78 episodes

In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications.

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions.

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure.

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.

Infoblox ThreatTalk Infoblox

    • News
    • 5.0 • 8 Ratings

In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications.

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions.

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure.

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.

    The Good, the Bad, and the Cybersecurity AI to Sort It All Out

    The Good, the Bad, and the Cybersecurity AI to Sort It All Out

    From $400 toasters to robotics, AI seems to be showing up everywhere. But between doomsday predictions and the promises of a utopian future, what is a more realistic assessment of how AI can fit into the world of cybersecurity? Join us for a down-to-earth discussion with guests Karthik Haridoss and David Seeman, who are at the forefront of efforts to integrate AI into a variety of security tools.
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.

    • 30 min
    Meet the Authors: Abusing DNS as Transport

    Meet the Authors: Abusing DNS as Transport

    From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.”
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.

    • 28 min
    Breaking Down Domain Takedown Services

    Breaking Down Domain Takedown Services

    Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program.
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.

    • 34 min
    Meet the Authors: Countering Redirection and Misdirection with DNS

    Meet the Authors: Countering Redirection and Misdirection with DNS

    Magicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.”
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.

    • 30 min
    Outsourcing Teaming, Testing, and Trust with Third Parties

    Outsourcing Teaming, Testing, and Trust with Third Parties

    A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team is well-funded to do everything internally, this episode is a “must-listen”. 
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.

    • 22 min
    Meet the Authors: DNS Insecurity, or DNS in Security?

    Meet the Authors: DNS Insecurity, or DNS in Security?

    Is your DNS a security risk, or are you taking advantage of its strengths as a security tool?  In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.”  The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource. 
    Learn more about The Hidden Potential of DNS in Security: https://a.co/d/dsE2gyp
    Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.

    • 29 min

Customer Reviews

5.0 out of 5
8 Ratings

8 Ratings

ASobering ,

Entertaining, insightful, and actionable! 🔥

If you’re currently in the cybersecurity space, or want to be in the future, then this podcast should be part of your content diet. Engaging conversations, actionable tips, and insights into the industry abound - thank you to the Infoblox team for this incredible resource!

allisonl777 ,

Great information!

A must-listen for cybersecurity professionals. As a producer for this show, I am eager to hear more.

James Carbary ,

Excited

Being on the production team of this show, I am incredibly excited to see this podcast come to life! This show is going to add incredible value for any professional looking t learn more about cybersecurity.

Top Podcasts In News

The Daily
The New York Times
Serial
Serial Productions & The New York Times
Up First
NPR
Pod Save America
Crooked Media
The Rest Is Politics: US
Goalhanger
The Tucker Carlson Podcast
Tucker Carlson Network