228 minInfoblox ThreatTalkInfoblox ThreatTalkShow Me the Value: Understanding the Security Channel LandscapeFrom storefronts and online box pushers to consultants and outsourcers, the channel partner landscape for cybersecurity continues to evolve.  In this episode of ThreatTalk, guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns, helps us break down the partner landscape, understand how to identify relationships that can uplift our security profile, and share tips on how to qualify potential partners for the greatest chance at success.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Ap...2023-03-0821 minInfoblox ThreatTalkInfoblox ThreatTalkAre There Smarter Ways to Gather and Apply Threat Intelligence?Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. And the ‘best’ blend can vary greatly from one organization to another. So how do you identify the right blend of feeds for your needs? And what are the tools to help you manage your threat intelligence, and apply it to maximum effectiveness?Join us for a replay of a highlight episode from Season 2 of ThreatTalk, where threat intel experts Druce MacFarlane and David Se...2023-02-2233 minInfoblox ThreatTalkInfoblox ThreatTalkA SANS Author Interview: A DNS Security Architecture as a SecOps Force MultiplierLeveraging your DNS architecture can be a much more effective and efficient approach to securing critical business services than relying on DNS security features in a firewall or web gateway. This episode of ThreatTalk will review a new SANS paper on this topic with author John Pescatore, SANS Director of Emerging Security Trends and guest Cricket Liu, Infoblox Chief DNS Architect.  Join host Bob Hansmann and his guests to understand how you can use DNS for more than just a phone book.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday o...2023-02-0832 minIT TrendsettersIT TrendsettersIT Trendsetters with Infoblox | DNS SecuritySynerComm and ChannelBytes held an engaging conversation with Tony Velada, Senior Systems Architect at Infoblox.   In this episode we discuss DNS security and delivering enhanced networking experiences.2023-02-0634 minInfoblox ThreatTalkInfoblox ThreatTalkPart 2 | Eliminating Blind Spots: A Forrester Report on 20-20 VisibilityIn a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.  In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundClo...2023-01-1832 minInfoblox ThreatTalkInfoblox ThreatTalkEliminating Blind Spots: A Forrester Report on 20-20 VisibilityIn a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.  In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundClo...2022-12-0730 minInfoblox ThreatTalkInfoblox ThreatTalkBringing Shadow IT into the LightShadow IT once conjured strong draconian responses from IT and security teams alike to prevent potential security and management nightmares.  But in a world dominated by agility, hybrid work, and fast-moving technology, this approach has become unsustainable.  Our guest, David Seeman, product manager at Infoblox, helps us understand how organizations are managing their risks while taking advantage of the benefits of Shadow IT.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2022-11-1629 minInfoblox ThreatTalkInfoblox ThreatTalkRe:Bots in Disguise-Detecting Cyberthreat CamouflageThreat Actors are also incredible makeup artists.  To penetrate defenses, both human and technological, they have a suitcase full of tools to make any threat look innocent and even desirable.  Guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox joins us to talk about the current state of threat camouflage, and some of the key tools to reveal them before it’s too late. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or St...2022-11-0231 minInfoblox ThreatTalkInfoblox ThreatTalkLosing Sleep over Security: A Halloween ReviewThere is no shortage of “Scary Stories” for Halloween or Cybersecurity Awareness month this year. But a lot of them, despite the media hype, won’t cause most security professionals to lose any sleep. But others might. So we’ve invited back Ed Hunter, the CISO for Infoblox, to talk about the last year and what threats, trends or technologies landed on his list of things to be concerned about.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcas...2022-10-1931 minInfoblox ThreatTalkInfoblox ThreatTalkManaging Risk While Getting Closer to the Network EdgeThe shift to the network edge is transforming the work environment but there is so much information about it, including some confusing marketing messaging, that many are unclear about why it matters, what it costs, and how they should go about assessing and altering their own operations.   The Sr. PMM for cloud-managed core networking solutions at Infoblox, Rod Dixon, joins this episode of ThreatTalk to update us on the shift to the edge, and provide some thoughts that can help anyone trying to make decisions about the transition. Tune in to the live broadcast on LinkedIn and Fa...2022-10-0527 minInfoblox ThreatTalkInfoblox ThreatTalkPaying for Protection: What is the Performance Cost of Security?It is easy to find headline stories of a breach that can be traced to poor security investments and practices. But such stories will continue to appear as many in management persist in restricting security investments. They often cite worker productivity, or even employee satisfaction, as factors. How can SecOps balance the needs for both productivity and protection? Anthony Ciarochi, SecOps Manager for Infoblox, returns to ThreatTalk to discuss.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Pod...2022-09-2130 minInfoblox ThreatTalkInfoblox ThreatTalkA Researchers Story: Uncovering the Omnatour Malvertising NetworkTo deliver malware, threat actors depend on techniques like phishing and malvertising, but malvertising doesn’t get as much visibility.  To address this imbalance, we’ve invited Chance Tudor, an official “Threat Hunter” in the Infoblox threat research group, to talk about his recent work uncovering the Omnatour Malvertising network, an unusually large and persistent threat delivery system.  Our discussion will focus on the behind-the-scenes investigation work, starting with how they even knew a threat even needed to be investigated.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 1...2022-09-0731 minInfoblox ThreatTalkInfoblox ThreatTalkPutting Threat Intelligence Labs Under the MicroscopeIn previous episodes, we’ve discussed the broad array of threat intelligence (TI) available and how important it is to get the right blend of TI.  But where does it all come from?  Renee Burton is the Sr. Director of Threat Intelligence for Infoblox and her teams, produce or curate dozens of threat feeds of different types, so we’ve asked her to help us understand the different kinds of labs producing all of these different types of threat intelligence.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month...2022-08-1729 minInfoblox ThreatTalkInfoblox ThreatTalkDecisions, Decisions: Vulnerable, Exploitable, Patchable or Possibly Ignorable?Vulnerabilities. The breadth of products impacted is growing, while our options for dealing with them are shrinking.  For example, the luxury of having months to test patches in labs before deployment has, in many cases, completely disappeared. So, we have asked the SecOps Manager for Infoblox, Anthony Ciarochi, to be our guest for this episode of ThreatTalk and talk with us about how his security operations are adapting to the current state of vulnerabilities, exploits, and all the rest.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at...2022-08-0330 minK12 Tech TalkK12 Tech TalkEpisode 82 - Interview with InfobloxChris and Josh hang out with David and Jonathan from Infoblox and unpack their IPAM, DNS, and DHCP management options as well as talk security. The guys mention the upcoming Infinite Campus/Tyler Technologies interview as well. Oh, and Mark is missed. Infoblox DDI Buyer's Guide Email us at k12techtalk@gmail.com Tweet us @k12techtalkpod Visit our LinkedIn page HERE. Hang out with us at K12TechPro.com Buy our merch!!! Visit our sponsor: Infoblox 2022-07-2950 minInfoblox ThreatTalkInfoblox ThreatTalkSummer Revival: Sharing Responsibility Between IT and End UsersSince we are in the dog days of summer, we have decided to celebrate the hot weather by reviving our hottest episode from Season 2! In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe t...2022-07-2031 minInfoblox ThreatTalkInfoblox ThreatTalkSolving Hidden SecOps Vulnerabilities with Network DiscoveryThe SecOps benefits from device visibility is limited if that data is incomplete.  Depending on DHCP alone can leave gaps in missed devices and partial data.  Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore. This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies.  As we investigate ‘discovery’ technologies, we’ll look at some additional security benefits they can provide in a world where any vulnerability can be exploited with devastating results.Tune in to the live...2022-07-0631 minInfoblox ThreatTalkInfoblox ThreatTalkOn Top of Everything Else - Why DNS for SecurityIn the beginning… there was a desktop AV and a firewall.  Today, security teams manage scores of security tools from dozens of vendors.  With interest in DNS security growing significantly over the last few years, we need to ask why you would want to invest in it, what would DNS security do to the rest of the security stack, and how would it impact SecOps?  To answer these questions and more, this week’s guest is Anthony James, Infoblox products VP.  An industry veteran with a broad vendor background, he will help us demystify DNS security and understand how it fits...2022-06-2230 minInfoblox ThreatTalkInfoblox ThreatTalkAn Author Interview: 2022 Global State of Security ReportThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We’ll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2022-06-0831 minInfoblox ThreatTalkInfoblox ThreatTalkGaining Enlightenment Through Dark ReadingDark Reading magazine recently published a series of articles on DNS, shining a light on one of the most overlooked areas of cybersecurity despite the role of DNS at the foundation of modern communications. We’ve invited Krupa Srivatsan, a Director in the Infoblox security products team, to share her favorite highlights from this 17 page, in depth review by Dark Reading into the potential security benefits to be found in DNS and other core network services. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Sub...2022-05-1829 minForbes India - Tech ConversationsForbes India - Tech ConversationsJesper Andersen, CEO of Infoblox, on the evolving world of enterprise security in the cloudOur guest today is Jesper Andersen, president and CEO of Infoblox, a leader in enterprise security in the area known as DDI, which combines DNS, DHCP and IP address management — three important sets of rules that govern how devices connect and talk to each other on the internet. In this episode, Jesper talks about how the old security model of perimeter defence is breaking down as cloud computing becomes the norm, especially after the pandemic. Notes: (00:40) Introduction to The Daily Tech Conversation (00:51) Our guest today — Jesper Andersen, CEO of Infoblox (01:44) A brie...2022-05-1232 minInfoblox ThreatTalkInfoblox ThreatTalkA Security Ecosystem Diet for Healthier Risk LevelsHave you figured out a recipe for blending your security solutions into a satisfying ecosystem that optimizes your SecOps while lowering overall risk levels?  If not, join us and our guest Pallavi Singh, an Infoblox lead on security integrations for everything from endpoints to cloud services, as we go beyond the hype and drill into ecosystem pros and cons.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2022-05-0431 minthe Digital Matrixthe Digital MatrixSeason 1 | Episode 4: Using DNS as a Security Mechanism - Interview with Infoblox's Cricket LiuGDT's Kurt Nordquist interviews Cricket Liu, EVP and Chief Evangelist at Infoblox and author of the book "DNS and BIND" about how DNS can be used as an additional layer of an organization's overall Security posture. 2022-04-2118 minInfoblox ThreatTalkInfoblox ThreatTalkIs Network Metadata the New Meta for Security?Security teams have always depended on network and login data to help connect events to users and devices. But is there more to be found in that raw data? What about the metadata being made available on modern hybrid and distributed networks?  We’ve invited veteran networking guru Bob Rose to join us to take a deeper look at ‘metadata’, and the hidden gems for security teams to be found buried in it.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTa...2022-04-2029 minInfoblox ThreatTalkInfoblox ThreatTalkDid You Fall For April Fools 2.0 | Trends In PhishingApril first is a day full of mostly harmless pranks and hijinks; but what about cyber threats that are fooling your users year-round? Join Bob Hansmann and guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox for our annual discussion on the current state of phishing, lookalikes, social engineering, BECs and other evasion techniques. We will pull from recent examples and discuss trends that may help you prepare for future threats.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the T...2022-04-0630 minInfoblox ThreatTalkInfoblox ThreatTalkExamining the State of Nation-state CyberattacksNation-state threats are nothing new but, considering cyberactivity linked to the current crisis in Ukraine, we need to update our understanding of nation-state cyber threat potential, and the security strategies necessary to address them. Join host Bob Hansmann and his guests Ed Hunter, CISO for Infoblox, and Anthony Ciarochi, SecOps Manager for Infoblox, as they take us up a level on the current cyberthreat landscape.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or S...2022-03-1634 minInfoblox ThreatTalkInfoblox ThreatTalkLet’s dwell a moment on ‘Dwell-time’How long would it take your defenses to detect an intruder? Average breach dwell-time estimates range from 24 days to almost a year. So, unless your organization’s acceptable dwell-time falls in that range, we’ve invited Gary Cox to talk about dwell-time and how to reduce it based on his extensive IT and security work throughout Europe.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2022-03-0231 minInfoblox ThreatTalkInfoblox ThreatTalkEmails That Say “ILOVEYOU”: Lessons Learned from the Love Bug VirusThe “I Love You” virus was the first major, global cyberattack of the millennium, setting records for damage and speed of dissemination.  So we’ve invited Infoblox Security Operations Manager Anthony Ciarochi to discuss the evolution of email into the #1 attack vector, and how defenders have adapted to deal with it.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2022-02-1630 minInfoblox ThreatTalkInfoblox ThreatTalkIs Cloud just a networking dream and Hybrid the reality?Everyone talks about moving to the cloud and dreams of one day turning the data center into a VR gaming room.  (For team-building exercises, certainly.)  But, after several years of the ‘moving to cloud’, the world seems to be stuck in a Hybrid state.  So this week’s ThreatTalk invites Vincent Berk, Author at Riverbed Blog, to help us look at the networking and security realities that may be dashing dreams of a 100% cloud future.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the Thr...2022-02-0230 minInfoblox ThreatTalkInfoblox ThreatTalkLog4J: Behind the headlines and beyondThe story around the Log4J vulnerability has been told and retold by countless security publications and vendors. Join us on January 18 as guests Renee Burton and Druce MacFarlane take us behindthe scenes to understand the threat posed by vulnerabilities, the threat actors exploiting them, andhow researchers work to counter those threats. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PDT). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2022-01-1931 minInfoblox ThreatTalkInfoblox ThreatTalkThreatTalk Season 3 PreviewInfoblox is excited to present season 3 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts. 2022-01-0501 minInfoblox ThreatTalkInfoblox ThreatTalkAre There Smarter Ways to Gather and Apply Threat Intelligence?Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. Join us as guests Druce MacFarland and David Seeman discuss key concepts that can help you maximize the value of your own Threat Intel program.Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2021-12-0833 minInfoblox ThreatTalkInfoblox ThreatTalkDoes Security Automation Need To SOAR, Or Just Fly?From writing a few scripts using APIs, to full-fledge SOAR solutions, automation is getting a serious look from those who are seeing little success from throwing bodies at security problems.  But choosing the right automation approach is a tough decision that demands a solid understanding of each option, what it can deliver, and what it will cost in time and money.   Due to his extensive background in security ecosystems, and SOAR solutions in in particular, ThreatTalk has invited Craig Sanderson, VP of Product Management for security solutions at Infoblox, to join us for this discussion.  We look forward...2021-11-1730 minInfoblox ThreatTalkInfoblox ThreatTalkDiscovering Visibility You Didn't Know You Had or Even NeededZero Trust Networking is typically discussed in the context of users or devices connecting to the network. But what about the devices that are already there? Security monitoring needs to include all aspects of the network, as well as the devices and users connected to it.Check out this week’s ThreatTalk podcast with host Bob Hansmann and his guest, veteran networking technology expert Bob Rose of Infoblox, as they examine the security risks and benefits to be found in seldom discussed areas of networking. Learn about the tools for monitoring, managing, and automating security measures for th...2021-11-0331 minInfoblox ThreatTalkInfoblox ThreatTalkAvoiding Dumb Mistakes With Smart CitiesSmart City development is accelerating and even expanding in response to the new world realities of how citizens access services. But solutions to make municipal services easier to access and consume require greater attention to the inherent security of those solutions and the connective foundation they operate on. Over the last year, vulnerability exposures, ransomware, and other headline news have only served to underscore the need for a solid foundation. Reliability, resiliency, and security need to be the building blocks for constructing modern Smart Cities.Guest Krupa Srivatsan, Security Products Director for Infoblox, has been working around...2021-10-2029 minInfoblox ThreatTalkInfoblox ThreatTalkDefending the Endpoint: Sharing Responsibility Between IT and End UsersOctober is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of u...2021-10-0631 minInfoblox ThreatTalkInfoblox ThreatTalkBalancing In-house and Outsourced SecOps30 years ago, cyber security involved little more than firewalls and desktop AV. But today's security tools, expertise, and services are so numerous and complex that few if any, organizations can claim to have everything they need 'in-house'. Due to various needs and constraints, including budgets, it is a constant struggle to balance what capabilities should be in-house and which can be safely outsourced.This episode of ThreatTalk explores the fundamentals behind most outsourcing decisions with the help of telco and service provider veteran David Ayers. Join host Bob Hansmann and his guests for this exploratory discussion on "...2021-09-2228 minInfoblox ThreatTalkInfoblox ThreatTalkDo you know who or what is on your network? - Part 2!On the heels of our last podcast on the need for greater synergy between networking and security technologies, the recent T-Mobile cyberattack has been linked to an unsecured router as the original point of entry. So we are bringing back Bob Rose, a veteran network technologies expert and a former product manager for AT&T's Enterprise Mobility Management. Together, we will explore the security risks that can exist in our networks and how leading companies are controlling them. We'll pay particular attention to the current reality of IoT, BYOD, and the hybrid workplace that only helps to complicate security...2021-09-0830 minInfoblox ThreatTalkInfoblox ThreatTalkDo you know who or what is on your network?Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities. Network data importance has only grown with global shifts toward IoT, BYOD, and the hybrid workplace.Infoblox veteran networking technologies expert Bob Rose joins us to dig into the gold mine of security...2021-08-1829 minInfoblox ThreatTalkInfoblox ThreatTalkQ2 Threat Roundup: Rising Ransoms and Vanishing VillainsA lot has changed on the ransomware landscape in just the last month, with three headline-grabbing breaches and a disappearing act by two of the largest black-market dealers of ransomware tools and services. Join us on ThreatTalk for the return of Michael Zuckerman, consulting senior product marketing manager and author/editor of the ‘Q2 2021 Cyber Threat Intelligence Report’. Michael will help us understand how this critical segment of cyber risk is changing and what it means for defenders and responders alike!Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 1...2021-08-0435 minInfoblox ThreatTalkInfoblox ThreatTalkGrading Threat Intelligence on a Curve – Part 2After a great discussion about using threat intelligence (TI) to improve threat blocking across the entire security stack, we bring back guest Druce MacFarlane for round 2 of this engaging topic. Investigators and responders need access to much more than IoCs to help guide their studies and reach effective response decisions as quickly as possible. But just as we discussed around threat defense last time, not all threat intelligence is created equal. Join host Bob Hansmann and his guest Druce MacFarlane on this week's quest for security enlightenment on ThreatTalk.Tune in to the live broadcast o...2021-07-2128 minThe New Stack PodcastThe New Stack PodcastInfoblox: How DDI Can Help Solve Network Security and Management IllsNetwork connections can be likened to attending an amusement park, where Dynamic Host Configuration Protocol (DHCP), serves as the ticket to enter the park and the domain name system (DNS) is the map around the park. Network management and security provider Infoblox made a name for itself by collapsing those two core pieces into a single platform for enterprises to be able to control where IP addresses are assigned and how they manage network creation and movement."They control their own DNS so that they can have better control over their traffic,” explained Anthony James, Infoblox vice pre...2021-07-2029 minInfoblox ThreatTalkInfoblox ThreatTalkMaking Cyber Insurance PayWith ransoms in the millions called out in headlines, companies are taking a more serious look at cyber insurance. Brushing off scary ‘potential’ damage stories from the security team may be easy for some boards, they cannot easily ignore hard numbers like those in the press.ThreatTalk has invited Krupa Srivatsan, Director of Product Marketing for the security division at Infoblox to discuss cyber insurance in this week’s episode; “Making Cyber Insurance Pay”. Admittedly a broad topic, we will focus on clarifying what cyber insurance really is, what it covers, what it does not, and the factors th...2021-07-0730 minInfoblox ThreatTalkInfoblox ThreatTalkThe Role of Platforms in an Agile WorldEnterprise security teams rarely buy tools based purely on the current set of features and functions. They also assess the vendors' ability to deliver timely support and updates so the solution will continue to provide value over the entire investment period.  In particular, security solutions must be able to quickly adapt to shifts in technology, threat, and even workplace landscapes.  But how can you measure a vendors' ability to deliver on these vague, future requirements?This week's guests on ThreatTalk will discuss how a security vendor's strategic investment in a cloud-native 'platform' can help address these longer-term cus...2021-06-1628 minInfoblox ThreatTalkInfoblox ThreatTalkGrading Threat Intelligence on a CurveSecurity teams consume threat intelligence (TI) in many ways but struggle to find just the right mix because not all TI is created equal. Defenders constantly struggle to find the balance between high detection rates and low false positives. Meanwhile, threat investigators and incident responders need TI they can leverage to make more effective decisions faster. The result can be a complex blend of dozens of threat intelligence feeds.This week Druce MacFarlane, Sr. Product Manager for Security and Analytics at Infoblox, joins us to help break down the threat intelligence that underpins our protection, detection, investigation, and...2021-06-0227 minInfoblox ThreatTalkInfoblox ThreatTalkLooking on the Bright Side of the DarkSideWhile headlines declare the Colonial Pipeline breach a "wake-up call", experienced cybersecurity professionals are biting their tongues from declaring, "I told you so".  So this episode of ThreatTalk will be light on the 'scary stories' of DarkSide to focus more on what we are learning from this latest real-world ransomware incident.Join host Bob Hansmann on this week’s show to go beyond the hype in search of the gems worth learning, with the help of guests Craig Sanderson, VP of Products-Security, and Krupa Srivatsan, Product Marketing Director-Security, both of Infoblox. Tune in to the live...2021-05-1928 minInfoblox ThreatTalkInfoblox ThreatTalkCelebrating May Day and the Anywhere WorkplaceMichael Osterman of Osterman Research joins us on this week's ThreatTalk! Michael and host Bob Hansmann will be discussing the findings from an Osterman survey of security leaders about their long-term strategies and investment plans for a post-COVID world! For context, it will review their current security measures to understand what is working - and what is not. Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2021-05-0523 minInfoblox ThreatTalkInfoblox ThreatTalkQ1 Threat Roundup | Trends, Tactics & TailsThis week our host Bob Hansmann is joined by Infoblox’s consulting senior product marketing manager, Michael Zuckerman. They will be talking about the latest trends and tactics uncovered in the Infoblox Q1 Cyberthreat Intelligence Report. The first quarter of 2021 saw many new cybersecurity issues, and this show is sure to provide some great discussions and actionable insights. Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2021-04-2128 minInfoblox ThreatTalkInfoblox ThreatTalkDid You Fall For April F0015? | Current Trends In PhishingThreatTalk Season 2 kicks off with Bob Hansman and guest Druce MacFarlane, Sr. Product Manager at Infoblox, talking about the current state of phishing. We will discuss social engineering and lookalike tactics that hackers are using to steal valuable data. Tune in to the live event on LinkedIn at 11:00 am (PST).Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.2021-04-0732 minInfoblox ThreatTalkInfoblox ThreatTalkThreatTalk Season 2 Preview | New Host, New Format, Same Great ContentInfoblox is excited to present season 2 of the ThreatTalk podcast series. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts. Infoblox Sr. Product Marketing Manager Bob Hansmann will be hosting ThreatTalk Season 2. Bob has been at the bleeding edge of cybersecurity since the early days when firewall and desktop antivirus were the only solutions available. His background as a developer, researcher, product architect, product manager, and product marketer is ideal for extracting interesting details from our guests on the strategic, tactical, or technical aspects of cybersecurity....2021-03-2902 minMarketing ReportMarketing ReportMonica Toma (Infoblox) - Marketing Report 16 maart 2021Peter Wybenga en sidekick Bas Vlugt gingen tijdens Marketing Report op New Business Radio in gesprek met Jeremiah Albinus van FonQ, Remco Armee van ZorgDomein, Monica Toma van Infoblox en Martijn den Besten van Maqqie. Uiteraard bespraken de heren ook weer het laatste nieuws met René Zeedijk van ZIGT Mediabureau. In Marketing Report ontvangen presentator Peter Wybenga en sidekick Bas Vlugt, elke derde dinsdag van de maand tussen 18:30 en 20:00 uur, bepalende spelers uit de wereld van de marketingcommunicatie. Ze gaan in gesprek over innovaties en trends in media, creatie en...2021-03-1715 minTech BytesTech BytesGet Your Arms Around Network Changes With Infoblox's NetMRI (Sponsored)NetMRI from Infoblox is a network management tool with a variety of capabilities including device discovery and network topology mapping, configuration monitoring, change management, and more. We dive into what this tool can do with guests Ingmar Van Glabbeek, Senior Product Manager at Infoblox; and Adam Fox, Solution Architect at Empowered Networks. Infoblox is our sponsor for this Tech Bytes podcast.2021-02-0817 minThe Everything Feed - All Packet Pushers PodsThe Everything Feed - All Packet Pushers PodsTech Bytes: Get Your Arms Around Network Changes With Infoblox’s NetMRI (Sponsored)NetMRI from Infoblox is a network management tool with a variety of capabilities including device discovery and network topology mapping, configuration monitoring, change management, and more. We dive into what this tool can do with guests Ingmar Van Glabbeek, Senior Product Manager at Infoblox; and Adam Fox, Solution Architect at Empowered Networks. Infoblox is our sponsor for this Tech Bytes podcast.2021-02-0817 minThe Security StrategistThe Security StrategistNavigating a crisis and the benefits of Zero Trust with InfobloxThe majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new challenges for organisations to overcome. One of these challenges has been how we secure remote users and maintain security control for the organisation. The concept of Zero Trust is emerging as the preferred remedy for addressing remote work security challenges. The fundamental goal is to avoid reliance on trusted networks and to treat every system as an untrusted host.In this podcast, Chris Steffen speaks to Krupa Srivatsan, Director of Product Marketing...2021-01-0524 minThe Deep Edge PodcastThe Deep Edge PodcastInfoblox CEO and President Jesper Andersen - Episode 24In this podcast, Ray interviews  Jesper Andersen, CEO, and PresidentTopics discussed:Investments, strategy, and visionThe channel and the opportunity Infoblox's products present for mutual customersCompetitive differentiationOverview of Infoblox strong channel incentives and enablement program2020-10-2019 minInfoblox ThreatTalkInfoblox ThreatTalk19. The CIS Framework and Foundational SecuritySecurity teams are at war.  Every day, attackers, tactics, techniques, and procedures evolve and are used to assault IT security defenses. Enterprises must choose frameworks to help organize their cyber-defense playbooks and run their operations.  The CIS framework provides one of the best options to develop an organization’s security strategies for long term success. Michael Zukerman joins ThreatTalk to detail the CIS Framework and how it guides an organization to develop critical security fundamentals.  Michael outlines the three categories of controls within the CIS Framework in detail and their benefits: 6 essential Basic Security Contr...2020-06-1919 minInfoblox ThreatTalkInfoblox ThreatTalk18. ISO Roadmaps to Foundational SecurityDon’t be stuck in the IT stone age!  The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation. The digital transformation constantly moves data away from traditional enterprise control: Rapid expansion of SaaS Applications hosted everywhere Branch offices on SDWANs Explosion of IoT Teleworkers logging in from unsecured locations Michael Zuckerman joins ThreatTalk to discuss how adopting a robust framework like ISO27001 and ISO27002 can provide a roadmap to taking the initiative back from the attackers.  The ISO standards prov...2020-06-1617 minInfoblox ThreatTalkInfoblox ThreatTalk17. Find Threats Faster Using DNSMost organizations think DNS security means that they must secure their various DNS systems.  However, using DNS security strategically overlays an overarching layer of security capabilities across the enterprise. When harnessing DNS security, an organization can: Bypass the need to configure of hundreds or thousands of firewalls to block specific addresses or websites.   Secure remote users without VPN overhead.   Control access for cloud resources, datacenters, and containers with a single, simple unifying policy.   Detect infrastructure attacks early in the Mitre Framework stages before data exfiltration or command and control attacks can begin Michael Katz joins T...2020-05-0819 minInfoblox ThreatTalkInfoblox ThreatTalk16. 5 Key Threats for Remote WorkersHow can an enterprise protect a surge of remote users? Everyone is scrambling to deal with the consequences of the COVID19 quarantine.  Enterprises suddenly shifted their employees from primarily within the office to primarily working from home.  Now security managers must somehow extend the corporate security stack to non-technical employees working on home networks. Krupa Srivatsan, Director of Product Marketing at Infoblox, joins ThreatTalk to cover 5 key threats for the remote worker. With so many threats, an enterprise security team needs to respond quickly and efficiently.  The best way to do that is to...2020-04-2421 minInfoblox ThreatTalkInfoblox ThreatTalk15. Hidden Dangers with DNS Over HTTPSHow can a heralded new feature from Firefox be dangerous? When the consumer-protecting DNS over HTTPS (DoH) feature creates a default that dangerously bypasses enterprise security and exposes organizations to serious risks. Krupa Srivastan, Director of Product Marketing at Infoblox, discusses key issues with DoH and best practices to regain control of the DNS traffic to protect the enterprise environment.2020-04-0307 minInfoblox ThreatTalkInfoblox ThreatTalk14. DNS Flag Days Improve the InternetThe EVP Engineering and Chief DNS Architect at Infoblox, Cricket Liu, joins us on Threat Talk to talk about DNS Flag Days – why we need them and how they are improving the internet.  DNS Flag Days serve notices to obsolete Domain Name System (DNS) servers that existing accommodations to provide them with compatibility for pre-1999 standards will be phased out.  The Flag Days attempt to: Speed up DNS Improve DNS reliability Improve DNS security In 1999, DNS was extended with eDNS(0), yet servers incompatible with eDNS(0) continue to be used today.  To improve the p...2020-02-1911 minInfoblox ThreatTalkInfoblox ThreatTalk13. Fundamentals of Zero Trust PrinciplesHow can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD?  A breach is going to happen so limit the impact using Zero Trust principles:  Focus on the Data Trust no user  Trust no communication Deny access by default and provide minimal access when required   Consulting Senior Product Marketing Manager at Infoblox, Michael Zuckerman, joins Threat Talk to discuss Zero Trust in detail.  Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryp...2020-02-0722 minInfoblox ThreatTalkInfoblox ThreatTalk12. Securing Your DNS InfrastructureDid you know that over 90% of the malware incidents and over half of all ransomware and data theft attacks rely on DNS as a vector. In today’s day and age, securing your DNS has never been more critical. Today we’re joined by David Ayers, a member of the Infoblox product marketing team, who is responsible for service provider and DNS privacy messaging. David fills us in on biggest security concerns and how to secure your DNS infrastructure. To listen to this episode and many more like it, subscribe to ThreatTalk on Appl...2020-01-1522 minInfoblox ThreatTalkInfoblox ThreatTalk11. How the MITRE ATT&CK Framework Increases Objectivity in Cyber DefenseObjectivity in cyber defense is the goal, but, too often, emotion of the room rules the day. In this episode, seasoned IT expert Michael Zuckerberg joins us to explain the MITRE ATT&CK framework and how to utilize it to reduce subjectivity and increase your cyber defense systems. Michael is a consulting senior product marketing manager at Infoblox, an expert consultant in B2B product marketing and marketing strategy, with experience in cybersecurity and enterprise SaaS software markets. He has extensive domain experience in all facets of cybersecurity. What we talked...2019-11-2022 minInfoblox ThreatTalkInfoblox ThreatTalk10. DNS Content Filtering: Why It Makes Sense (& Saves Money)“Your employer’s firewall has blocked access to this website.” That’s a good way to protect a network. But its a bad way to cost effectively protect your network. There’s a better way, using DNS, which costs far less, and it’s extremely accurate.   On this episode, Director of Product Marketing at Infoblox, Krupa Srivatsan, discusses how DNS can be utilized to protect your network.   What we talked about: Content filtering at the DNS level Blocking objectionable material DNS vs firewall protection   You can find this inter...2019-11-1313 minInfoblox ThreatTalkInfoblox ThreatTalk9. How the NIST Cybersecurity Framework Helps You Stop Today’s CyberthreatsDNS, DHCP, IPAM — most people within IT understand how these ensure connectivity. But they can, and should, also be leveraged as the major defenses for your network.   On this episode of the ThreatTalk podcast, Krupa Srivatsan joined us to discuss the security defense methodologies inherent within DHS, DHCP, & IPAM.   Krupa is the Director of Product Marketing at Infoblox. She has an MBA from Berkeley, and has worked with Pfizer, Agilent, Cisco Systems, and others.   What we talked about: DNS, DHCP, & IPAM IOT Network Insights — key feature of Info...2019-11-0618 minInfoblox ThreatTalkInfoblox ThreatTalk8. Exploring Today’s Threatscape w/ Michael KatzThere are new cybersecurity tools coming out every day it seems. Why, then, are so many security breaches happening still? Michael Katz, Security Sales Specialist at Infoblox, fills us in on today’s threatscape and what companies can do to protect themselves. In this episode, we cover: Michael’s biggest security concern for today Investing in security tools Building a ground-up security strategy Mitigating security risks To listen to this episode and many more like it, subscribe to ThreatTalk on Apple Podcasts or tune in on our website.2019-10-0310 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Black Hat Interviews: Attivo Networks and Infoblox - ESW #152We interview Carolyn Crandall, the Chief Deception Officer at Attivo Networks. Carolyn will discussing the deception technology fabric, which interweaves "wolves in sheep's clothing" throughout the network to deceive attackers, detect their presence, and derail their attacks. We interview Krupa Srivatsan, the Director of Security Products at Infoblox. Krupa will talk about Network Security Foundations for Digital Transformation. Full Show Notes: https://wiki.securityweekly.com/ES_Episode152 Visit https://www.securityweekly.com/esw for all the latest episodes!2019-09-0630 minInfoblox ThreatTalkInfoblox ThreatTalk7. Keep Your Cryptocurrencies Safe From Crypto-JackersIs there ever a victimless crime?   Cryptojacking - a form of malware that secretly infiltrates your system to steal computing resources for mining cryptocurrency - has gained traction as a steady stream of income for criminal hackers.   We sit down with the Technology Director of Western Europe Infoblox, Gary Cox, and the CEO of INSINIA Security, Mike Godfrey, to discuss combatting cryptojacking. In this episode, we cover common cryptojacking behavior, detecting crypto-jackers, and more.2019-07-3131 minInfoblox ThreatTalkInfoblox ThreatTalk6. Is It Possible to Secure Billions of Devices Out in the World?Billions of devices are all connected together out there in the world... will it actually be possible to map and secure them all? If so, how?  Whose responsibility should it be? In this episode we ask Gary Cox, Infoblox’s Technology Director for Western Europe, and Mike Godfrey, CEO of Insignia Security, for answers.2019-07-2432 minInfoblox ThreatTalkInfoblox ThreatTalk5. Ransomware Today: Everything You Need to Know to Protect Your BusinessGlobal volatile ransomware attacks are increasing by 11% year over year. And it’s only continuing to evolve. What do companies need to do to decrease the likelihood of a ransomware attack? What are the best products, toolsets, and controls? These are just a few of the questions we cover with Infoblox technology writer, Gary Cox, and CEO of Insignia Security, Mike Godfrey.  In this episode, we traverse everything from cyber hygiene to cyber-attack investigations and more.2019-07-1833 minInfoblox ThreatTalkInfoblox ThreatTalk4. DNS Is Everywhere (So Make It Your Main Cybersecurity Defense)DNS is everywhere — the public cloud, private cloud, the corporate network… That’s exactly why adversaries use it as a control plane for threats. It’s also exactly why it should become the foundational pillar of your cybersecurity architecture. On this episode of the Threat Talk podcast, Craig Sanderson  (VP of Security Products at Infoblox) joins us to share how we should rethink cybersecurity with DNS. On this episode, we discuss how DNS can be utilized to distribute threat information across an organization, and become a basis for you cybersecurity infrastructure (and exactly how we’re doing th...2019-07-0420 minInfoblox ThreatTalkInfoblox ThreatTalk3. DNS Security Best Practices, with Matt LarsonDo we really want to dramatically increase cybersecurity? Enable DNSSEC… by default. Perhaps that sounds a bit self-serving from a cybersecurity company. But that wasn’t our suggestion. That’s from Matt Larson, VP of Research at ICANN. He joined us on this episode of our ThreatTalk podcast series to discuss how he sees cyber security… and that’s just one of his phenomenal ideas on the subject. In this episode, he also dives into: Completely separating recursive servers from authoritative servers, DNSSEC Validation, DNS cache poisoning, and other DNS security best practice2019-06-1931 minInfoblox ThreatTalkInfoblox ThreatTalk2. Automating Cybersecurity Through Ecosystem IntegrationIn this episode of Infoblox ThreatTalk, we will double click on security automation and how an integrated ecosystem approach can help speed up incident response. Organizations have reached a point where they are wary of putting in yet another security tool in their network, which will create more alerts and more cycles to manage. They just want the stuff they already have to work better and help them do their jobs with minimum overhead. Presenters: Krupa Srivatsan, Director of Product Marketing for Security at Infoblox and Craig Sanderson, VP of Security Product Management at Infoblox2019-06-1521 minInfoblox ThreatTalkInfoblox ThreatTalk1. Using DNS as a Foundational Security Architecture for Scalable Malware MitigationIn this episode of Infoblox Threat Talk, we talk about using DNS (Domain Name Service) as a foundational security architecture for automated, scalable, and early detection of malicious activity. Digital transformations like SD-WAN, IoT, and hybrid cloud are causing an impact on security and are causing organizations to evaluate how to protect their data and applications. Presenters: Krupa Srivatsan, Director of Product Marketing for Security at Infoblox and Craig Sanderson, VP of Security Product Management at Infoblox2019-05-2721 minChanging ChannelsChanging ChannelsEpisode 63: Infoblox’s Lori Cornmesser on Producing Great Channel EventsChannel events and conferences are common, but not always great. Vendors want to build enthusiasm and momentum by bringing partners together to hear about products, programs, and objectives. Achieving that goal takes more than just setting dates and bringing partners to a hotel ballroom. It requires vision and thoughtful planning and execution. And what happens before and after channel events is just as important as what happens at the conference itself, if not more so. Lori Cornmesser, Infoblox’s vice president of worldwide partner and alliance sales, joins Pod2112 to talk about her first partner summit at Infoblox and wh...2018-11-1421 minpod2112 Podcastpod2112 PodcastInfoblox’s Lori Cornmesser on Producing Great Channel EventsChannel events and conferences are common, but not always great. Vendors want to build enthusiasm and momentum by bringing partners together to hear about products, programs, and objectives. Achieving that goal takes more than just setting dates and bringing partners to a hotel ballroom. It requires vision and thoughtful planning and execution. And what happens before and after channel events is just as important as what happens at the conference itself, if not more so. Lori Cornmesser, Infoblox’s vice president of worldwide partner and alliance sales, joins Pod2112 to talk about her first partner summit at Infoblox and wh...2018-11-1400 minThe Lippis Report PodcastThe Lippis Report PodcastInfoblox Automates Transition to IPv6Having a plan to transition to IPv6 has moved way up in the priority list of IT projects for IT leaders as 2011 was officially the year we ran out of IPv4 unallocated addresses and not having IPv6 could cut-off corporations and applications from accessing the internet.  In addition employees en masse are “BYOD” or bring your own device meaning smartphone and tables to work increasing the number of devices on the network significantly.  These devices and their applications are driving support of both IPv4 and IPv6 as many mobile devices are now set for IPv6 as the default.  As dual st...2011-12-1312 minThe Lippis Report PodcastThe Lippis Report PodcastInfoblox plug-in for VMware vCenter Orchestrator Automates Network Changes in Virtualized InfrastructureThe Inflobox plug-in module for VMware’s vCenter Orchestrator promises to bridge network and virtual IT team silos by enabling automated assignment of IP addresses to VMs. The Infloblox plug-in enables IP addresses to be automatically assigned to virtual machines in less than a minute and then constantly monitored and managed, which simplifies troubleshooting, accelerates time to value and offers greater flexibility for the virtual team.  Steve Garrison, VP Marketing for Infoblox and I discuss the problems of networking in virtualized environments and how Infoblox’s vCenter plug-in solves them.2011-12-1309 min