5 episodes

Lock and Shield is a podcast about all things digital security created to bring subject matter experts and listeners together in a collaborative space that fosters an engaging collision of ideas and revelations.
Eye-opening, and at times, mind-blowing, this dynamic podcast sheds the brightest light on the current and coming trends and solutions that will empower online security – now - and in the future.

Hosted by Neustar’s John McArthur this open dialogue forum unapologetically tackles the security issues of the day.

Lock & Shield Neustar

    • Technology

Lock and Shield is a podcast about all things digital security created to bring subject matter experts and listeners together in a collaborative space that fosters an engaging collision of ideas and revelations.
Eye-opening, and at times, mind-blowing, this dynamic podcast sheds the brightest light on the current and coming trends and solutions that will empower online security – now - and in the future.

Hosted by Neustar’s John McArthur this open dialogue forum unapologetically tackles the security issues of the day.

    Is DNS Mission Critical to the Success of Your Enterprise? You Bet Your DNS it is.

    Is DNS Mission Critical to the Success of Your Enterprise? You Bet Your DNS it is.

    “To give you an idea of scale, the entire set of all machines on the internet, someone came up with an ASCII art file that you could print out on 11 sheets of standard paper. And it was actually not a list. It was an actual map that showed every single machine that was on the internet and what their hostname was and what their IP address was. Because that was how many machines there were….”

    -  Paul Ebersman

    In episode 5, John dials in on the world of DNS to understand the important role it plays in modern enterprises and how the unprepared can be vulnerable to malicious DNS attacks. Special guest Paul Ebersman (Principal Software Engineer at Neustar) joins John in educating enterprises about the mission critical role DNS plays.

    The History of DNS– Understanding the needs that led to the development of a domain naming system and its implications.

    Malicious Attacks– Vulnerability from DNS attacks and how they can paralyze enterprises with an unhealthy infrastructure.

    Security & Privacy– Discover the role informed security, public and private crypto keys play in putting privacy barriers in place to secure your organization.

    Choosing a DNS Operator – A highlight of the best practices surrounding choosing a DNS operator to help maintain business accessibility and availability.

    • 47 min
    The Ransomware Epidemic: How to Protect Against Cyber Attacks with a Zero-Trust Security Model

    The Ransomware Epidemic: How to Protect Against Cyber Attacks with a Zero-Trust Security Model

    In episode 4, John exposes the truth behind cyber criminals and the disturbing trend of increased ransomware attacks. Brian Kime, Forrester’s Senior Security and Risk Analyst, is John’s special guest as the two go deep to shed light on cyber threats and how businesses can implement zero-trust to prevent these attacks.

    Highlights:

    How cyber attacks are evolving – Incentives and key factors behind today’s cyber-criminal activity.

    Getting the Feds involved – Examining if/how the government will play a role in mitigating ransom attacks.

    Stopping attacks before they happen - What solutions are out there to protect you?  What is Zero-Trust and why is it gaining traction?

    State of the nation – Breaking down the last 18 months of new developments.

    • 40 min
    DDoS Attacks: The Past, Present & Future of Protecting Against Them

    DDoS Attacks: The Past, Present & Future of Protecting Against Them

    In episode 3, John and Paige get the uncensored history of DDoS attacks from special guest Matt Wilson, as they discuss the how’s of future proofing your web infrastructure against cyber attacks.

    Highlights:

    The inception of DDoS – here did this technology originate and how has it evolved since?

    The wild world hacking – Matt breaks down some fascinating stories from the early days of sophisticated hacking.

    Pathway to Multi-Cloud? How does Neustar adapt its security for cloud platforms?

    Nation State Attacks – Hacking at the next level, how do government entities get involved in all of this?

    Future Planning – What does the future look like for UltraDDoS and Ultra WAF?

    • 45 min
    Ransomware: To pay or not to pay. The moral dilemma of the 21st century

    Ransomware: To pay or not to pay. The moral dilemma of the 21st century

    In this episode, we examine COVID-19’s impact on cybersecurity, ransomware and the challenges companies face in the 21st century. Neustar’s John McArthur and Paige Enoch discuss data breaches, data exfiltration, cyber espionage and the solutions needed to protect your infrastructure.

    And most importantly, what are the implications of paying a ransomware demand to gain access to your resources?

    Highlights:

    Growth of ransomware attacks during COVID-19 – John and Paige explore how attackers are getting bolder with the average ransom demands continuing to increase.

    Hospitals as targets – John and Paige discuss why the hacker ceasefire with hospitals is over and why that should terrify us.

    Election security – Although there was no evidence of interference in the 2020 election, there were foreign actors who were intent on disrupting the election.  What does that mean for election cybersecurity going forward?

    Attacks on our infrastructure – John discusses the potential infrastructure attacks that keep Americans up at night.

    • 37 min
    COVID-19 and Streaming Media: After the huge surge in subscribers, what does the future look like?

    COVID-19 and Streaming Media: After the huge surge in subscribers, what does the future look like?

    In his inaugural episode of Lock & Shield, John McArthur breaks out the virtual popcorn and talks to Neustar Product Manager Paige Enoch about the consumption of streaming content during COVID-19, as well as how streaming providers look to geolocation data for accurate content delivery and licensing rights validation.

    Most importantly, join them as they discuss what the growth in viewership during COVID-19 for streamers including Disney+, Amazon Prime, Netflix, HBO Max, Hulu, and YouTube TV means for the future of secure content delivery.

    Highlights:

    The impact of COVID-19 –  After the huge surge in subscribers during the pandemic, what does the future look like?

    The brave new world of IPv6 – John and Paige discuss how the vast IPv6 addressing space is impacting OTT and streaming media providers.

    Why do content providers care about a subscriber’s location?  How licensing restrictions impact content delivery.

    Anonymous Proxys – Are they only used by bad guys or do the good guys use them too?

    Password sharing – What is the revenue loss from 10% to 15% of subscribers sharing their passwords during COVID-19?  What does the future look like?

    • 42 min

Top Podcasts In Technology