6 episodes

Lock and Shield is a podcast about all things digital security created to bring subject matter experts and listeners together in a collaborative space that fosters an engaging collision of ideas and revelations.
Eye-opening, and at times, mind-blowing, this dynamic podcast sheds the brightest light on the current and coming trends and solutions that will empower online security – now - and in the future.

Hosted by Neustar’s John McArthur this open dialogue forum unapologetically tackles the security issues of the day.

Lock & Shield Neustar

    • Technology

Lock and Shield is a podcast about all things digital security created to bring subject matter experts and listeners together in a collaborative space that fosters an engaging collision of ideas and revelations.
Eye-opening, and at times, mind-blowing, this dynamic podcast sheds the brightest light on the current and coming trends and solutions that will empower online security – now - and in the future.

Hosted by Neustar’s John McArthur this open dialogue forum unapologetically tackles the security issues of the day.

    Asset or Risk? Is Your Business Adapting to Required Data Privacy Regulations?

    Asset or Risk? Is Your Business Adapting to Required Data Privacy Regulations?

    “So, then it is identifying an individual. Knowing that that individual – you don't have to know their name. Always try to remember the fact that you may not know the name of your neighbor, but you can certainly identify them. Same kind of thing. You don't have to be able to attach this online information to a person's offline world in order for it to count as personal information.”

    Nicole Killen,
    VP and Chief Privacy Officer, Neustar

    Episode 6 explores the ever-changing world of data privacy regulations, as John and Paige take a deep dive into the considerations, legislation ​​and risks associated with the compliance burden of data privacy and its integration into the deepest levels of your business.

    The Deep History of Privacy Protection – The surprising beginning of data privacy and how the invention of the internet helped further the need to secure personal and private information.

    Personally Identifiable or Identifying Information – Learn how identifiable information can lead to potential risks for businesses that misuse and mis-handle collected personal data.

    GDPR and CCPA Regulations – Discover the role global regulations play in the development of privacy protections right here in the U.S.

    What You Need to Know About Transferring of Data – Learn how the protection of data in one country still applies to that data regardless of what country it has been transferred.

    The Future of Regulations in the U.S. and Globally – A brief look at where regulations are headed around the globe as well as right here in the U.S., and how prepared your enterprise needs to be to insure you’re being privacy-friendly.

    • 51 min
    Is DNS Mission Critical to the Success of Your Enterprise? You Bet Your DNS it is.

    Is DNS Mission Critical to the Success of Your Enterprise? You Bet Your DNS it is.

    “To give you an idea of scale, the entire set of all machines on the internet, someone came up with an ASCII art file that you could print out on 11 sheets of standard paper. And it was actually not a list. It was an actual map that showed every single machine that was on the internet and what their hostname was and what their IP address was. Because that was how many machines there were….”

    -  Paul Ebersman

    In episode 5, John dials in on the world of DNS to understand the important role it plays in modern enterprises and how the unprepared can be vulnerable to malicious DNS attacks. Special guest Paul Ebersman (Principal Software Engineer at Neustar) joins John in educating enterprises about the mission critical role DNS plays.

    The History of DNS– Understanding the needs that led to the development of a domain naming system and its implications.

    Malicious Attacks– Vulnerability from DNS attacks and how they can paralyze enterprises with an unhealthy infrastructure.

    Security & Privacy– Discover the role informed security, public and private crypto keys play in putting privacy barriers in place to secure your organization.

    Choosing a DNS Operator – A highlight of the best practices surrounding choosing a DNS operator to help maintain business accessibility and availability.

    • 47 min
    The Ransomware Epidemic: How to Protect Against Cyber Attacks with a Zero-Trust Security Model

    The Ransomware Epidemic: How to Protect Against Cyber Attacks with a Zero-Trust Security Model

    In episode 4, John exposes the truth behind cyber criminals and the disturbing trend of increased ransomware attacks. Brian Kime, Forrester’s Senior Security and Risk Analyst, is John’s special guest as the two go deep to shed light on cyber threats and how businesses can implement zero-trust to prevent these attacks.

    Highlights:

    How cyber attacks are evolving – Incentives and key factors behind today’s cyber-criminal activity.

    Getting the Feds involved – Examining if/how the government will play a role in mitigating ransom attacks.

    Stopping attacks before they happen - What solutions are out there to protect you?  What is Zero-Trust and why is it gaining traction?

    State of the nation – Breaking down the last 18 months of new developments.

    • 40 min
    DDoS Attacks: The Past, Present & Future of Protecting Against Them

    DDoS Attacks: The Past, Present & Future of Protecting Against Them

    In episode 3, John and Paige get the uncensored history of DDoS attacks from special guest Matt Wilson, as they discuss the how’s of future proofing your web infrastructure against cyber attacks.

    Highlights:

    The inception of DDoS – here did this technology originate and how has it evolved since?

    The wild world hacking – Matt breaks down some fascinating stories from the early days of sophisticated hacking.

    Pathway to Multi-Cloud? How does Neustar adapt its security for cloud platforms?

    Nation State Attacks – Hacking at the next level, how do government entities get involved in all of this?

    Future Planning – What does the future look like for UltraDDoS and Ultra WAF?

    • 45 min
    Ransomware: To pay or not to pay. The moral dilemma of the 21st century

    Ransomware: To pay or not to pay. The moral dilemma of the 21st century

    In this episode, we examine COVID-19’s impact on cybersecurity, ransomware and the challenges companies face in the 21st century. Neustar’s John McArthur and Paige Enoch discuss data breaches, data exfiltration, cyber espionage and the solutions needed to protect your infrastructure.

    And most importantly, what are the implications of paying a ransomware demand to gain access to your resources?

    Highlights:

    Growth of ransomware attacks during COVID-19 – John and Paige explore how attackers are getting bolder with the average ransom demands continuing to increase.

    Hospitals as targets – John and Paige discuss why the hacker ceasefire with hospitals is over and why that should terrify us.

    Election security – Although there was no evidence of interference in the 2020 election, there were foreign actors who were intent on disrupting the election.  What does that mean for election cybersecurity going forward?

    Attacks on our infrastructure – John discusses the potential infrastructure attacks that keep Americans up at night.

    • 37 min
    COVID-19 and Streaming Media: After the huge surge in subscribers, what does the future look like?

    COVID-19 and Streaming Media: After the huge surge in subscribers, what does the future look like?

    In his inaugural episode of Lock & Shield, John McArthur breaks out the virtual popcorn and talks to Neustar Product Manager Paige Enoch about the consumption of streaming content during COVID-19, as well as how streaming providers look to geolocation data for accurate content delivery and licensing rights validation.

    Most importantly, join them as they discuss what the growth in viewership during COVID-19 for streamers including Disney+, Amazon Prime, Netflix, HBO Max, Hulu, and YouTube TV means for the future of secure content delivery.

    Highlights:

    The impact of COVID-19 –  After the huge surge in subscribers during the pandemic, what does the future look like?

    The brave new world of IPv6 – John and Paige discuss how the vast IPv6 addressing space is impacting OTT and streaming media providers.

    Why do content providers care about a subscriber’s location?  How licensing restrictions impact content delivery.

    Anonymous Proxys – Are they only used by bad guys or do the good guys use them too?

    Password sharing – What is the revenue loss from 10% to 15% of subscribers sharing their passwords during COVID-19?  What does the future look like?

    • 42 min

Top Podcasts In Technology

Darknet Diaries
Jack Rhysider
Acquired
Ben Gilbert and David Rosenthal
Lenny's Podcast: Product | Growth | Career
Lenny Rachitsky
Heavy Networking
Packet Pushers
Generative AI
Kognitos
Waveform: The MKBHD Podcast
Vox Media Podcast Network