Episodes
From $400 toasters to robotics, AI seems to be showing up everywhere. But between doomsday predictions and the promises of a utopian future, what is a more realistic assessment of how AI can fit into the world of cybersecurity? Join us for a down-to-earth discussion with guests Karthik Haridoss and David Seeman, who are at the forefront of efforts to integrate AI into a variety of security tools. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month...
Published 11/22/23
Published 11/22/23
From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.” Tune in to the live broadcast on LinkedIn and...
Published 11/08/23
Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program. Tune in to the live...
Published 10/18/23
Magicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.” Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the...
Published 10/04/23
A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team...
Published 09/20/23
Is your DNS a security risk, or are you taking advantage of its strengths as a security tool?  In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.”  The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource.  Learn more about The Hidden Potential of DNS in Security:...
Published 09/06/23
Service Providers are pitching a growing range of options, to businesses of all sizes, in a world where cybersecurity has become so complex and resource intensive that no one can do it all on their own.  Guest David Ayers, a veteran of the service provider space, will help us kick off a new series on service providers beginning with a review of where telecom started, where it is today, and what it might offer in a future of 5G, connected cars, and other imminent world-changing...
Published 08/16/23
From world cup soccer to horse racing, the slightest mistake can turn a winning ‘favorite’ into a loser.  The same can be true for the various sources of threat intelligence that can make, or break, the effectiveness of our security tools. Join host Bob Hansmann and his guests, threat intelligence and analytics experts Druce MacFarlane and Karthik Haridoss, for a sneak peek into their decision-making process for when to keep, add, or even drop a threat intelligence resource. Tune in to the...
Published 08/02/23
In the recent SANS 2022 SOC Survey, a lot of organizations reported that they used ‘outsourcing’ to bolster a wide variety of their SOC functions.  To understand the value of outsourcing, and tips on how to ensure a successful outsourced engagement better, ThreatTalk has invited back guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns.  With years of experience providing a wide range of services to clients, Amit is an ideal resource to help us...
Published 07/19/23
What were the hottest security topics discussed in the Infoblox security community during Q2 of 2023?  Host Bob Hansmann is joined by Infoblox community manager Sunil Amanna, and VP of Product Management Craig Sanderson, to review the topics behind some of the quarter’s more active discussions among your peers about cybersecurity. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple...
Published 06/21/23
While it is easy to get distracted by the ‘threat of the day’, there are those of us actively hunting instead for the infrastructures that drive and support those kinds of attacks before they are launched, so you can be prepared for the ‘threat of tomorrow’. Renée Burton, Head of Threat Intelligence for Infoblox, presented on this at the recent RSA conference and joins ThreatTalk to share what her team is learning about these infrastructures, the actors behind them, and why this matters so...
Published 06/07/23
While business line execs can get distracted by the latest media cyberthreat hype, effective security professionals stay on top of data-based security research and studies to constantly evolve their security programs. Tune into our latest podcast where we have invited Bill Brenner from the CyberRisk Alliance to discuss their 2023 Global State of Cybersecurity Study. Used to produce over a dozen global, regional, and country-level reports, we will discuss highlights from the study, as well as...
Published 05/17/23
Infoblox is excited to present season 4 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts. 
Published 05/02/23
From how to get the most out of a specific tool, to general best practices, there is always a lot to learn and a lot to stay on top of for a security professional, and there are limits to how much any single team will know.  In this episode, the community manager for Infoblox, Sunil Amanna, joins us on ThreatTalk to talk about the value of online communities (commonly available at no charge) as a source of information and inspiration, and how to get the most out of your community memberships....
Published 03/22/23
From storefronts and online box pushers to consultants and outsourcers, the channel partner landscape for cybersecurity continues to evolve.  In this episode of ThreatTalk, guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns, helps us break down the partner landscape, understand how to identify relationships that can uplift our security profile, and share tips on how to qualify potential partners for the greatest chance at success. Tune in to the...
Published 03/08/23
Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. And the ‘best’ blend can vary greatly from one organization to another. So how do you identify the right blend of feeds for your needs? And what are the tools to help you manage your threat intelligence, and apply it to maximum effectiveness? Join us for a replay...
Published 02/22/23
Leveraging your DNS architecture can be a much more effective and efficient approach to securing critical business services than relying on DNS security features in a firewall or web gateway. This episode of ThreatTalk will review a new SANS paper on this topic with author John Pescatore, SANS Director of Emerging Security Trends and guest Cricket Liu, Infoblox Chief DNS Architect.  Join host Bob Hansmann and his guests to understand how you can use DNS for more than just a phone book. Tune...
Published 02/08/23
In a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.  In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023. Tune in to the live broadcast on LinkedIn and Facebook every first and third...
Published 01/18/23
In a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.  In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023. Tune in to the live broadcast on LinkedIn and Facebook every first and third...
Published 12/07/22
Shadow IT once conjured strong draconian responses from IT and security teams alike to prevent potential security and management nightmares.  But in a world dominated by agility, hybrid work, and fast-moving technology, this approach has become unsustainable.  Our guest, David Seeman, product manager at Infoblox, helps us understand how organizations are managing their risks while taking advantage of the benefits of Shadow IT. Tune in to the live broadcast on LinkedIn and Facebook every first...
Published 11/16/22
Threat Actors are also incredible makeup artists.  To penetrate defenses, both human and technological, they have a suitcase full of tools to make any threat look innocent and even desirable.  Guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox joins us to talk about the current state of threat camouflage, and some of the key tools to reveal them before it’s too late. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month...
Published 11/02/22
There is no shortage of “Scary Stories” for Halloween or Cybersecurity Awareness month this year. But a lot of them, despite the media hype, won’t cause most security professionals to lose any sleep. But others might. So we’ve invited back Ed Hunter, the CISO for Infoblox, to talk about the last year and what threats, trends or technologies landed on his list of things to be concerned about. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at...
Published 10/19/22
The shift to the network edge is transforming the work environment but there is so much information about it, including some confusing marketing messaging, that many are unclear about why it matters, what it costs, and how they should go about assessing and altering their own operations.   The Sr. PMM for cloud-managed core networking solutions at Infoblox, Rod Dixon, joins this episode of ThreatTalk to update us on the shift to the edge, and provide some thoughts that can help anyone trying...
Published 10/05/22
It is easy to find headline stories of a breach that can be traced to poor security investments and practices. But such stories will continue to appear as many in management persist in restricting security investments. They often cite worker productivity, or even employee satisfaction, as factors. How can SecOps balance the needs for both productivity and protection? Anthony Ciarochi, SecOps Manager for Infoblox, returns to ThreatTalk to discuss. Tune in to the live broadcast on LinkedIn and...
Published 09/21/22