78 afleveringen

In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications.

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions.

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure.

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.

Infoblox ThreatTalk Infoblox

    • Nieuws

In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications.

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions.

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure.

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.

    The Good, the Bad, and the Cybersecurity AI to Sort It All Out

    The Good, the Bad, and the Cybersecurity AI to Sort It All Out

    From $400 toasters to robotics, AI seems to be showing up everywhere. But between doomsday predictions and the promises of a utopian future, what is a more realistic assessment of how AI can fit into the world of cybersecurity? Join us for a down-to-earth discussion with guests Karthik Haridoss and David Seeman, who are at the forefront of efforts to integrate AI into a variety of security tools.
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.

    • 30 min.
    Meet the Authors: Abusing DNS as Transport

    Meet the Authors: Abusing DNS as Transport

    From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.”
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.

    • 28 min.
    Breaking Down Domain Takedown Services

    Breaking Down Domain Takedown Services

    Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program.
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.

    • 34 min.
    Meet the Authors: Countering Redirection and Misdirection with DNS

    Meet the Authors: Countering Redirection and Misdirection with DNS

    Magicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.”
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.

    • 30 min.
    Outsourcing Teaming, Testing, and Trust with Third Parties

    Outsourcing Teaming, Testing, and Trust with Third Parties

    A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team is well-funded to do everything internally, this episode is a “must-listen”. 
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.

    • 22 min.
    Meet the Authors: DNS Insecurity, or DNS in Security?

    Meet the Authors: DNS Insecurity, or DNS in Security?

    Is your DNS a security risk, or are you taking advantage of its strengths as a security tool?  In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.”  The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource. 
    Learn more about The Hidden Potential of DNS in Security: https://a.co/d/dsE2gyp
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.

    • 29 min.

Top-podcasts in Nieuws

Maarten van Rossem - De Podcast
Tom Jessen en Maarten van Rossem / Streamy Media
Boekestijn en De Wijk | BNR
BNR Nieuwsradio
De Ketting van Santanera
RTL Nieuws
de Volkskrant Elke Dag
de Volkskrant
Weer een dag
Marcel van Roosmalen & Gijs Groenteman
NRC Vandaag
NRC