Episodes
To deliver malware, threat actors depend on techniques like phishing and malvertising, but malvertising doesn’t get as much visibility.  To address this imbalance, we’ve invited Chance Tudor, an official “Threat Hunter” in the Infoblox threat research group, to talk about his recent work uncovering the Omnatour Malvertising network, an unusually large and persistent threat delivery system.  Our discussion will focus on the behind-the-scenes investigation work, starting with how they even knew...
Published 09/07/22
In previous episodes, we’ve discussed the broad array of threat intelligence (TI) available and how important it is to get the right blend of TI.  But where does it all come from?  Renee Burton is the Sr. Director of Threat Intelligence for Infoblox and her teams, produce or curate dozens of threat feeds of different types, so we’ve asked her to help us understand the different kinds of labs producing all of these different types of threat intelligence. Tune in to the live broadcast on...
Published 08/17/22
Vulnerabilities. The breadth of products impacted is growing, while our options for dealing with them are shrinking.  For example, the luxury of having months to test patches in labs before deployment has, in many cases, completely disappeared. So, we have asked the SecOps Manager for Infoblox, Anthony Ciarochi, to be our guest for this episode of ThreatTalk and talk with us about how his security operations are adapting to the current state of vulnerabilities, exploits, and all the...
Published 08/03/22
Since we are in the dog days of summer, we have decided to celebrate the hot weather by reviving our hottest episode from Season 2! In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality. Tune in to the live broadcast on...
Published 07/20/22
The SecOps benefits from device visibility is limited if that data is incomplete.  Depending on DHCP alone can leave gaps in missed devices and partial data.  Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore. This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies.  As we investigate ‘discovery’ technologies, we’ll look at some additional security benefits they can provide in a...
Published 07/06/22
In the beginning… there was a desktop AV and a firewall.  Today, security teams manage scores of security tools from dozens of vendors.  With interest in DNS security growing significantly over the last few years, we need to ask why you would want to invest in it, what would DNS security do to the rest of the security stack, and how would it impact SecOps?  To answer these questions and more, this week’s guest is Anthony James, Infoblox products VP.  An industry veteran with a broad vendor...
Published 06/22/22
ThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We’ll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts,...
Published 06/08/22
Dark Reading magazine recently published a series of articles on DNS, shining a light on one of the most overlooked areas of cybersecurity despite the role of DNS at the foundation of modern communications. We’ve invited Krupa Srivatsan, a Director in the Infoblox security products team, to share her favorite highlights from this 17 page, in depth review by Dark Reading into the potential security benefits to be found in DNS and other core network services. Tune in to the live broadcast on...
Published 05/18/22
Have you figured out a recipe for blending your security solutions into a satisfying ecosystem that optimizes your SecOps while lowering overall risk levels?  If not, join us and our guest Pallavi Singh, an Infoblox lead on security integrations for everything from endpoints to cloud services, as we go beyond the hype and drill into ecosystem pros and cons. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ...
Published 05/04/22
Security teams have always depended on network and login data to help connect events to users and devices. But is there more to be found in that raw data? What about the metadata being made available on modern hybrid and distributed networks?  We’ve invited veteran networking guru Bob Rose to join us to take a deeper look at ‘metadata’, and the hidden gems for security teams to be found buried in it. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the...
Published 04/20/22
April first is a day full of mostly harmless pranks and hijinks; but what about cyber threats that are fooling your users year-round? Join Bob Hansmann and guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox for our annual discussion on the current state of phishing, lookalikes, social engineering, BECs and other evasion techniques. We will pull from recent examples and discuss trends that may help you prepare for future threats. Tune in to the live broadcast on...
Published 04/06/22
Nation-state threats are nothing new but, considering cyberactivity linked to the current crisis in Ukraine, we need to update our understanding of nation-state cyber threat potential, and the security strategies necessary to address them. Join host Bob Hansmann and his guests Ed Hunter, CISO for Infoblox, and Anthony Ciarochi, SecOps Manager for Infoblox, as they take us up a level on the current cyberthreat landscape. Tune in to the live broadcast on LinkedIn and Facebook every first and...
Published 03/16/22
How long would it take your defenses to detect an intruder? Average breach dwell-time estimates range from 24 days to almost a year. So, unless your organization’s acceptable dwell-time falls in that range, we’ve invited Gary Cox to talk about dwell-time and how to reduce it based on his extensive IT and security work throughout Europe. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on...
Published 03/02/22
The “I Love You” virus was the first major, global cyberattack of the millennium, setting records for damage and speed of dissemination.  So we’ve invited Infoblox Security Operations Manager Anthony Ciarochi to discuss the evolution of email into the #1 attack vector, and how defenders have adapted to deal with it. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts,...
Published 02/16/22
Everyone talks about moving to the cloud and dreams of one day turning the data center into a VR gaming room.  (For team-building exercises, certainly.)  But, after several years of the ‘moving to cloud’, the world seems to be stuck in a Hybrid state.  So this week’s ThreatTalk invites Vincent Berk, Author at Riverbed Blog, to help us look at the networking and security realities that may be dashing dreams of a 100% cloud future. Tune in to the live broadcast on LinkedIn and Facebook every...
Published 02/02/22
The story around the Log4J vulnerability has been told and retold by countless security publications and vendors. Join us on January 18 as guests Renee Burton and Druce MacFarlane take us behindthe scenes to understand the threat posed by vulnerabilities, the threat actors exploiting them, andhow researchers work to counter those threats. Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PDT). Subscribe to the ThreatTalk podcast on...
Published 01/19/22
Infoblox is excited to present season 3 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.
Published 01/05/22
Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. Join us as guests Druce MacFarland and David Seeman discuss key concepts that can help you maximize the value of your own Threat Intel program. Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am...
Published 12/08/21
From writing a few scripts using APIs, to full-fledge SOAR solutions, automation is getting a serious look from those who are seeing little success from throwing bodies at security problems. But choosing the right automation approach is a tough decision that demands a solid understanding of each option, what it can deliver, and what it will cost in time and money. Due to his extensive background in security ecosystems, and SOAR solutions in in particular, ThreatTalk has invited Craig...
Published 11/17/21
Zero Trust Networking is typically discussed in the context of users or devices connecting to the network. But what about the devices that are already there? Security monitoring needs to include all aspects of the network, as well as the devices and users connected to it. Check out this week’s ThreatTalk podcast with host Bob Hansmann and his guest, veteran networking technology expert Bob Rose of Infoblox, as they examine the security risks and benefits to be found in seldom discussed areas...
Published 11/03/21
Smart City development is accelerating and even expanding in response to the new world realities of how citizens access services. But solutions to make municipal services easier to access and consume require greater attention to the inherent security of those solutions and the connective foundation they operate on. Over the last year, vulnerability exposures, ransomware, and other headline news have only served to underscore the need for a solid foundation. Reliability, resiliency, and...
Published 10/20/21
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility? In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an...
Published 10/06/21
30 years ago, cyber security involved little more than firewalls and desktop AV. But today's security tools, expertise, and services are so numerous and complex that few if any, organizations can claim to have everything they need 'in-house'. Due to various needs and constraints, including budgets, it is a constant struggle to balance what capabilities should be in-house and which can be safely outsourced. This episode of ThreatTalk explores the fundamentals behind most outsourcing decisions...
Published 09/22/21
On the heels of our last podcast on the need for greater synergy between networking and security technologies, the recent T-Mobile cyberattack has been linked to an unsecured router as the original point of entry. So we are bringing back Bob Rose, a veteran network technologies expert and a former product manager for ATandT's Enterprise Mobility Management. Together, we will explore the security risks that can exist in our networks and how leading companies are controlling them. We'll pay...
Published 09/08/21
Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities. Network data importance has only grown with global shifts toward IoT, BYOD, and the...
Published 08/18/21