<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/infoblox-threattalk/" rel="self" type="application/rss+xml"/><title><![CDATA[Infoblox ThreatTalk]]></title><podcast:guid>27fc0407-0719-573b-8599-82780bd341ad</podcast:guid><lastBuildDate>Wed, 22 Nov 2023 11:00:15 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[All rights reserved.]]></copyright><managingEditor>Infoblox</managingEditor><itunes:summary><![CDATA[In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. 

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. 

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure. 

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.]]></itunes:summary><image><url>https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png</url><title>Infoblox ThreatTalk</title><link><![CDATA[https://feeds.captivate.fm/infoblox-threattalk/]]></link></image><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><itunes:owner><itunes:name>Infoblox</itunes:name></itunes:owner><itunes:author>Infoblox</itunes:author><description>In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. 

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. 

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure. 

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.</description><link>https://feeds.captivate.fm/infoblox-threattalk/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/infoblox-threattalk/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>The Good, the Bad, and the Cybersecurity AI to Sort It All Out</title><itunes:title>The Good, the Bad, and the Cybersecurity AI to Sort It All Out</itunes:title><description><![CDATA[<p>From $400 toasters to robotics, AI seems to be showing up everywhere. But between doomsday predictions and the promises of a utopian future, what is a more realistic assessment of how AI can fit into the world of cybersecurity? Join us for a down-to-earth discussion with guests Karthik Haridoss and David Seeman, who are at the forefront of efforts to integrate AI into a variety of security tools.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>From $400 toasters to robotics, AI seems to be showing up everywhere. But between doomsday predictions and the promises of a utopian future, what is a more realistic assessment of how AI can fit into the world of cybersecurity? Join us for a down-to-earth discussion with guests Karthik Haridoss and David Seeman, who are at the forefront of efforts to integrate AI into a variety of security tools.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/the-good-the-bad-and-the-cybersecurity-ai-to-sort-it-all-out]]></link><guid isPermaLink="false">147f4b66-aed8-4805-9a72-cd01136eaed0</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 22 Nov 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f0d13445-c2b1-43c5-888f-3cea8e9e0eb1/Infoblox-ThreatTalk-11-21-23-mixdown.mp3" length="25693732" type="audio/mpeg"/><itunes:duration>30:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>12</itunes:episode><itunes:season>4</itunes:season><podcast:episode>12</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Meet the Authors: Abusing DNS as Transport</title><itunes:title>Meet the Authors: Abusing DNS as Transport</itunes:title><description><![CDATA[<p>From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.” </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.” </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/meet-the-authors-abusing-dns-as-transport]]></link><guid isPermaLink="false">b488215e-044c-47a3-b8d6-5f66f00a80d7</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 08 Nov 2023 08:20:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c2392807-71f1-4b18-a0d3-2dbbf77f50af/Infoblox-ThreatTalk-11-7-23-mixdown.mp3" length="20873265" type="audio/mpeg"/><itunes:duration>28:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>11</itunes:episode><itunes:season>4</itunes:season><podcast:episode>11</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Breaking Down Domain Takedown Services</title><itunes:title>Breaking Down Domain Takedown Services</itunes:title><description><![CDATA[<p>Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>Join us as we look at the powerful, proactive security value of takedown services. In addition to adding a highly proactive security layer, they may be your only option for addressing threats targeting your customers by impersonating your brand and destroying customer trust. Takedown veterans Gary Brewer and Chris Sills join us to clear the air on what these services are, what they are not, and their potential value in a comprehensive and mature risk management program.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/breaking-down-domain-takedown-services]]></link><guid isPermaLink="false">d5bcf46a-f368-43f5-af9d-d2c600baee2a</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 18 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0b4981d6-e044-43fb-ab18-a69a5898a6ef/Infoblox-ThreatTalk-10-17-23-mixdown.mp3" length="24782920" type="audio/mpeg"/><itunes:duration>34:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>10</itunes:episode><itunes:season>4</itunes:season><podcast:episode>10</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Meet the Authors: Countering Redirection and Misdirection with DNS</title><itunes:title>Meet the Authors: Countering Redirection and Misdirection with DNS</itunes:title><description><![CDATA[<p>Magicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.” </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>Magicians are masters of redirection and misdirection, but these are also powerful elements in modern cyberattacks. Join us as we dive into these cyberthreat TTPs in this second of three episodes with authors Josh Kuo and Ross Gibson, who discuss this as one of the five areas of DNS abuse in their new security book, “The Hidden Potential of DNS in Security.” </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/meet-the-authors-countering-redirection-and-misdirection-with-dns]]></link><guid isPermaLink="false">70384baa-3f8c-4673-94a7-611dbb1a31e2</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 04 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5e72c883-7ba6-43af-92e7-435f935d5c4e/Infoblox-ThreatTalk-10-3-23-mixdown.mp3" length="22069364" type="audio/mpeg"/><itunes:duration>30:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>9</itunes:episode><itunes:season>4</itunes:season><podcast:episode>9</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Outsourcing Teaming, Testing, and Trust with Third Parties</title><itunes:title>Outsourcing Teaming, Testing, and Trust with Third Parties</itunes:title><description><![CDATA[<p>A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities.&nbsp;His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions.&nbsp;Unless your security team is well-funded to do everything internally, this episode is a “must-listen”.&nbsp;</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities.&nbsp;His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions.&nbsp;Unless your security team is well-funded to do everything internally, this episode is a “must-listen”.&nbsp;</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/outsourcing-teaming-testing-and-trust-with-third-parties]]></link><guid isPermaLink="false">600a2c0c-124d-4a9e-8717-f4ee7f1e01f4</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 20 Sep 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/42262bf8-09aa-4ab8-a206-ff589d066f8e/ThreatTalk-091923-S4E08-mixdown.mp3" length="16444741" type="audio/mpeg"/><itunes:duration>22:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>8</itunes:episode><itunes:season>4</itunes:season><podcast:episode>8</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Meet the Authors: DNS Insecurity, or DNS in Security?</title><itunes:title>Meet the Authors: DNS Insecurity, or DNS in Security?</itunes:title><description><![CDATA[<p>Is your DNS a security risk, or are you taking advantage of its strengths as a security tool?&nbsp; In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.”&nbsp; The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource.&nbsp;</p><p>Learn more about The Hidden Potential of DNS in Security: <a href="https://a.co/d/dsE2gyp" rel="noopener noreferrer" target="_blank">https://a.co/d/dsE2gyp</a></p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>Is your DNS a security risk, or are you taking advantage of its strengths as a security tool?&nbsp; In this episode of ThreatTalk, we talk with Josh Kuo and Ross Gibson about their new security book titled “The Hidden Potential of DNS in Security.”&nbsp; The first of a 3-part series, we will discuss highlights from the book and the use cases that drove them to produce such a comprehensive reference on a commonly overlooked security resource.&nbsp;</p><p>Learn more about The Hidden Potential of DNS in Security: <a href="https://a.co/d/dsE2gyp" rel="noopener noreferrer" target="_blank">https://a.co/d/dsE2gyp</a></p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/meet-the-authors-dns-insecurity-or-dns-in-security]]></link><guid isPermaLink="false">1497889b-1d46-4da8-a2ab-706f58b49e41</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 06 Sep 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1054d463-c44a-4f60-b43e-ecd32a2d816f/Infoblox-ThreatTalk-9-5-23-mixdown.mp3" length="20958877" type="audio/mpeg"/><itunes:duration>29:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>7</itunes:episode><itunes:season>4</itunes:season><podcast:episode>7</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Overkill or ‘Just Right’?  The Cybersecurity Role of Service Providers</title><itunes:title>Overkill or ‘Just Right’?  The Cybersecurity Role of Service Providers</itunes:title><description><![CDATA[<p>Service Providers are pitching a growing range of options, to businesses of all sizes, in a world where cybersecurity has become so complex and resource intensive that no one can do it all on their own.&nbsp; Guest David Ayers, a veteran of the service provider space, will help us kick off a new series on service providers beginning with a review of where telecom started, where it is today, and what it might offer in a future of 5G, connected cars, and other imminent world-changing technologies.</p><p>This series will be a great supplement to other episodes on consultant and channel partner service offerings, to help listeners balance the best ways to achieve their desired security posture within budget, time, people, and other realities.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>Service Providers are pitching a growing range of options, to businesses of all sizes, in a world where cybersecurity has become so complex and resource intensive that no one can do it all on their own.&nbsp; Guest David Ayers, a veteran of the service provider space, will help us kick off a new series on service providers beginning with a review of where telecom started, where it is today, and what it might offer in a future of 5G, connected cars, and other imminent world-changing technologies.</p><p>This series will be a great supplement to other episodes on consultant and channel partner service offerings, to help listeners balance the best ways to achieve their desired security posture within budget, time, people, and other realities.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/overkill-or-just-right-the-cybersecurity-role-of-service-providers]]></link><guid isPermaLink="false">a53e3aba-8623-430a-9da7-07d97bfb7219</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 16 Aug 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9dbbfe91-0557-4e61-b2c6-bd67f4756eb5/Infoblox-ThreatTalk-8-15-23-mixdown.mp3" length="21186681" type="audio/mpeg"/><itunes:duration>29:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>6</itunes:episode><itunes:season>4</itunes:season><podcast:episode>6</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>The Care and Feeding of an Effective Threat Intelligence System</title><itunes:title>The Care and Feeding of an Effective Threat Intelligence System</itunes:title><description><![CDATA[<p>From world cup soccer to horse racing, the slightest mistake can turn a winning ‘favorite’ into a loser.&nbsp; The same can be true for the various sources of threat intelligence that can make, or break, the effectiveness of our security tools.</p><p>Join host Bob Hansmann and his guests, threat intelligence and analytics experts Druce MacFarlane and Karthik Haridoss, for a sneak peek into their decision-making process for when to keep, add, or even drop a threat intelligence resource.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the  ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>From world cup soccer to horse racing, the slightest mistake can turn a winning ‘favorite’ into a loser.&nbsp; The same can be true for the various sources of threat intelligence that can make, or break, the effectiveness of our security tools.</p><p>Join host Bob Hansmann and his guests, threat intelligence and analytics experts Druce MacFarlane and Karthik Haridoss, for a sneak peek into their decision-making process for when to keep, add, or even drop a threat intelligence resource.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the  ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/the-care-and-feeding-of-an-effective-threat-intelligence-system]]></link><guid isPermaLink="false">74098832-9656-42df-9a1f-da8ee290c305</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 02 Aug 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b1abbfe1-ab19-4ecb-9098-89236fbbea58/Infoblox-ThreatTalk-8-2-23-mixdown.mp3" length="22238390" type="audio/mpeg"/><itunes:duration>30:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>5</itunes:episode><itunes:season>4</itunes:season><podcast:episode>5</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Security Outsourcing: Why, When and How to Make it Work</title><itunes:title>Security Outsourcing: Why, When and How to Make it Work</itunes:title><description><![CDATA[<p>In the recent SANS 2022 SOC Survey, a lot of organizations reported that they used ‘outsourcing’ to bolster a wide variety of their SOC functions.&nbsp; To understand the value of outsourcing, and tips on how to ensure a successful outsourced engagement better, ThreatTalk has invited back guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns.&nbsp; With years of experience providing a wide range of services to clients, Amit is an ideal resource to help us understand the outsourcing landscape.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></description><content:encoded><![CDATA[<p>In the recent SANS 2022 SOC Survey, a lot of organizations reported that they used ‘outsourcing’ to bolster a wide variety of their SOC functions.&nbsp; To understand the value of outsourcing, and tips on how to ensure a successful outsourced engagement better, ThreatTalk has invited back guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns.&nbsp; With years of experience providing a wide range of services to clients, Amit is an ideal resource to help us understand the outsourcing landscape.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/security-outsourcing-why-when-and-how-to-make-it-work]]></link><guid isPermaLink="false">008f526d-dee1-442d-9ad9-1b7f195e9b48</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 19 Jul 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c6f51810-a951-47f6-bc9e-0765468d50cf/Infoblox-ThreatTalk-7-18-23-mixdown.mp3" length="17031045" type="audio/mpeg"/><itunes:duration>23:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>4</itunes:episode><itunes:season>4</itunes:season><podcast:episode>4</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>The community has spoken: Top Topics of Q2’ 23</title><itunes:title>The community has spoken: Top Topics of Q2’ 23</itunes:title><description><![CDATA[<p>What were the hottest security topics discussed in the Infoblox security community during Q2 of 2023?&nbsp; Host Bob Hansmann is joined by Infoblox community manager Sunil Amanna, and VP of Product Management Craig Sanderson, to review the topics behind some of the quarter’s more active discussions among your peers about cybersecurity.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>What were the hottest security topics discussed in the Infoblox security community during Q2 of 2023?&nbsp; Host Bob Hansmann is joined by Infoblox community manager Sunil Amanna, and VP of Product Management Craig Sanderson, to review the topics behind some of the quarter’s more active discussions among your peers about cybersecurity.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/the-community-has-spoken-top-topics-of-q2-23]]></link><guid isPermaLink="false">173e17d4-7102-42b0-84fe-1614a5999114</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 21 Jun 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ef173001-6a47-4fad-96b4-86ae310d8309/Infoblox-ThreatTalk-6-20-23-mixdown.mp3" length="21431163" type="audio/mpeg"/><itunes:duration>29:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>3</itunes:episode><itunes:season>4</itunes:season><podcast:episode>3</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Center Stage: Persistent Infrastructure Threat Actors</title><itunes:title>Center Stage: Persistent Infrastructure Threat Actors</itunes:title><description><![CDATA[<p>While it is easy to get distracted by the ‘threat of the day’, there are those of us actively hunting instead for the infrastructures that drive and support those kinds of attacks before they are launched, so you can be prepared for the ‘threat of tomorrow’.  Renée Burton, Head of Threat Intelligence for Infoblox, presented on this at the recent RSA conference and joins ThreatTalk to share what her team is learning about these  infrastructures, the actors behind them, and why this matters so much.</p>]]></description><content:encoded><![CDATA[<p>While it is easy to get distracted by the ‘threat of the day’, there are those of us actively hunting instead for the infrastructures that drive and support those kinds of attacks before they are launched, so you can be prepared for the ‘threat of tomorrow’.  Renée Burton, Head of Threat Intelligence for Infoblox, presented on this at the recent RSA conference and joins ThreatTalk to share what her team is learning about these  infrastructures, the actors behind them, and why this matters so much.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/center-stage-persistent-infrastructure-threat-actors]]></link><guid isPermaLink="false">13ad374b-d8f5-4a42-8dea-12171288a1c5</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 07 Jun 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/428b5263-d982-4f2d-a73f-1dd887d8a62e/Infoblox-ThreatTalk-06-06-23-mixdown.mp3" length="21502911" type="audio/mpeg"/><itunes:duration>29:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>2</itunes:episode><itunes:season>4</itunes:season><podcast:episode>2</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study</title><itunes:title>Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study</itunes:title><description><![CDATA[<p>While business line execs can get distracted by the latest media cyberthreat hype, effective security professionals stay on top of data-based security research and studies to constantly evolve their security programs. Tune into our latest podcast where we have invited Bill Brenner from the CyberRisk Alliance to discuss their 2023 Global State of Cybersecurity Study.  Used to produce over a dozen global, regional, and country-level reports, we will discuss highlights from the study, as well as some insights from Bill that go beyond the report.</p><p>View the full report here: <a href="https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-study?utm_campaign=ww-spo-q4fy23-sec-gscspodcast-20230505&amp;utm_medium=social-managed&amp;utm_source=podcast&amp;utm_term=na&amp;utm_content=na" rel="noopener noreferrer" target="_blank">https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-study</a></p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>While business line execs can get distracted by the latest media cyberthreat hype, effective security professionals stay on top of data-based security research and studies to constantly evolve their security programs. Tune into our latest podcast where we have invited Bill Brenner from the CyberRisk Alliance to discuss their 2023 Global State of Cybersecurity Study.  Used to produce over a dozen global, regional, and country-level reports, we will discuss highlights from the study, as well as some insights from Bill that go beyond the report.</p><p>View the full report here: <a href="https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-study?utm_campaign=ww-spo-q4fy23-sec-gscspodcast-20230505&amp;utm_medium=social-managed&amp;utm_source=podcast&amp;utm_term=na&amp;utm_content=na" rel="noopener noreferrer" target="_blank">https://info.infoblox.com/resources-whitepapers-2023-global-state-of-cybersecurity-study</a></p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/meet-the-author-bill-brenner-on-the-2023-global-state-of-cybersecurity-study]]></link><guid isPermaLink="false">e0acc53e-d37a-4f43-896c-1e49e6cb234d</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 17 May 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/09351db5-816b-4f33-997a-d337657aa3cf/Infoblox-ThreatTalk-05-16-23-mixdown.mp3" length="21763984" type="audio/mpeg"/><itunes:duration>30:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>1</itunes:episode><itunes:season>4</itunes:season><podcast:episode>1</podcast:episode><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>ThreatTalk Season 4 Preview</title><itunes:title>ThreatTalk Season 4 Preview</itunes:title><description><![CDATA[<p>Infoblox is excited to present season 4 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Infoblox is excited to present season 4 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.&nbsp;</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/threattalk-season-4-preview]]></link><guid isPermaLink="false">1a67209e-19ef-4b5a-9844-c245503d5709</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Tue, 02 May 2023 07:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dc121893-4d66-4302-9315-aaffd9e1783b/ThreatTalk-S4E00-Teaser.mp3" length="1194125" type="audio/mpeg"/><itunes:duration>01:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:season>4</itunes:season><podcast:season>4</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Get FREE 3rd Party Help to Combat Your Cybersecurity Skill Shortage</title><itunes:title>Get FREE 3rd Party Help to Combat Your Cybersecurity Skill Shortage</itunes:title><description><![CDATA[<p>From how to get the most out of a specific tool, to general best practices, there is always a lot to learn and a lot to stay on top of for a security professional, and there are limits to how much any single team will know.&nbsp; In this episode, the community manager for Infoblox, Sunil Amanna, joins us on ThreatTalk to talk about the value of online communities (commonly available at no charge) as a source of information and inspiration, and how to get the most out of your community memberships. </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>From how to get the most out of a specific tool, to general best practices, there is always a lot to learn and a lot to stay on top of for a security professional, and there are limits to how much any single team will know.&nbsp; In this episode, the community manager for Infoblox, Sunil Amanna, joins us on ThreatTalk to talk about the value of online communities (commonly available at no charge) as a source of information and inspiration, and how to get the most out of your community memberships. </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/get-free-3rd-party-help-to-combat-your-cybersecurity-skill-shortage]]></link><guid isPermaLink="false">44b0e1bf-c712-4fed-b937-c9c1a440fc48</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 22 Mar 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/da7e17d8-e723-4753-8b4c-af47ecc1873b/Infoblox-ThreatTalk-03-21-23-mixdown.mp3" length="20319757" type="audio/mpeg"/><itunes:duration>28:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>27</itunes:episode><itunes:season>3</itunes:season><podcast:episode>27</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Show Me the Value: Understanding the Security Channel Landscape</title><itunes:title>Show Me the Value: Understanding the Security Channel Landscape</itunes:title><description><![CDATA[<p>From storefronts and online box pushers to consultants and outsourcers, the channel partner landscape for cybersecurity continues to evolve.&nbsp; In this episode of ThreatTalk, guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns, helps us break down the partner landscape, understand how to identify relationships that can uplift our security profile, and share tips on how to qualify potential partners for the greatest chance at success.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>From storefronts and online box pushers to consultants and outsourcers, the channel partner landscape for cybersecurity continues to evolve.&nbsp; In this episode of ThreatTalk, guest Amit Sing, the Technical Director for Australian/New Zealand cybersecurity company 3columns, helps us break down the partner landscape, understand how to identify relationships that can uplift our security profile, and share tips on how to qualify potential partners for the greatest chance at success.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/show-me-the-value-understanding-the-security-channel-landscape]]></link><guid isPermaLink="false">068f7339-de09-4b08-b6cc-22aefe02fbeb</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 08 Mar 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b1ffe1ed-9feb-4ba6-944f-eff2673d97d3/Infoblox-ThreatTalk-03-07-23-mixdown.mp3" length="15611893" type="audio/mpeg"/><itunes:duration>21:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>26</itunes:episode><itunes:season>3</itunes:season><podcast:episode>26</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Are There Smarter Ways to Gather and Apply Threat Intelligence?</title><itunes:title>Are There Smarter Ways to Gather and Apply Threat Intelligence?</itunes:title><description><![CDATA[<p>Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. And the ‘best’ blend can vary greatly from one organization to another. So how do you identify the right blend of feeds for your needs? And what are the tools to help you manage your threat intelligence, and apply it to maximum effectiveness?</p><p>Join us for a replay of a highlight episode from Season 2 of ThreatTalk, where threat intel experts Druce MacFarlane and David Seeman walk us through some of the key issues that can help you get the most from your threat intelligence program.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. And the ‘best’ blend can vary greatly from one organization to another. So how do you identify the right blend of feeds for your needs? And what are the tools to help you manage your threat intelligence, and apply it to maximum effectiveness?</p><p>Join us for a replay of a highlight episode from Season 2 of ThreatTalk, where threat intel experts Druce MacFarlane and David Seeman walk us through some of the key issues that can help you get the most from your threat intelligence program.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/are-there-smarter-ways-to-gather-and-apply-threat-intelligence]]></link><guid isPermaLink="false">4fdb756b-4992-4086-bf90-346212fc95a2</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 22 Feb 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b02ec4e5-9b29-49c8-9d03-7b30ee885698/Infoblox-ThreatTalk-12-07-21-mixdown.mp3" length="24098935" type="audio/mpeg"/><itunes:duration>33:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>25</itunes:episode><itunes:season>3</itunes:season><podcast:episode>25</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>A SANS Author Interview: A DNS Security Architecture as a SecOps Force Multiplier</title><itunes:title>A SANS Author Interview: A DNS Security Architecture as a SecOps Force Multiplier</itunes:title><description><![CDATA[<p>Leveraging your DNS architecture can be a much more effective and efficient approach to securing critical business services than relying on DNS security features in a firewall or web gateway. This episode of ThreatTalk will review a new SANS paper on this topic with author John Pescatore, SANS Director of Emerging Security Trends and guest Cricket Liu, Infoblox Chief DNS Architect.&nbsp; Join host Bob Hansmann and his guests to understand how you can use DNS for more than just a phone book.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Leveraging your DNS architecture can be a much more effective and efficient approach to securing critical business services than relying on DNS security features in a firewall or web gateway. This episode of ThreatTalk will review a new SANS paper on this topic with author John Pescatore, SANS Director of Emerging Security Trends and guest Cricket Liu, Infoblox Chief DNS Architect.&nbsp; Join host Bob Hansmann and his guests to understand how you can use DNS for more than just a phone book.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/a-sans-author-interview-a-dns-security-architecture-as-a-secops-force-multiplier]]></link><guid isPermaLink="false">616f75c4-0c81-4398-9c4e-be8911cd29d6</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 08 Feb 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0d17d09d-3bee-4dd4-befb-35e7df19fee0/Infoblox-ThreatTalk-02-07-23-mixdown.mp3" length="23374915" type="audio/mpeg"/><itunes:duration>32:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>24</itunes:episode><itunes:season>3</itunes:season><podcast:episode>24</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Part 2 | Eliminating Blind Spots: A Forrester Report on 20-20 Visibility</title><itunes:title>Part 2 | Eliminating Blind Spots: A Forrester Report on 20-20 Visibility</itunes:title><description><![CDATA[<p>In a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.&nbsp; In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>In a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.&nbsp; In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/part-2-eliminating-blind-spots-a-forrester-report-on-20-20-visibility]]></link><guid isPermaLink="false">8440fc38-72e8-4e42-ac01-f3310f89a181</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 18 Jan 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0f7c05a0-4f0e-4bc5-9b01-3bdd3c8351f4/Infoblox-ThreatTalk-01-17-23-mixdown.mp3" length="23328889" type="audio/mpeg"/><itunes:duration>32:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>23</itunes:episode><itunes:season>3</itunes:season><podcast:episode>23</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Eliminating Blind Spots: A Forrester Report on 20-20 Visibility</title><itunes:title>Eliminating Blind Spots: A Forrester Report on 20-20 Visibility</itunes:title><description><![CDATA[<p>In a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.&nbsp; In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>In a world where most security tools are ‘user-centric’, devices like switches, printers, BYOD, ICS, IoT and more represent a blind spot that is being actively exploited by attackers.&nbsp; In this episode of ThreatTalk, we’ve invited back network guru Bob Rose to discuss a recent report from Forrester Research to understand how big this problem is and how both networking and security teams are responding for 2023.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/eliminating-blind-spots-a-forrester-report-on-20-20-visibility]]></link><guid isPermaLink="false">616744e4-97af-446b-ab8d-d73b2318f915</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 07 Dec 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d775a389-724d-49cb-841d-abb79a9bff44/Infoblox-ThreatTalk-12-06-22-mixdown.mp3" length="22131853" type="audio/mpeg"/><itunes:duration>30:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>22</itunes:episode><itunes:season>3</itunes:season><podcast:episode>22</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Bringing Shadow IT into the Light</title><itunes:title>Bringing Shadow IT into the Light</itunes:title><description><![CDATA[<p>Shadow IT once conjured strong draconian responses from IT and security teams alike to prevent potential security and management nightmares.&nbsp; But in a world dominated by agility, hybrid work, and fast-moving technology, this approach has become unsustainable.&nbsp; Our guest, David Seeman, product manager at Infoblox, helps us understand how organizations are managing their risks while taking advantage of the benefits of Shadow IT.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Shadow IT once conjured strong draconian responses from IT and security teams alike to prevent potential security and management nightmares.&nbsp; But in a world dominated by agility, hybrid work, and fast-moving technology, this approach has become unsustainable.&nbsp; Our guest, David Seeman, product manager at Infoblox, helps us understand how organizations are managing their risks while taking advantage of the benefits of Shadow IT.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/bringing-shadow-it-into-the-light]]></link><guid isPermaLink="false">18938905-fded-429b-a435-118b053bdcb0</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 16 Nov 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fed2b9f3-4973-4a55-bd26-ae4baed3ff51/Infoblox-20ThreatTalk-2011-15-22-mixdown.mp3" length="21617935" type="audio/mpeg"/><itunes:duration>29:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>21</itunes:episode><itunes:season>3</itunes:season><podcast:episode>21</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Re:Bots in Disguise-Detecting Cyberthreat Camouflage</title><itunes:title>Re:Bots in Disguise-Detecting Cyberthreat Camouflage</itunes:title><description><![CDATA[<p>Threat Actors are also incredible makeup artists.&nbsp; To penetrate defenses, both human and technological, they have a suitcase full of tools to make any threat look innocent and even desirable.&nbsp; Guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox joins us to talk about the current state of threat camouflage, and some of the key tools to reveal them before it’s too late. </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Threat Actors are also incredible makeup artists.&nbsp; To penetrate defenses, both human and technological, they have a suitcase full of tools to make any threat look innocent and even desirable.&nbsp; Guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox joins us to talk about the current state of threat camouflage, and some of the key tools to reveal them before it’s too late. </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/re-bots-in-disguise-detecting-cyberthreat-camouflage]]></link><guid isPermaLink="false">cd6f7250-6d49-4ea3-8cce-cf04628a2c36</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 02 Nov 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3ff667ee-0dd1-4741-98e7-4028fdb8e927/Infoblox-20ThreatTalk-2011-01-22-mixdown.mp3" length="22447447" type="audio/mpeg"/><itunes:duration>31:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>20</itunes:episode><itunes:season>3</itunes:season><podcast:episode>20</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Losing Sleep over Security: A Halloween Review</title><itunes:title>Losing Sleep over Security: A Halloween Review</itunes:title><description><![CDATA[<p>There is no shortage of “Scary Stories” for Halloween or Cybersecurity Awareness month this year.&nbsp;But a lot of them, despite the media hype, won’t cause most security professionals to lose any sleep.&nbsp;But others might.&nbsp;So we’ve invited back Ed Hunter, the CISO for Infoblox, to talk about the last year and what threats, trends or technologies landed on his list of things to be concerned about.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>There is no shortage of “Scary Stories” for Halloween or Cybersecurity Awareness month this year.&nbsp;But a lot of them, despite the media hype, won’t cause most security professionals to lose any sleep.&nbsp;But others might.&nbsp;So we’ve invited back Ed Hunter, the CISO for Infoblox, to talk about the last year and what threats, trends or technologies landed on his list of things to be concerned about.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/losing-sleep-over-security-a-halloween-review]]></link><guid isPermaLink="false">1b364f02-7f68-4ab0-96f0-f5260a1f4129</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 19 Oct 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e1589a4a-6ed7-4d17-be3c-224252037291/ThreatTalk-20101822-20S3E19-mixdown.mp3" length="22992039" type="audio/mpeg"/><itunes:duration>31:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>19</itunes:episode><itunes:season>3</itunes:season><podcast:episode>19</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Managing Risk While Getting Closer to the Network Edge</title><itunes:title>Managing Risk While Getting Closer to the Network Edge</itunes:title><description><![CDATA[<p>The shift to the network edge is transforming the work environment but there is so much information about it, including some confusing marketing messaging, that many are unclear about why it matters, what it costs, and how they should go about assessing and altering their own operations. &nbsp; The Sr. PMM for cloud-managed core networking solutions at Infoblox, Rod Dixon, joins this episode of ThreatTalk to update us on the shift to the edge, and provide some thoughts that can help anyone trying to make decisions about the transition.&nbsp;</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>The shift to the network edge is transforming the work environment but there is so much information about it, including some confusing marketing messaging, that many are unclear about why it matters, what it costs, and how they should go about assessing and altering their own operations. &nbsp; The Sr. PMM for cloud-managed core networking solutions at Infoblox, Rod Dixon, joins this episode of ThreatTalk to update us on the shift to the edge, and provide some thoughts that can help anyone trying to make decisions about the transition.&nbsp;</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/managing-risk-while-getting-closer-to-the-network-edge]]></link><guid isPermaLink="false">990cf071-3618-4fce-976c-9e1e581424fe</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 05 Oct 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3c23d43e-b4b1-4f2f-a20a-5982c1251890/Infoblox-20ThreatTalk-2010-04-22-mixdown.mp3" length="20051845" type="audio/mpeg"/><itunes:duration>27:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>18</itunes:episode><itunes:season>3</itunes:season><podcast:episode>18</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Paying for Protection: What is the Performance Cost of Security?</title><itunes:title>Paying for Protection: What is the Performance Cost of Security?</itunes:title><description><![CDATA[<p>It is easy to find headline stories of a breach that can be traced to poor security investments and practices. But such stories will continue to appear as many in management persist in restricting security investments.&nbsp;They often cite worker productivity, or even employee satisfaction, as factors.&nbsp;How can SecOps balance the needs for both productivity and protection? Anthony Ciarochi, SecOps Manager for Infoblox, returns to ThreatTalk to discuss.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>It is easy to find headline stories of a breach that can be traced to poor security investments and practices. But such stories will continue to appear as many in management persist in restricting security investments.&nbsp;They often cite worker productivity, or even employee satisfaction, as factors.&nbsp;How can SecOps balance the needs for both productivity and protection? Anthony Ciarochi, SecOps Manager for Infoblox, returns to ThreatTalk to discuss.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/paying-for-protection-what-is-the-performance-cost-of-security]]></link><guid isPermaLink="false">79ff9dfa-fab9-4272-b572-83f450dd3cc8</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 21 Sep 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d0546b48-1fa1-4d9b-9b76-eadbe09076f5/Infoblox-20ThreatTalk-209-20-22-mixdown.mp3" length="21927704" type="audio/mpeg"/><itunes:duration>30:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>17</itunes:episode><itunes:season>3</itunes:season><podcast:episode>17</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>A Researchers Story: Uncovering the Omnatour Malvertising Network</title><itunes:title>A Researchers Story: Uncovering the Omnatour Malvertising Network</itunes:title><description><![CDATA[<p>To deliver malware, threat actors depend on techniques like phishing and malvertising, but malvertising doesn’t get as much visibility.&nbsp; To address this imbalance, we’ve invited Chance Tudor, an official “Threat Hunter” in the Infoblox threat research group, to talk about his recent work uncovering the Omnatour Malvertising network, an unusually large and persistent threat delivery system.&nbsp; Our discussion will focus on the behind-the-scenes investigation work, starting with how they even knew a threat even needed to be investigated.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>To deliver malware, threat actors depend on techniques like phishing and malvertising, but malvertising doesn’t get as much visibility.&nbsp; To address this imbalance, we’ve invited Chance Tudor, an official “Threat Hunter” in the Infoblox threat research group, to talk about his recent work uncovering the Omnatour Malvertising network, an unusually large and persistent threat delivery system.&nbsp; Our discussion will focus on the behind-the-scenes investigation work, starting with how they even knew a threat even needed to be investigated.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/a-researchers-story-uncovering-the-omnatour-malvertising-network]]></link><guid isPermaLink="false">d3c70505-5457-49eb-ad01-1b1d43f46b63</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 07 Sep 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8c944234-50b1-4b96-89a5-15a214677d46/Infoblox-20ThreatTalk-209-6-22-mixdown.mp3" length="22965629" type="audio/mpeg"/><itunes:duration>31:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>16</itunes:episode><itunes:season>3</itunes:season><podcast:episode>16</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Putting Threat Intelligence Labs Under the Microscope</title><itunes:title>Putting Threat Intelligence Labs Under the Microscope</itunes:title><description><![CDATA[<p>In previous episodes, we’ve discussed the broad array of threat intelligence (TI) available and how important it is to get the right blend of TI.&nbsp; But where does it all come from?&nbsp; Renee Burton is the Sr. Director of Threat Intelligence for Infoblox and her teams, produce or curate dozens of threat feeds of different types, so we’ve asked her to help us understand the different kinds of labs producing all of these different types of threat intelligence.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>In previous episodes, we’ve discussed the broad array of threat intelligence (TI) available and how important it is to get the right blend of TI.&nbsp; But where does it all come from?&nbsp; Renee Burton is the Sr. Director of Threat Intelligence for Infoblox and her teams, produce or curate dozens of threat feeds of different types, so we’ve asked her to help us understand the different kinds of labs producing all of these different types of threat intelligence.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/putting-threat-intelligence-labs-under-the-microscope]]></link><guid isPermaLink="false">722522e4-4a9f-4f6d-8151-2d3af0ce9a2a</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 17 Aug 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a090f589-8b8c-488a-aa0c-11c6ac24de14/Infoblox-20ThreatTalk-208-16-22-mixdown.mp3" length="21620352" type="audio/mpeg"/><itunes:duration>29:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>15</itunes:episode><itunes:season>3</itunes:season><podcast:episode>15</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Decisions, Decisions: Vulnerable, Exploitable, Patchable or Possibly Ignorable?</title><itunes:title>Decisions, Decisions: Vulnerable, Exploitable, Patchable or Possibly Ignorable?</itunes:title><description><![CDATA[<p>Vulnerabilities.&nbsp;The breadth of products impacted is growing, while our options for dealing with them are shrinking.&nbsp; For example, the luxury of having months to test patches in labs before deployment has, in many cases, completely disappeared.&nbsp;So, we have asked the SecOps Manager for Infoblox, Anthony Ciarochi, to be our guest for this episode of ThreatTalk and talk with us about how his security operations are adapting to the current state of vulnerabilities, exploits, and all the rest.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Vulnerabilities.&nbsp;The breadth of products impacted is growing, while our options for dealing with them are shrinking.&nbsp; For example, the luxury of having months to test patches in labs before deployment has, in many cases, completely disappeared.&nbsp;So, we have asked the SecOps Manager for Infoblox, Anthony Ciarochi, to be our guest for this episode of ThreatTalk and talk with us about how his security operations are adapting to the current state of vulnerabilities, exploits, and all the rest.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/decisions-decisions-vulnerable-exploitable-patchable-or-possibly-ignorable]]></link><guid isPermaLink="false">3fbc86d1-2733-49f5-a34d-2786328929c2</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 03 Aug 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a8b47f1f-84bb-4262-8255-2eed2c1c85de/Infoblox-20ThreatTalk-208-02-22-mixdown.mp3" length="21709806" type="audio/mpeg"/><itunes:duration>30:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>14</itunes:episode><itunes:season>3</itunes:season><podcast:episode>14</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Summer Revival: Sharing Responsibility Between IT and End Users</title><itunes:title>Summer Revival: Sharing Responsibility Between IT and End Users</itunes:title><description><![CDATA[<p>Since we are in the dog days of summer, we have decided to celebrate the hot weather by reviving our hottest episode from Season 2! In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros &amp; cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Since we are in the dog days of summer, we have decided to celebrate the hot weather by reviving our hottest episode from Season 2! In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros &amp; cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/summer-revival-sharing-responsibility-between-it-and-end-users]]></link><guid isPermaLink="false">84f4107a-ca50-4b94-b5b2-5f0c56a8ddee</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 20 Jul 2022 07:37:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e3e66f73-0f10-4117-9f7a-edc28b3e165a/ThreatTalk-207-20-22-mixdown.mp3" length="22872691" type="audio/mpeg"/><itunes:duration>31:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>13</itunes:episode><itunes:season>3</itunes:season><podcast:episode>13</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Solving Hidden SecOps Vulnerabilities with Network Discovery</title><itunes:title>Solving Hidden SecOps Vulnerabilities with Network Discovery</itunes:title><description><![CDATA[<p>The SecOps benefits from device visibility is limited if that data is incomplete.&nbsp; Depending on DHCP alone can leave gaps in missed devices and partial data.&nbsp; Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore. </p><p>This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies.&nbsp; As we investigate ‘discovery’ technologies, we’ll look at some additional security benefits they can provide in a world where any vulnerability can be exploited with devastating results.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>The SecOps benefits from device visibility is limited if that data is incomplete.&nbsp; Depending on DHCP alone can leave gaps in missed devices and partial data.&nbsp; Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore. </p><p>This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies.&nbsp; As we investigate ‘discovery’ technologies, we’ll look at some additional security benefits they can provide in a world where any vulnerability can be exploited with devastating results.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/solving-hidden-secops-vulnerabilities-with-network-discovery]]></link><guid isPermaLink="false">639a5083-af1d-4936-a025-5258742199d5</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 06 Jul 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/12813382-f32d-451e-bac8-ed4bfa2800d4/Infoblox-20ThreatTalk-207-05-22-mixdown.mp3" length="22545042" type="audio/mpeg"/><itunes:duration>31:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>12</itunes:episode><itunes:season>3</itunes:season><podcast:episode>12</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>On Top of Everything Else - Why DNS for Security</title><itunes:title>On Top of Everything Else - Why DNS for Security</itunes:title><description><![CDATA[<p>In the beginning… there was a desktop AV and a firewall.&nbsp; Today, security teams manage scores of security tools from dozens of vendors.&nbsp; With interest in DNS security growing significantly over the last few years, we need to ask why you would want to invest in it, what would DNS security do to the rest of the security stack, and how would it impact SecOps?&nbsp; To answer these questions and more, this week’s guest is Anthony James, Infoblox products VP.&nbsp; An industry veteran with a broad vendor background, he will help us demystify DNS security and understand how it fits, or not, in a security profile.&nbsp;</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>In the beginning… there was a desktop AV and a firewall.&nbsp; Today, security teams manage scores of security tools from dozens of vendors.&nbsp; With interest in DNS security growing significantly over the last few years, we need to ask why you would want to invest in it, what would DNS security do to the rest of the security stack, and how would it impact SecOps?&nbsp; To answer these questions and more, this week’s guest is Anthony James, Infoblox products VP.&nbsp; An industry veteran with a broad vendor background, he will help us demystify DNS security and understand how it fits, or not, in a security profile.&nbsp;</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/on-top-of-everything-else-why-dns-for-security]]></link><guid isPermaLink="false">6fd3dd87-2ec1-4890-b5fb-451e1c2628ff</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 22 Jun 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/86d9b4f6-b25d-46a9-a868-cf484795cb28/Infoblox-20ThreatTalk-206-21-22-mixdown.mp3" length="21661818" type="audio/mpeg"/><itunes:duration>30:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>11</itunes:episode><itunes:season>3</itunes:season><podcast:episode>11</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>An Author Interview: 2022 Global State of Security Report</title><itunes:title>An Author Interview: 2022 Global State of Security Report</itunes:title><description><![CDATA[<p>ThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We’ll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>ThreatTalk guest Bill Brenner of the CyberRisk Alliance (CRA) joins us to discuss a recent global security survey they conducted on behalf of Infoblox. We’ll go over and beyond survey results to better understand how they plan to address current security concerns, investment issues, preferred methodologies, and more.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/an-author-interview-2022-global-state-of-security-report]]></link><guid isPermaLink="false">503c05ad-7b7e-4238-81b0-da95d19d63b3</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 08 Jun 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/17f48c01-0b30-4d75-b5c6-8729decc6c51/Infoblox-20ThreatTalk-206-7-22-mixdown.mp3" length="22717949" type="audio/mpeg"/><itunes:duration>31:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>10</itunes:episode><itunes:season>3</itunes:season><podcast:episode>10</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Gaining Enlightenment Through Dark Reading</title><itunes:title>Gaining Enlightenment Through Dark Reading</itunes:title><description><![CDATA[<p>Dark Reading magazine recently published a series of articles on DNS, shining a light on one of the most overlooked areas of cybersecurity despite the role of DNS at the foundation of modern communications. We’ve invited Krupa Srivatsan, a Director in the Infoblox security products team, to share her favorite highlights from this 17 page, in depth review by Dark Reading into the potential security benefits to be found in DNS and other core network services.  </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Dark Reading magazine recently published a series of articles on DNS, shining a light on one of the most overlooked areas of cybersecurity despite the role of DNS at the foundation of modern communications. We’ve invited Krupa Srivatsan, a Director in the Infoblox security products team, to share her favorite highlights from this 17 page, in depth review by Dark Reading into the potential security benefits to be found in DNS and other core network services.  </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/gaining-enlightenment-through-dark-reading]]></link><guid isPermaLink="false">bf97c03f-f750-4348-b0d1-e9d6d1bc5f84</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 18 May 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/300c7b41-09c8-4a9f-938b-0fc06e290d2a/Infoblox-20ThreatTalk-205-17-22-mixdown-96kbps.mp3" length="21631722" type="audio/mpeg"/><itunes:duration>29:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>9</itunes:episode><itunes:season>3</itunes:season><podcast:episode>9</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>A Security Ecosystem Diet for Healthier Risk Levels</title><itunes:title>A Security Ecosystem Diet for Healthier Risk Levels</itunes:title><description><![CDATA[<p>Have you figured out a recipe for blending your security solutions into a satisfying ecosystem that optimizes your SecOps while lowering overall risk levels?&nbsp; If not, join us and our guest Pallavi Singh, an Infoblox lead on security integrations for everything from endpoints to cloud services, as we go beyond the hype and drill into ecosystem pros and cons.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the  ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Have you figured out a recipe for blending your security solutions into a satisfying ecosystem that optimizes your SecOps while lowering overall risk levels?&nbsp; If not, join us and our guest Pallavi Singh, an Infoblox lead on security integrations for everything from endpoints to cloud services, as we go beyond the hype and drill into ecosystem pros and cons.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the  ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/a-security-ecosystem-diet-for-healthier-risk-levels]]></link><guid isPermaLink="false">ed20914a-4dd8-435c-a0b3-a588be2ae030</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 04 May 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/966f602e-438c-47cd-bb94-bad1e321c9b3/Infoblox-20ThreatTalk-205-03-22-mixdown.mp3" length="22390476" type="audio/mpeg"/><itunes:duration>31:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>8</itunes:episode><itunes:season>3</itunes:season><podcast:episode>8</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Is Network Metadata the New Meta for Security?</title><itunes:title>Is Network Metadata the New Meta for Security?</itunes:title><description><![CDATA[<p>Security teams have always depended on network and login data to help connect events to users and devices. But is there more to be found in that raw data? What about the metadata being made available on modern hybrid and distributed networks?&nbsp; We’ve invited veteran networking guru Bob Rose to join us to take a deeper look at ‘metadata’, and the hidden gems for security teams to be found buried in it.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Security teams have always depended on network and login data to help connect events to users and devices. But is there more to be found in that raw data? What about the metadata being made available on modern hybrid and distributed networks?&nbsp; We’ve invited veteran networking guru Bob Rose to join us to take a deeper look at ‘metadata’, and the hidden gems for security teams to be found buried in it.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/is-network-metadata-the-new-meta-for-security]]></link><guid isPermaLink="false">e2035f09-0573-4fcc-b144-b8772cf6a9e1</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 20 Apr 2022 07:07:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3841ea8-8ca2-4bc3-b4be-a92cedaf5bc6/Infoblox-20ThreatTalk-204-19-22-mixdown.mp3" length="21281658" type="audio/mpeg"/><itunes:duration>29:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>7</itunes:episode><itunes:season>3</itunes:season><podcast:episode>7</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Did You Fall For April Fools 2.0 | Trends In Phishing</title><itunes:title>Did You Fall For April Fools 2.0 | Trends In Phishing</itunes:title><description><![CDATA[<p>April first is a day full of mostly harmless pranks and hijinks; but what about cyber threats that are fooling your users year-round? Join Bob Hansmann and guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox for our annual discussion on the current state of phishing, lookalikes, social engineering, BECs and other evasion techniques. We will pull from recent examples and discuss trends that may help you prepare for future threats.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>April first is a day full of mostly harmless pranks and hijinks; but what about cyber threats that are fooling your users year-round? Join Bob Hansmann and guest Druce MacFarlane, Sr. Product Manager for Threat Intelligence at Infoblox for our annual discussion on the current state of phishing, lookalikes, social engineering, BECs and other evasion techniques. We will pull from recent examples and discuss trends that may help you prepare for future threats.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/did-you-fall-for-april-fools-2-0-trends-in-phishing]]></link><guid isPermaLink="false">e52b9eff-6e9e-4079-8abd-1964f21f117c</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 06 Apr 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/88782ba7-8d10-4c51-b7b5-450f28ea3e95/Infoblox-20ThreatTalk-204-5-22-mixdown.mp3" length="22180487" type="audio/mpeg"/><itunes:duration>30:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>6</itunes:episode><itunes:season>3</itunes:season><podcast:episode>6</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Examining the State of Nation-state Cyberattacks</title><itunes:title>Examining the State of Nation-state Cyberattacks</itunes:title><description><![CDATA[<p>Nation-state threats are nothing new but, considering cyberactivity linked to the current crisis in Ukraine, we need to update our understanding of nation-state cyber threat potential, and the security strategies necessary to address them. Join host Bob Hansmann and his guests Ed Hunter, CISO for Infoblox, and Anthony Ciarochi, SecOps Manager for Infoblox, as they take us up a level on the current cyberthreat landscape.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Nation-state threats are nothing new but, considering cyberactivity linked to the current crisis in Ukraine, we need to update our understanding of nation-state cyber threat potential, and the security strategies necessary to address them. Join host Bob Hansmann and his guests Ed Hunter, CISO for Infoblox, and Anthony Ciarochi, SecOps Manager for Infoblox, as they take us up a level on the current cyberthreat landscape.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/examining-the-state-of-nation-state-cyberattacks]]></link><guid isPermaLink="false">54d80f87-a766-4dc1-a481-7257cb9c891e</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 16 Mar 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/26482684-2291-4ded-9fc0-39da347c10cf/infoblox-threattalk-3-15-22-mixdown.mp3" length="25031184" type="audio/mpeg"/><itunes:duration>34:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>5</itunes:episode><itunes:season>3</itunes:season><podcast:episode>5</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Let’s dwell a moment on ‘Dwell-time’</title><itunes:title>Let’s dwell a moment on ‘Dwell-time’</itunes:title><description><![CDATA[<p>How long would it take your defenses to detect an intruder? Average breach dwell-time estimates range from 24 days to almost a year. So, unless your organization’s acceptable dwell-time falls in that range, we’ve invited Gary Cox to talk about dwell-time and how to reduce it based on his extensive IT and security work throughout Europe.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>How long would it take your defenses to detect an intruder? Average breach dwell-time estimates range from 24 days to almost a year. So, unless your organization’s acceptable dwell-time falls in that range, we’ve invited Gary Cox to talk about dwell-time and how to reduce it based on his extensive IT and security work throughout Europe.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/lets-dwell-a-moment-on-dwell-time]]></link><guid isPermaLink="false">6e46d20e-e672-4bdb-8568-a2bc8160df92</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 02 Mar 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/15cb2229-22bb-4085-994c-9543e3b5847b/threattalk-s3e04-mixdown.mp3" length="22393452" type="audio/mpeg"/><itunes:duration>31:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>4</itunes:episode><itunes:season>3</itunes:season><podcast:episode>4</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Emails That Say “ILOVEYOU”: Lessons Learned from the Love Bug Virus</title><itunes:title>Emails That Say “ILOVEYOU”: Lessons Learned from the Love Bug Virus</itunes:title><description><![CDATA[<p>The “I Love You” virus was the first major, global cyberattack of the millennium, setting records for damage and speed of dissemination.&nbsp; So we’ve invited Infoblox Security Operations Manager Anthony Ciarochi to discuss the evolution of email into the #1 attack vector, and how defenders have adapted to deal with it.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>The “I Love You” virus was the first major, global cyberattack of the millennium, setting records for damage and speed of dissemination.&nbsp; So we’ve invited Infoblox Security Operations Manager Anthony Ciarochi to discuss the evolution of email into the #1 attack vector, and how defenders have adapted to deal with it.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/emails-that-say-iloveyou-lessons-learned-from-the-love-bug-virus]]></link><guid isPermaLink="false">0e8c43b2-24d2-4c29-8064-5d009590f1b2</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 16 Feb 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/06e927b6-f232-4bc3-852f-10716e4e4579/infoblox-threattalk-2-15-22-mixdown-96kbps.mp3" length="22234380" type="audio/mpeg"/><itunes:duration>30:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>3</itunes:episode><itunes:season>3</itunes:season><podcast:episode>3</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Is Cloud just a networking dream and Hybrid the reality?</title><itunes:title>Is Cloud just a networking dream and Hybrid the reality?</itunes:title><description><![CDATA[<p>Everyone talks about moving to the cloud and dreams of one day turning the data center into a VR gaming room.&nbsp; (For team-building exercises, certainly.)&nbsp; But, after several years of the ‘moving to cloud’, the world seems to be stuck in a Hybrid state.&nbsp; So this week’s ThreatTalk invites Vincent Berk, Author at Riverbed Blog, to help us look at the networking and security realities that may be dashing dreams of a 100% cloud future.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Everyone talks about moving to the cloud and dreams of one day turning the data center into a VR gaming room.&nbsp; (For team-building exercises, certainly.)&nbsp; But, after several years of the ‘moving to cloud’, the world seems to be stuck in a Hybrid state.&nbsp; So this week’s ThreatTalk invites Vincent Berk, Author at Riverbed Blog, to help us look at the networking and security realities that may be dashing dreams of a 100% cloud future.</p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/is-cloud-just-a-networking-dream-and-hybrid-the-reality]]></link><guid isPermaLink="false">ece723c6-880f-4d48-be3a-45684453d337</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 02 Feb 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/da9c1d57-7b0c-4d43-b297-6f630d5d930b/infoblox-threattalk-02-01-22-mixdown.mp3" length="22110888" type="audio/mpeg"/><itunes:duration>30:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>2</itunes:episode><itunes:season>3</itunes:season><podcast:episode>2</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Log4J: Behind the headlines and beyond</title><itunes:title>Log4J: Behind the headlines and beyond</itunes:title><description><![CDATA[<p>The&nbsp;story around&nbsp;the&nbsp;Log4J vulnerability has been told&nbsp;and&nbsp;retold by countless security publications&nbsp;and&nbsp;vendors.&nbsp;Join us on January 18 as guests Renee Burton&nbsp;and&nbsp;Druce MacFarlane take us&nbsp;behindthe&nbsp;scenes to understand&nbsp;the&nbsp;threat posed by vulnerabilities,&nbsp;the&nbsp;threat actors exploiting&nbsp;them,&nbsp;andhow researchers work to counter those threats. </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PDT).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>The&nbsp;story around&nbsp;the&nbsp;Log4J vulnerability has been told&nbsp;and&nbsp;retold by countless security publications&nbsp;and&nbsp;vendors.&nbsp;Join us on January 18 as guests Renee Burton&nbsp;and&nbsp;Druce MacFarlane take us&nbsp;behindthe&nbsp;scenes to understand&nbsp;the&nbsp;threat posed by vulnerabilities,&nbsp;the&nbsp;threat actors exploiting&nbsp;them,&nbsp;andhow researchers work to counter those threats. </p><p>Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PDT).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/log4j-behind-the-headlines-and-beyond]]></link><guid isPermaLink="false">8d7a1793-ecfd-4ae8-ba3b-b89dfc99a0e9</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 19 Jan 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc1c3484-b95b-4e48-b844-8bfbdf500bc5/threattalk-s3e01-mixdown-96kbps.mp3" length="22889904" type="audio/mpeg"/><itunes:duration>31:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>1</itunes:episode><itunes:season>3</itunes:season><podcast:episode>1</podcast:episode><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>ThreatTalk Season 3 Preview</title><itunes:title>ThreatTalk Season 3 Preview</itunes:title><description><![CDATA[<p>Infoblox is excited to present season 3 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Infoblox is excited to present season 3 of the ThreatTalk podcast series. This season, we are looking forward to featuring external guests as well as the industry experts within Infoblox. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.&nbsp;</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/threattalk-season-3-preview]]></link><guid isPermaLink="false">9f77a0cf-4bf7-4022-9a74-185ca12f50ba</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 05 Jan 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9b4feb2e-737c-4c6a-b159-4344cf2e9c16/infoblox-threattalk-season-3-preview.mp3" length="1015563" type="audio/mpeg"/><itunes:duration>01:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:season>3</itunes:season><podcast:season>3</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Are There Smarter Ways to Gather and Apply Threat Intelligence?</title><itunes:title>Are There Smarter Ways to Gather and Apply Threat Intelligence?</itunes:title><description><![CDATA[<p>Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. Join us as guests Druce MacFarland and David Seeman discuss key concepts that can help you maximize the value of your own Threat Intel program.</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Everyone talks about threat intelligence as if it was a ‘thing’ you need. But detection, investigation, response, and other security functions will require unique blends of threat intelligence from multiple sources to be effective. Join us as guests Druce MacFarland and David Seeman discuss key concepts that can help you maximize the value of your own Threat Intel program.</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/are-there-smarter-ways-to-gather-and-apply-threat-intelligence]]></link><guid isPermaLink="false">497f9324-965e-4e44-b9c7-2f284580abd5</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 08 Dec 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7aebf63f-e9fa-4812-b369-4ec5b21e12a2/infoblox-threattalk-12-07-21-mixdown.mp3" length="24098935" type="audio/mpeg"/><itunes:duration>33:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>17</itunes:episode><itunes:season>2</itunes:season><podcast:episode>17</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Does Security Automation Need To SOAR, Or Just Fly?</title><itunes:title>Does Security Automation Need To SOAR, Or Just Fly?</itunes:title><description><![CDATA[<p>From writing a few scripts using APIs, to full-fledge SOAR solutions, automation is getting a serious look from those who are seeing little success from throwing bodies at security problems.&nbsp;&nbsp;But choosing the right automation approach is a tough decision that demands a solid understanding of each option, what it can deliver, and what it will cost in time and money.&nbsp;&nbsp;&nbsp;</p><p>Due to his extensive background in security ecosystems, and SOAR solutions in in particular, ThreatTalk has invited Craig Sanderson, VP of Product Management for security solutions at Infoblox, to join us for this discussion.&nbsp;&nbsp;We look forward to hearing both his technical and philosophical perspectives on important issues around automation including’ “Just because you ‘can’ automate a thing, it doesn’t mean you ‘should’ automate it.”&nbsp;</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>From writing a few scripts using APIs, to full-fledge SOAR solutions, automation is getting a serious look from those who are seeing little success from throwing bodies at security problems.&nbsp;&nbsp;But choosing the right automation approach is a tough decision that demands a solid understanding of each option, what it can deliver, and what it will cost in time and money.&nbsp;&nbsp;&nbsp;</p><p>Due to his extensive background in security ecosystems, and SOAR solutions in in particular, ThreatTalk has invited Craig Sanderson, VP of Product Management for security solutions at Infoblox, to join us for this discussion.&nbsp;&nbsp;We look forward to hearing both his technical and philosophical perspectives on important issues around automation including’ “Just because you ‘can’ automate a thing, it doesn’t mean you ‘should’ automate it.”&nbsp;</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PDT).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/does-security-automation-need-to-soar-or-just-fly]]></link><guid isPermaLink="false">31379260-8573-4e4d-8d9d-ed7411d37aa7</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 17 Nov 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d263990f-5ddc-413f-bde7-3ca55740d0a4/infoblox-threattalk-11-17-21-mixdown.mp3" length="21971245" type="audio/mpeg"/><itunes:duration>30:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>16</itunes:episode><itunes:season>2</itunes:season><podcast:episode>16</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Discovering Visibility You Didn&apos;t Know You Had or Even Needed</title><itunes:title>Discovering Visibility You Didn&apos;t Know You Had or Even Needed</itunes:title><description><![CDATA[<p>Zero Trust Networking is typically discussed in the context of users or devices connecting to the network. But what about the devices that are already there? Security monitoring needs to include all aspects of the network, as well as the devices and users connected to it.</p><p>Check out this week’s ThreatTalk podcast with host Bob Hansmann and his guest, veteran networking technology expert Bob Rose of Infoblox, as they examine the security risks and benefits to be found in seldom discussed areas of networking. Learn about the tools for monitoring, managing, and automating security measures for these foundational areas of modern networks.</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Zero Trust Networking is typically discussed in the context of users or devices connecting to the network. But what about the devices that are already there? Security monitoring needs to include all aspects of the network, as well as the devices and users connected to it.</p><p>Check out this week’s ThreatTalk podcast with host Bob Hansmann and his guest, veteran networking technology expert Bob Rose of Infoblox, as they examine the security risks and benefits to be found in seldom discussed areas of networking. Learn about the tools for monitoring, managing, and automating security measures for these foundational areas of modern networks.</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/discovering-visibility-you-didnt-know-you-had-or-even-needed]]></link><guid isPermaLink="false">82904d29-72d0-41c5-a7d0-96603a9b4157</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 03 Nov 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/92f81508-3a36-49a5-907f-4fc1729321db/infoblox-threattalk-11-03-21-mixdown.mp3" length="22392859" type="audio/mpeg"/><itunes:duration>31:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>15</itunes:episode><itunes:season>2</itunes:season><podcast:episode>15</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Avoiding Dumb Mistakes With Smart Cities</title><itunes:title>Avoiding Dumb Mistakes With Smart Cities</itunes:title><description><![CDATA[<p>Smart City development is accelerating and even expanding in response to the new world realities of how citizens access services. But solutions to make municipal services easier to access and consume require greater attention to the inherent security of those solutions and the connective foundation they operate on. Over the last year, vulnerability exposures, ransomware, and other headline news have only served to underscore the need for a solid foundation. Reliability, resiliency, and security need to be the building blocks for constructing modern Smart Cities.</p><p>Guest Krupa Srivatsan, Security Products Director for Infoblox, has been working around the world with those on the front lines of Smart City planning and deployment. She will join host Bob Hansmann on Threat Talk to discuss risks imposed by our new world reality and essential steps that deliver significant, smart city-wide security benefits.</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Smart City development is accelerating and even expanding in response to the new world realities of how citizens access services. But solutions to make municipal services easier to access and consume require greater attention to the inherent security of those solutions and the connective foundation they operate on. Over the last year, vulnerability exposures, ransomware, and other headline news have only served to underscore the need for a solid foundation. Reliability, resiliency, and security need to be the building blocks for constructing modern Smart Cities.</p><p>Guest Krupa Srivatsan, Security Products Director for Infoblox, has been working around the world with those on the front lines of Smart City planning and deployment. She will join host Bob Hansmann on Threat Talk to discuss risks imposed by our new world reality and essential steps that deliver significant, smart city-wide security benefits.</p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/avoiding-dumb-mistakes-with-smart-cities]]></link><guid isPermaLink="false">a06c6011-ad41-492f-b689-a3db7e3e9355</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 20 Oct 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/32ee907e-16a8-487f-80f4-07aa12dce7cf/infoblox-threattalk-10-19-21-mixdown.mp3" length="21515971" type="audio/mpeg"/><itunes:duration>29:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>14</itunes:episode><itunes:season>2</itunes:season><podcast:episode>14</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Defending the Endpoint: Sharing Responsibility Between IT and End Users</title><itunes:title>Defending the Endpoint: Sharing Responsibility Between IT and End Users</itunes:title><description><![CDATA[<p>October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity?&nbsp;Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?</p><p>In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros &amp; cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality. </p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity?&nbsp;Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?</p><p>In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros &amp; cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality. </p><p>Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/defending-the-endpoint-sharing-responsibility-between-it-and-end-users]]></link><guid isPermaLink="false">e7a5a443-f797-4b92-a3a1-e5aea7037900</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 06 Oct 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/04ccd1c9-736e-4e2b-b841-85bf0214ba0b/threattalk-10-04-21-mixdown.mp3" length="22872691" type="audio/mpeg"/><itunes:duration>31:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>13</itunes:episode><itunes:season>2</itunes:season><podcast:episode>13</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Balancing In-house and Outsourced SecOps</title><itunes:title>Balancing In-house and Outsourced SecOps</itunes:title><description><![CDATA[<p>30 years ago, cyber security involved little more than firewalls and desktop AV. But today's security tools, expertise, and services are so numerous and complex that few if any, organizations can claim to have everything they need 'in-house'.  Due to various needs and constraints, including budgets, it is a constant struggle to balance what capabilities should be in-house and which can be safely outsourced.</p><p>This episode of ThreatTalk explores the fundamentals behind most outsourcing decisions with the help of telco and service provider veteran David Ayers. Join host Bob Hansmann and his guests for this exploratory discussion on "getting help" with your cybersecurity.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>30 years ago, cyber security involved little more than firewalls and desktop AV. But today's security tools, expertise, and services are so numerous and complex that few if any, organizations can claim to have everything they need 'in-house'.  Due to various needs and constraints, including budgets, it is a constant struggle to balance what capabilities should be in-house and which can be safely outsourced.</p><p>This episode of ThreatTalk explores the fundamentals behind most outsourcing decisions with the help of telco and service provider veteran David Ayers. Join host Bob Hansmann and his guests for this exploratory discussion on "getting help" with your cybersecurity.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/balancing-in-house-and-outsourced-secops]]></link><guid isPermaLink="false">58e77224-c1ab-484e-8902-3d2bccf3d062</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 22 Sep 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3f4ab0c-a221-4686-8a66-4583beeeba26/infoblox-threattalk-09-22-21-mixdown-96kbps.mp3" length="20853931" type="audio/mpeg"/><itunes:duration>28:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>12</itunes:episode><itunes:season>2</itunes:season><podcast:episode>12</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Do you know who or what is on your network? - Part 2!</title><itunes:title>Do you know who or what is on your network? - Part 2!</itunes:title><description><![CDATA[<p>On the heels of our last podcast on the need for greater synergy between networking and security technologies, the recent T-Mobile cyberattack has been linked to an unsecured router as the original point of entry. So we are bringing back Bob Rose, a veteran network technologies expert and a former product manager for AT&amp;T's Enterprise Mobility Management. Together, we will explore the security risks that can exist in our networks and how leading companies are controlling them. We'll pay particular attention to the current reality of IoT, BYOD, and the hybrid workplace that only helps to complicate security efforts.</p><p>Visibility for Hybrid Networking and Security webinar: <a href="https://youtu.be/CptSuDpA51U?fbclid=IwAR0HH4fU7Kcqq-FFKaehmiEFA8UBr7YQ7u1qocrrCBQd4ktLJBP1fM5oADQ" rel="noopener noreferrer" target="_blank">https://youtu.be/CptSuDpA51U</a></p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>On the heels of our last podcast on the need for greater synergy between networking and security technologies, the recent T-Mobile cyberattack has been linked to an unsecured router as the original point of entry. So we are bringing back Bob Rose, a veteran network technologies expert and a former product manager for AT&amp;T's Enterprise Mobility Management. Together, we will explore the security risks that can exist in our networks and how leading companies are controlling them. We'll pay particular attention to the current reality of IoT, BYOD, and the hybrid workplace that only helps to complicate security efforts.</p><p>Visibility for Hybrid Networking and Security webinar: <a href="https://youtu.be/CptSuDpA51U?fbclid=IwAR0HH4fU7Kcqq-FFKaehmiEFA8UBr7YQ7u1qocrrCBQd4ktLJBP1fM5oADQ" rel="noopener noreferrer" target="_blank">https://youtu.be/CptSuDpA51U</a></p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/do-you-know-who-or-what-is-on-your-network-part-2]]></link><guid isPermaLink="false">3598adb5-5034-4fd2-9e24-2860ecdd9beb</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 08 Sep 2021 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4dd3e09f-0530-4346-ba83-dc488f41ceff/infoblox-threattalk-09-08-21-mixdown.mp3" length="21676675" type="audio/mpeg"/><itunes:duration>30:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>11</itunes:episode><itunes:season>2</itunes:season><podcast:episode>11</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Do you know who or what is on your network?</title><itunes:title>Do you know who or what is on your network?</itunes:title><description><![CDATA[<p>Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities.  Network data importance has only grown with global shifts toward IoT, BYOD, and the hybrid workplace.</p><p>Infoblox veteran networking technologies expert Bob Rose joins us to dig into the gold mine of security benefits to be found in network data, tools, and technologies, much of which you probably already have.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities.  Network data importance has only grown with global shifts toward IoT, BYOD, and the hybrid workplace.</p><p>Infoblox veteran networking technologies expert Bob Rose joins us to dig into the gold mine of security benefits to be found in network data, tools, and technologies, much of which you probably already have.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/do-you-know-who-or-what-is-on-your-network]]></link><guid isPermaLink="false">5e5583cc-b1e2-4e48-b470-2aabbbf6bf80</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 18 Aug 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b266e0eb-277e-4c36-9a85-7b66a4096791/infoblox-threattalk-08-18-21-mixdown-96kbps.mp3" length="21208333" type="audio/mpeg"/><itunes:duration>29:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>10</itunes:episode><itunes:season>2</itunes:season><podcast:episode>10</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Q2 Threat Roundup: Rising Ransoms and Vanishing Villains</title><itunes:title>Q2 Threat Roundup: Rising Ransoms and Vanishing Villains</itunes:title><description><![CDATA[<p>A lot has changed on the ransomware landscape in just the last month, with three headline-grabbing breaches and a disappearing act by two of the largest black-market dealers of ransomware tools and services. Join us on ThreatTalk for the return of Michael Zuckerman, consulting senior product marketing manager and author/editor of the ‘Q2 2021 Cyber Threat Intelligence Report’. Michael will help us understand how this critical segment of cyber risk is changing and what it means for defenders and responders alike!</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>A lot has changed on the ransomware landscape in just the last month, with three headline-grabbing breaches and a disappearing act by two of the largest black-market dealers of ransomware tools and services. Join us on ThreatTalk for the return of Michael Zuckerman, consulting senior product marketing manager and author/editor of the ‘Q2 2021 Cyber Threat Intelligence Report’. Michael will help us understand how this critical segment of cyber risk is changing and what it means for defenders and responders alike!</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/q2-threat-roundup-rising-ransoms-and-vanishing-villains]]></link><guid isPermaLink="false">bcc19b40-507f-4f5b-908a-3d12138d965b</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 04 Aug 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5f609048-27e7-436e-9b1f-430725d77abf/infoblox-threattalk-08-03-21-mixdown.mp3" length="25244824" type="audio/mpeg"/><itunes:duration>35:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>9</itunes:episode><itunes:season>2</itunes:season><podcast:episode>9</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Grading Threat Intelligence on a Curve – Part 2</title><itunes:title>Grading Threat Intelligence on a Curve – Part 2</itunes:title><description><![CDATA[<p>After a great discussion about using threat intelligence (TI) to improve threat blocking across the entire security stack, we bring back guest Druce MacFarlane for round 2 of this engaging topic. Investigators and responders need access to much more than IoCs to help guide their studies and reach effective response decisions as quickly as possible. But just as we discussed around threat defense last time, not all threat intelligence is created equal.&nbsp;</p><p>Join host Bob Hansmann and his guest Druce MacFarlane on this week's quest for security enlightenment on ThreatTalk.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>After a great discussion about using threat intelligence (TI) to improve threat blocking across the entire security stack, we bring back guest Druce MacFarlane for round 2 of this engaging topic. Investigators and responders need access to much more than IoCs to help guide their studies and reach effective response decisions as quickly as possible. But just as we discussed around threat defense last time, not all threat intelligence is created equal.&nbsp;</p><p>Join host Bob Hansmann and his guest Druce MacFarlane on this week's quest for security enlightenment on ThreatTalk.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/grading-threat-intelligence-on-a-curve-part-2]]></link><guid isPermaLink="false">00d1662d-d98d-4baa-87c6-a2c41eb0280d</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 21 Jul 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c447882a-03a9-4bfb-9dc3-155a329469cb/infoblox-threattalk-07-20-21-mixdown.mp3" length="20700301" type="audio/mpeg"/><itunes:duration>28:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>8</itunes:episode><itunes:season>2</itunes:season><podcast:episode>8</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Making Cyber Insurance Pay</title><itunes:title>Making Cyber Insurance Pay</itunes:title><description><![CDATA[<p>With ransoms in the millions called out in headlines, companies are taking a more serious look at cyber insurance. Brushing off scary ‘potential’ damage stories from the security team may be easy for some boards, they cannot easily ignore hard numbers like those in the press.</p><p>ThreatTalk has invited Krupa Srivatsan, Director of Product Marketing for the security division at Infoblox to discuss cyber insurance in this week’s episode; “Making Cyber Insurance Pay”. Admittedly a broad topic, we will focus on clarifying what cyber insurance really is, what it covers, what it does not, and the factors that can make the premiums more palatable to the financial office. We’ll even speculate where it is all heading in the aftermath of the multi-million dollar ransoms paid in the recent ransomware attacks on Colonial Pipeline and JBS.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>With ransoms in the millions called out in headlines, companies are taking a more serious look at cyber insurance. Brushing off scary ‘potential’ damage stories from the security team may be easy for some boards, they cannot easily ignore hard numbers like those in the press.</p><p>ThreatTalk has invited Krupa Srivatsan, Director of Product Marketing for the security division at Infoblox to discuss cyber insurance in this week’s episode; “Making Cyber Insurance Pay”. Admittedly a broad topic, we will focus on clarifying what cyber insurance really is, what it covers, what it does not, and the factors that can make the premiums more palatable to the financial office. We’ll even speculate where it is all heading in the aftermath of the multi-million dollar ransoms paid in the recent ransomware attacks on Colonial Pipeline and JBS.</p><p>Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST).&nbsp;Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/making-cyber-insurance-pay]]></link><guid isPermaLink="false">c206404e-65c0-4f63-ae43-80cef61b86ae</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 07 Jul 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa080081-7770-41b4-aee2-8a525eee1da5/infoblox-threattalk-07-06-21-mixdown-v2.mp3" length="21762696" type="audio/mpeg"/><itunes:duration>30:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>7</itunes:episode><itunes:season>2</itunes:season><podcast:episode>7</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>The Role of Platforms in an Agile World</title><itunes:title>The Role of Platforms in an Agile World</itunes:title><description><![CDATA[<p>Enterprise security teams rarely buy tools based purely on the current set of features and functions.&nbsp;They also assess the vendors' ability to deliver timely support and updates so the solution will continue to provide value over the entire investment period.&nbsp; In particular, security solutions must be able to quickly adapt to shifts in technology, threat, and even workplace landscapes.&nbsp; But how can you measure a vendors' ability to deliver on these vague, future requirements?</p><p>This week's guests on ThreatTalk will discuss how a security vendor's strategic investment in a cloud-native 'platform' can help address these longer-term customer requirements. After several weeks of analyst briefings and consultations, we will be joined by Troy Hager, Infoblox Sr. Director for Product Management - SaaS Platforms, and Krupa Srivatsan, Infoblox Director of Product Marketing-Strategy, to talk about the value of platforms in an agile world to ensure long-term value.</p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).&nbsp; Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Enterprise security teams rarely buy tools based purely on the current set of features and functions.&nbsp;They also assess the vendors' ability to deliver timely support and updates so the solution will continue to provide value over the entire investment period.&nbsp; In particular, security solutions must be able to quickly adapt to shifts in technology, threat, and even workplace landscapes.&nbsp; But how can you measure a vendors' ability to deliver on these vague, future requirements?</p><p>This week's guests on ThreatTalk will discuss how a security vendor's strategic investment in a cloud-native 'platform' can help address these longer-term customer requirements. After several weeks of analyst briefings and consultations, we will be joined by Troy Hager, Infoblox Sr. Director for Product Management - SaaS Platforms, and Krupa Srivatsan, Infoblox Director of Product Marketing-Strategy, to talk about the value of platforms in an agile world to ensure long-term value.</p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).&nbsp; Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/the-role-of-platforms-in-an-agile-world]]></link><guid isPermaLink="false">84e617ad-d49a-4e22-9628-71c963b40fba</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 16 Jun 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d1537dc7-bed3-40c3-8003-42c0a9f762ca/infoblox-threattalk-06-16-21-mixdown-96kbps.mp3" length="20870065" type="audio/mpeg"/><itunes:duration>28:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>6</itunes:episode><itunes:season>2</itunes:season><podcast:episode>6</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Grading Threat Intelligence on a Curve</title><itunes:title>Grading Threat Intelligence on a Curve</itunes:title><description><![CDATA[<p>Security teams consume threat intelligence (TI) in many ways but struggle to find just the right mix because not all TI is created equal.&nbsp;Defenders constantly struggle to find the balance between high detection rates and low false positives.&nbsp;Meanwhile, threat investigators and incident responders need TI they can leverage to make more effective decisions faster.&nbsp;The result can be a complex blend of dozens of threat intelligence feeds.</p><p>This week Druce MacFarlane, Sr. Product Manager for Security and Analytics at Infoblox, joins us to help break down the threat intelligence that underpins our protection, detection, investigation, and response capabilities.</p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Security teams consume threat intelligence (TI) in many ways but struggle to find just the right mix because not all TI is created equal.&nbsp;Defenders constantly struggle to find the balance between high detection rates and low false positives.&nbsp;Meanwhile, threat investigators and incident responders need TI they can leverage to make more effective decisions faster.&nbsp;The result can be a complex blend of dozens of threat intelligence feeds.</p><p>This week Druce MacFarlane, Sr. Product Manager for Security and Analytics at Infoblox, joins us to help break down the threat intelligence that underpins our protection, detection, investigation, and response capabilities.</p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/grading-threat-intelligence-on-a-curve]]></link><guid isPermaLink="false">fa14e6e7-7006-4451-865f-06d497c0c5f7</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 02 Jun 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e0bde08e-535d-4deb-aab5-2c5be09e3664/infoblox-threattalk-06-01-21-mixdown-96kbps.mp3" length="19697825" type="audio/mpeg"/><itunes:duration>27:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>5</itunes:episode><itunes:season>2</itunes:season><podcast:episode>5</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Looking on the Bright Side of the DarkSide</title><itunes:title>Looking on the Bright Side of the DarkSide</itunes:title><description><![CDATA[<p>While headlines declare the Colonial Pipeline breach a "wake-up call", experienced cybersecurity professionals are biting their tongues from declaring, "I told you so".&nbsp; So this episode of ThreatTalk will be light on the 'scary stories' of DarkSide to focus more on what we are learning from this latest real-world ransomware incident.</p><p>Join host Bob Hansmann on this week’s show to go beyond the hype in search of the gems worth learning, with the help of guests Craig Sanderson, VP of Products-Security, and Krupa Srivatsan, Product Marketing Director-Security, both of Infoblox.&nbsp;</p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>While headlines declare the Colonial Pipeline breach a "wake-up call", experienced cybersecurity professionals are biting their tongues from declaring, "I told you so".&nbsp; So this episode of ThreatTalk will be light on the 'scary stories' of DarkSide to focus more on what we are learning from this latest real-world ransomware incident.</p><p>Join host Bob Hansmann on this week’s show to go beyond the hype in search of the gems worth learning, with the help of guests Craig Sanderson, VP of Products-Security, and Krupa Srivatsan, Product Marketing Director-Security, both of Infoblox.&nbsp;</p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/looking-on-the-bright-side-of-the-darkside]]></link><guid isPermaLink="false">a61c78cd-e323-4ca9-a231-72cda94736e7</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 19 May 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/425bc3e6-443e-458a-9334-60cd627b7964/infoblox-threattalk-05-18-21-mixdown-96kbps.mp3" length="20623764" type="audio/mpeg"/><itunes:duration>28:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>4</itunes:episode><itunes:season>2</itunes:season><podcast:episode>4</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Celebrating May Day and the Anywhere Workplace</title><itunes:title>Celebrating May Day and the Anywhere Workplace</itunes:title><description><![CDATA[<p>Michael Osterman of Osterman Research joins us on this week's ThreatTalk! Michael and host Bob Hansmann will be discussing the findings from an Osterman survey of security leaders about their long-term strategies and investment plans for a post-COVID world! For context, it will review their current security measures to understand what is working - and what is not. </p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST). </p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>Michael Osterman of Osterman Research joins us on this week's ThreatTalk! Michael and host Bob Hansmann will be discussing the findings from an Osterman survey of security leaders about their long-term strategies and investment plans for a post-COVID world! For context, it will review their current security measures to understand what is working - and what is not. </p><p>Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST). </p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/celebrating-may-day-and-the-anywhere-workplace]]></link><guid isPermaLink="false">e8614dfb-112a-4c3e-94de-29b149380d65</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 05 May 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b27cb151-e3de-476a-9b8e-e29c4f4b1c7b/infoblox-threattalk-s2e3-05-04-21-mixdown-96kbps.mp3" length="16970159" type="audio/mpeg"/><itunes:duration>23:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>3</itunes:episode><itunes:season>2</itunes:season><podcast:episode>3</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Q1 Threat Roundup | Trends, Tactics &amp; Tails</title><itunes:title>Q1 Threat Roundup | Trends, Tactics &amp; Tails</itunes:title><description><![CDATA[<p>This week our host Bob Hansmann is joined by Infoblox’s consulting senior product marketing manager, Michael Zuckerman. They will be talking about the latest trends and tactics uncovered in the Infoblox Q1 Cyberthreat Intelligence Report. The first quarter of 2021 saw many new cybersecurity issues, and this show is sure to provide some great discussions and actionable insights. Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>This week our host Bob Hansmann is joined by Infoblox’s consulting senior product marketing manager, Michael Zuckerman. They will be talking about the latest trends and tactics uncovered in the Infoblox Q1 Cyberthreat Intelligence Report. The first quarter of 2021 saw many new cybersecurity issues, and this show is sure to provide some great discussions and actionable insights. Tune in to the live event on LinkedIn every other Tuesday at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/q1-threat-roundup-trends-tactics-tails]]></link><guid isPermaLink="false">abb72d22-565b-4a66-87b2-9ee5318b1256</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 21 Apr 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3a241e2-ee67-4233-a8bd-a0826d9dcbf3/infoblox-threattalk-s2e2-04-20-21-mixdown-96kbps.mp3" length="20433845" type="audio/mpeg"/><itunes:duration>28:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>2</itunes:episode><itunes:season>2</itunes:season><podcast:episode>2</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>Did You Fall For April F0015? | Current Trends In Phishing</title><itunes:title>Did You Fall For April F0015? | Current Trends In Phishing</itunes:title><description><![CDATA[<p>ThreatTalk Season 2 kicks off with Bob Hansman and guest Druce MacFarlane, Sr. Product Manager at Infoblox, talking about the current state of phishing. We will discuss social engineering and lookalike tactics that hackers are using to steal valuable data. Tune in to the live event on LinkedIn at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></description><content:encoded><![CDATA[<p>ThreatTalk Season 2 kicks off with Bob Hansman and guest Druce MacFarlane, Sr. Product Manager at Infoblox, talking about the current state of phishing. We will discuss social engineering and lookalike tactics that hackers are using to steal valuable data. Tune in to the live event on LinkedIn at 11:00 am (PST).</p><p>Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/did-you-fall-for-april-f0015-current-trends-in-phishing]]></link><guid isPermaLink="false">2a63972f-78be-4acf-ac5f-f2ea078177d0</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Wed, 07 Apr 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/05cf81a0-1678-4fcc-a211-353ba74c253b/infoblox-threattalk-s2e1-04-06-21-mixdown-96kbps.mp3" length="23370267" type="audio/mpeg"/><itunes:duration>32:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>1</itunes:episode><itunes:season>2</itunes:season><podcast:episode>1</podcast:episode><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>ThreatTalk Season 2 Preview | New Host, New Format, Same Great Content</title><itunes:title>ThreatTalk Season 2 Preview | New Host, New Format, Same Great Content</itunes:title><description><![CDATA[<p>Infoblox is excited to present season 2 of the ThreatTalk podcast series. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.&nbsp;</p><p>Infoblox Sr. Product Marketing Manager Bob Hansmann will be hosting ThreatTalk Season 2. Bob has been at the bleeding edge of cybersecurity since the early days when firewall and desktop antivirus were the only solutions available.&nbsp;His background as a developer, researcher, product architect, product manager, and product marketer is ideal for extracting interesting details from our guests on the strategic, tactical, or technical aspects of cybersecurity.</p><p>Subscribe to the Threat Talk podcast on Apple Podcasts or Spotify.</p>]]></description><content:encoded><![CDATA[<p>Infoblox is excited to present season 2 of the ThreatTalk podcast series. Join us every 1st and 3rd Tuesday of the month at 11:00 am (PST) for engaging conversations with cybersecurity experts.&nbsp;</p><p>Infoblox Sr. Product Marketing Manager Bob Hansmann will be hosting ThreatTalk Season 2. Bob has been at the bleeding edge of cybersecurity since the early days when firewall and desktop antivirus were the only solutions available.&nbsp;His background as a developer, researcher, product architect, product manager, and product marketer is ideal for extracting interesting details from our guests on the strategic, tactical, or technical aspects of cybersecurity.</p><p>Subscribe to the Threat Talk podcast on Apple Podcasts or Spotify.</p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/threat-talk-season-2-preview-new-host-new-format-same-great-content]]></link><guid isPermaLink="false">5e2e7026-3876-4bb7-b269-ace60198f976</guid><itunes:image href="https://artwork.captivate.fm/1709218e-4148-475c-9040-65c719bb0cd9/veKGhiCvdX0P4ICdHm1f002M.png"/><dc:creator><![CDATA[Infoblox]]></dc:creator><pubDate>Mon, 29 Mar 2021 12:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3de5c5f4-ecde-4801-a86b-1084d0945426/infoblox-threattalk-2021-03-23-episode-0.mp3" length="2056116" type="audio/mpeg"/><itunes:duration>02:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:season>2</itunes:season><podcast:season>2</podcast:season><itunes:author>Infoblox</itunes:author></item><item><title>19. The CIS Framework and Foundational Security</title><itunes:title>19. The CIS Framework and Foundational Security</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Security teams are at war.  Every day, attackers, tactics, techniques, and procedures evolve and are used to assault IT security defenses.</span></p> <p><span style="font-weight: 400;">Enterprises must choose frameworks to help organize their cyber-defense playbooks and run their operations.  The CIS framework provides one of the best options to develop an organization’s security strategies for long term success.</span></p> <p><span style="font-weight: 400;">Michael Zukerman joins ThreatTalk to detail the CIS Framework and how it guides an organization to develop critical security fundamentals.  Michael outlines the three categories of controls within the CIS Framework in detail and their benefits:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">6 essential Basic Security Controls all organizations must adopt</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">10 highly recommended Security Foundational controls</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">4 Organization Security Controls for people, policies, and compliance.</span></li> </ul><br/> <p><span style="font-weight: 400;">After discussing each of the 20 controls, Michael illustrates how Infoblox Threat Defense implements foundational security for DNS, DHCP and IPAM across the entire enterprise.  Unlike a traditional security stack, Infoblox can provide visibility and control critical for CIS into all enterprise environments including cloud resources and remote employees.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Security teams are at war.  Every day, attackers, tactics, techniques, and procedures evolve and are used to assault IT security defenses.</span></p> <p><span style="font-weight: 400;">Enterprises must choose frameworks to help organize their cyber-defense playbooks and run their operations.  The CIS framework provides one of the best options to develop an organization’s security strategies for long term success.</span></p> <p><span style="font-weight: 400;">Michael Zukerman joins ThreatTalk to detail the CIS Framework and how it guides an organization to develop critical security fundamentals.  Michael outlines the three categories of controls within the CIS Framework in detail and their benefits:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">6 essential Basic Security Controls all organizations must adopt</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">10 highly recommended Security Foundational controls</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">4 Organization Security Controls for people, policies, and compliance.</span></li> </ul><br/> <p><span style="font-weight: 400;">After discussing each of the 20 controls, Michael illustrates how Infoblox Threat Defense implements foundational security for DNS, DHCP and IPAM across the entire enterprise.  Unlike a traditional security stack, Infoblox can provide visibility and control critical for CIS into all enterprise environments including cloud resources and remote employees.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/19-the-cis-framework-and-foundational-security]]></link><guid isPermaLink="false">4846a36a-86fa-48ad-b89f-865f5d41df2b</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Fri, 19 Jun 2020 16:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2706c522-e3da-4da9-9658-4c9abd14d510/audio-99926-9739-18747-4ae71a62-7d55-48ff-9f63-9c9ab00ff3b4-converted.mp3" length="19029824" type="audio/mpeg"/><itunes:duration>19:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Security teams are at war.  Every day, attackers, tactics, techniques, and procedures evolve and are used to assault IT security defenses. Enterprises must choose frameworks to help organize their cyber-defense playbooks and run their operations.  The CIS framework provides one of the best options to develop an organization’s security strategies for long term success. Michael Zukerman joins ThreatTalk to detail the CIS Framework and how it guides an organization to develop critical security fundamentals.  Michael outlines the three categories of controls within the CIS Framework in detail and their benefits:  6 essential Basic Security Controls all organizations must adopt 10 highly recommended Security Foundational controls 4 Organization Security Controls for people, policies, and compliance.  After discussing each of the 20 controls, Michael illustrates how Infoblox Threat Defense implements foundational security for DNS, DHCP and IPAM across the entire enterprise.  Unlike a traditional security stack, Infoblox can provide visibility and control critical for CIS into all enterprise environments including cloud resources and remote employees.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>18. ISO Roadmaps to Foundational Security</title><itunes:title>18. ISO Roadmaps to Foundational Security</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Don’t be stuck in the IT stone age!  The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation.</span></p> <p><span style="font-weight: 400;">The digital transformation constantly moves data away from traditional enterprise control:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Rapid expansion of SaaS Applications hosted everywhere</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Branch offices on SDWANs</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Explosion of IoT</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Teleworkers logging in from unsecured locations</span></li> </ul><br/> <p><span style="font-weight: 400;">Michael Zuckerman joins ThreatTalk to discuss how adopting a robust framework like ISO27001 and ISO27002 can provide a roadmap to taking the initiative back from the attackers.  The ISO standards provide key policies and procedures that inform the actions to be taken in advance or in response to an attack.</span></p> <p><span style="font-weight: 400;">DNS security products provide the extended visibility necessary to implement ISO frameworks beyond the network by encompassing cloud resources and remote users.  Combined with NAC devices, DNS security provides foundational security to detect, block, and quarantine infected machines and return control to the enterprise.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Don’t be stuck in the IT stone age!  The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation.</span></p> <p><span style="font-weight: 400;">The digital transformation constantly moves data away from traditional enterprise control:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Rapid expansion of SaaS Applications hosted everywhere</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Branch offices on SDWANs</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Explosion of IoT</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Teleworkers logging in from unsecured locations</span></li> </ul><br/> <p><span style="font-weight: 400;">Michael Zuckerman joins ThreatTalk to discuss how adopting a robust framework like ISO27001 and ISO27002 can provide a roadmap to taking the initiative back from the attackers.  The ISO standards provide key policies and procedures that inform the actions to be taken in advance or in response to an attack.</span></p> <p><span style="font-weight: 400;">DNS security products provide the extended visibility necessary to implement ISO frameworks beyond the network by encompassing cloud resources and remote users.  Combined with NAC devices, DNS security provides foundational security to detect, block, and quarantine infected machines and return control to the enterprise.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/18-iso-roadmaps-to-foundational-security]]></link><guid isPermaLink="false">36feb50e-158d-4c7f-91b6-91514eb51196</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Tue, 16 Jun 2020 06:49:53 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4c1e95af-adff-476c-bc4f-30d6562b2e72/audio-99927-9739-18747-54479f4f-0cff-4071-a793-32f0a8f3d899-converted.mp3" length="16566791" type="audio/mpeg"/><itunes:duration>17:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Don’t be stuck in the IT stone age!  The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation. The digital transformation constantly moves data away from traditional enterprise control:  Rapid expansion of SaaS Applications hosted everywhere Branch offices on SDWANs Explosion of IoT Teleworkers logging in from unsecured locations  Michael Zuckerman joins ThreatTalk to discuss how adopting a robust framework like ISO27001 and ISO27002 can provide a roadmap to taking the initiative back from the attackers.  The ISO standards provide key policies and procedures that inform the actions to be taken in advance or in response to an attack. DNS security products provide the extended visibility necessary to implement ISO frameworks beyond the network by encompassing cloud resources and remote users.  Combined with NAC devices, DNS security provides foundational security to detect, block, and quarantine infected machines and return control to the enterprise.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>17. Find Threats Faster Using DNS</title><itunes:title>17. Find Threats Faster Using DNS</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Most organizations think DNS security means that they must secure their various DNS systems.  However, using DNS security strategically overlays an overarching layer of security capabilities across the enterprise.</span></p> <p><span style="font-weight: 400;"><strong>When harnessing DNS security, an organization can</strong>:</span></p> <ul> <li style="font-weight: 400;"><span style= "font-weight: 400;">Bypass the need to configure of hundreds or thousands of firewalls to block specific addresses or websites.  </span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Secure remote users without VPN overhead.  </span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Control access for cloud resources, datacenters, and containers with a single, simple unifying policy.  </span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Detect infrastructure attacks early in the Mitre Framework stages before data exfiltration or command and control attacks can begin</span></li> </ul><br/> <p><span style="font-weight: 400;">Michael Katz joins ThreatTalk to discuss how DNS enhances the capabilities of firewalls by taking a broader look at the traffic within an organization.  They discuss three key strategies to implementing DNS and cover key DNS mistakes most organizations make when developing their security strategies.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Most organizations think DNS security means that they must secure their various DNS systems.  However, using DNS security strategically overlays an overarching layer of security capabilities across the enterprise.</span></p> <p><span style="font-weight: 400;"><strong>When harnessing DNS security, an organization can</strong>:</span></p> <ul> <li style="font-weight: 400;"><span style= "font-weight: 400;">Bypass the need to configure of hundreds or thousands of firewalls to block specific addresses or websites.  </span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Secure remote users without VPN overhead.  </span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Control access for cloud resources, datacenters, and containers with a single, simple unifying policy.  </span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Detect infrastructure attacks early in the Mitre Framework stages before data exfiltration or command and control attacks can begin</span></li> </ul><br/> <p><span style="font-weight: 400;">Michael Katz joins ThreatTalk to discuss how DNS enhances the capabilities of firewalls by taking a broader look at the traffic within an organization.  They discuss three key strategies to implementing DNS and cover key DNS mistakes most organizations make when developing their security strategies.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/17-find-threats-faster-using-dns]]></link><guid isPermaLink="false">fb0ffe54-9c86-4e1d-b96a-ce3bb4619393</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Fri, 08 May 2020 07:14:44 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7d07e651-b827-4f57-ac2b-4000c6e0251a/audio-99928-9739-18747-02d046a4-ff14-4c54-b9a7-43de336a0ffa-converted.mp3" length="18332668" type="audio/mpeg"/><itunes:duration>19:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Most organizations think DNS security means that they must secure their various DNS systems.  However, using DNS security strategically overlays an overarching layer of security capabilities across the enterprise. When harnessing DNS security, an organization can:  Bypass the need to configure of hundreds or thousands of firewalls to block specific addresses or websites.   Secure remote users without VPN overhead.   Control access for cloud resources, datacenters, and containers with a single, simple unifying policy.   Detect infrastructure attacks early in the Mitre Framework stages before data exfiltration or command and control attacks can begin  Michael Katz joins ThreatTalk to discuss how DNS enhances the capabilities of firewalls by taking a broader look at the traffic within an organization.  They discuss three key strategies to implementing DNS and cover key DNS mistakes most organizations make when developing their security strategies.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>16. 5 Key Threats for Remote Workers</title><itunes:title>16. 5 Key Threats for Remote Workers</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">How can an enterprise protect a surge of remote users?</span></p> <p><span style="font-weight: 400;">Everyone is scrambling to deal with the consequences of the COVID19 quarantine.  Enterprises suddenly shifted their employees from primarily within the office to primarily working from home.  Now security managers must somehow extend the corporate security stack to non-technical employees working on home networks.</span></p> <p><a href="https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, Director of Product Marketing at Infoblox, joins ThreatTalk to cover 5 key threats for the remote worker.</span></p> <p><span style="font-weight: 400;">With so many threats, an enterprise security team needs to respond quickly and efficiently.  The best way to do that is to focus on the common denominator: everything uses DNS.  </span></p> <p><span style="font-weight: 400;">Srivatsan explains how cloud-based DNS with analytics allows an enterprise to remotely protect the employee.  Security managers can restrict the remote worker to safe domains, protect against data exfiltration, and limit command and control commands from already-infected devices.  </span></p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">. </span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">How can an enterprise protect a surge of remote users?</span></p> <p><span style="font-weight: 400;">Everyone is scrambling to deal with the consequences of the COVID19 quarantine.  Enterprises suddenly shifted their employees from primarily within the office to primarily working from home.  Now security managers must somehow extend the corporate security stack to non-technical employees working on home networks.</span></p> <p><a href="https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, Director of Product Marketing at Infoblox, joins ThreatTalk to cover 5 key threats for the remote worker.</span></p> <p><span style="font-weight: 400;">With so many threats, an enterprise security team needs to respond quickly and efficiently.  The best way to do that is to focus on the common denominator: everything uses DNS.  </span></p> <p><span style="font-weight: 400;">Srivatsan explains how cloud-based DNS with analytics allows an enterprise to remotely protect the employee.  Security managers can restrict the remote worker to safe domains, protect against data exfiltration, and limit command and control commands from already-infected devices.  </span></p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">. </span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/16-5-key-threats-for-remote-workers]]></link><guid isPermaLink="false">73da59a1-898d-41ac-9bb4-74a0985125df</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Fri, 24 Apr 2020 07:44:35 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee9b53a3-4f61-4e63-9b1f-3129425e9791/audio-99929-9739-18747-4b43cb89-c134-476f-963a-dd4b280e8208-converted.mp3" length="20193841" type="audio/mpeg"/><itunes:duration>21:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How can an enterprise protect a surge of remote users? Everyone is scrambling to deal with the consequences of the COVID19 quarantine.  Enterprises suddenly shifted their employees from primarily within the office to primarily working from home.  Now security managers must somehow extend the corporate security stack to non-technical employees working on home networks. Krupa Srivatsan, Director of Product Marketing at Infoblox, joins ThreatTalk to cover 5 key threats for the remote worker. With so many threats, an enterprise security team needs to respond quickly and efficiently.  The best way to do that is to focus on the common denominator: everything uses DNS.   Srivatsan explains how cloud-based DNS with analytics allows an enterprise to remotely protect the employee.  Security managers can restrict the remote worker to safe domains, protect against data exfiltration, and limit command and control commands from already-infected devices.   You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify. </itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>15. Hidden Dangers with DNS Over HTTPS</title><itunes:title>15. Hidden Dangers with DNS Over HTTPS</itunes:title><description><![CDATA[<p class="p1"><span class="s1">How can a heralded new feature from Firefox be dangerous?</span></p> <p class="p1"><span class="s1">When the consumer-protecting DNS over HTTPS (DoH) feature creates a default that dangerously bypasses enterprise security and exposes organizations to serious risks.</span></p> <p class="p1"><span class="s1">Krupa Srivastan, Director of Product Marketing at Infoblox, discusses key issues with DoH and best practices to regain control of the DNS traffic to protect the enterprise environment.</span></p>]]></description><content:encoded><![CDATA[<p class="p1"><span class="s1">How can a heralded new feature from Firefox be dangerous?</span></p> <p class="p1"><span class="s1">When the consumer-protecting DNS over HTTPS (DoH) feature creates a default that dangerously bypasses enterprise security and exposes organizations to serious risks.</span></p> <p class="p1"><span class="s1">Krupa Srivastan, Director of Product Marketing at Infoblox, discusses key issues with DoH and best practices to regain control of the DNS traffic to protect the enterprise environment.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/15-hidden-dangers-with-dns-over-https]]></link><guid isPermaLink="false">222c4ae2-b37e-431e-8284-75eb39e417ab</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Fri, 03 Apr 2020 09:22:15 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8c1896ea-5ea7-455d-9482-1045a5c4bdc6/audio-99930-9739-18747-f9df424b-9543-4f02-be5b-6b90ee80041d-converted.mp3" length="6985189" type="audio/mpeg"/><itunes:duration>07:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How can a heralded new feature from Firefox be dangerous? When the consumer-protecting DNS over HTTPS (DoH) feature creates a default that dangerously bypasses enterprise security and exposes organizations to serious risks. Krupa Srivastan, Director of Product Marketing at Infoblox, discusses key issues with DoH and best practices to regain control of the DNS traffic to protect the enterprise environment.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>14. DNS Flag Days Improve the Internet</title><itunes:title>14. DNS Flag Days Improve the Internet</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">The EVP Engineering and Chief DNS Architect at</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/cricketliu/">Cricket Liu</a><span style="font-weight: 400;">, joins us on Threat Talk to talk about DNS Flag Days – why we need them and how they are improving the internet. </span></p> <p><span style="font-weight: 400;">DNS Flag Days serve notices to obsolete Domain Name System (DNS) servers that existing accommodations to provide them with compatibility for pre-1999 standards will be phased out. </span></p> <p><span style="font-weight: 400;">The Flag Days attempt to:</span></p> <ul> <li><span style="font-weight: 400;">Speed up DNS</span></li> <li>Improve DNS reliability</li> <li>Improve DNS security</li> </ul><br/> <p><span style="font-weight: 400;">In 1999, DNS was extended with eDNS(0), yet servers incompatible with eDNS(0) continue to be used today.  To improve the performance of the internet, the 2019 DNS flag day temporarily ceased to support those legacy DNS servers.</span></p> <p><span style="font-weight: 400;">The 2020 Flag Day will tackle the maximum DNS message size to bring them down under 1232 bytes.  This will stop DNS message fragmentation and improve both the reliability and security of DNS.</span></p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">The EVP Engineering and Chief DNS Architect at</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/cricketliu/">Cricket Liu</a><span style="font-weight: 400;">, joins us on Threat Talk to talk about DNS Flag Days – why we need them and how they are improving the internet. </span></p> <p><span style="font-weight: 400;">DNS Flag Days serve notices to obsolete Domain Name System (DNS) servers that existing accommodations to provide them with compatibility for pre-1999 standards will be phased out. </span></p> <p><span style="font-weight: 400;">The Flag Days attempt to:</span></p> <ul> <li><span style="font-weight: 400;">Speed up DNS</span></li> <li>Improve DNS reliability</li> <li>Improve DNS security</li> </ul><br/> <p><span style="font-weight: 400;">In 1999, DNS was extended with eDNS(0), yet servers incompatible with eDNS(0) continue to be used today.  To improve the performance of the internet, the 2019 DNS flag day temporarily ceased to support those legacy DNS servers.</span></p> <p><span style="font-weight: 400;">The 2020 Flag Day will tackle the maximum DNS message size to bring them down under 1232 bytes.  This will stop DNS message fragmentation and improve both the reliability and security of DNS.</span></p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/14-dns-flag-days-improve-the-internet]]></link><guid isPermaLink="false">255fe2e6-1f4a-46b6-8b48-ef64609f8543</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 19 Feb 2020 06:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/50fcf11d-d08c-4dda-a9fc-6b47ef60ec02/audio-99931-9739-18747-a9bd7fe6-3687-46db-a9b2-0d3ba8bdf080-converted.mp3" length="11208972" type="audio/mpeg"/><itunes:duration>11:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The EVP Engineering and Chief DNS Architect at Infoblox, Cricket Liu, joins us on Threat Talk to talk about DNS Flag Days – why we need them and how they are improving the internet.  DNS Flag Days serve notices to obsolete Domain Name System (DNS) servers that existing accommodations to provide them with compatibility for pre-1999 standards will be phased out.  The Flag Days attempt to:  Speed up DNS Improve DNS reliability Improve DNS security  In 1999, DNS was extended with eDNS(0), yet servers incompatible with eDNS(0) continue to be used today.  To improve the performance of the internet, the 2019 DNS flag day temporarily ceased to support those legacy DNS servers. The 2020 Flag Day will tackle the maximum DNS message size to bring them down under 1232 bytes.  This will stop DNS message fragmentation and improve both the reliability and security of DNS. You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>13. Fundamentals of Zero Trust Principles</title><itunes:title>13. Fundamentals of Zero Trust Principles</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">How can anyone manage their security when so much is literally out of their control within a 3</span><span style="font-weight: 400;">rd</span> <span style= "font-weight: 400;">party SaaS or BYOD? </span></p> <p><span style="font-weight: 400;">A breach is going to happen so limit the impact using Zero Trust principles: </span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Focus on the Data</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Trust no user </span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Trust no communication</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Deny access by default and provide minimal access when required  </span></li> </ul><br/> <p><span style="font-weight: 400;">Consulting Senior Product Marketing Manager at</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/michaelzuckerman/"><span style= "font-weight: 400;">Michael</span></a> <span style= "font-weight: 400;">Zuckerman</span><span style= "font-weight: 400;">, joins Threat Talk to discuss Zero Trust in detail.  Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryption and microsegmentation as key components to control access and limit exposure.</span></p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">How can anyone manage their security when so much is literally out of their control within a 3</span><span style="font-weight: 400;">rd</span> <span style= "font-weight: 400;">party SaaS or BYOD? </span></p> <p><span style="font-weight: 400;">A breach is going to happen so limit the impact using Zero Trust principles: </span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">Focus on the Data</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Trust no user </span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Trust no communication</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Deny access by default and provide minimal access when required  </span></li> </ul><br/> <p><span style="font-weight: 400;">Consulting Senior Product Marketing Manager at</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/michaelzuckerman/"><span style= "font-weight: 400;">Michael</span></a> <span style= "font-weight: 400;">Zuckerman</span><span style= "font-weight: 400;">, joins Threat Talk to discuss Zero Trust in detail.  Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryption and microsegmentation as key components to control access and limit exposure.</span></p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/13-fundamentals-of-zero-trust-principles]]></link><guid isPermaLink="false">f6fcedcf-7f7d-4a5a-922a-3c949989b12a</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Thu, 06 Feb 2020 21:11:18 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/27b03f2f-5084-4974-9c88-243bdfce24c9/audio-99932-9739-18747-21ce9602-3768-4184-83d9-f9b30c2c2e90-converted.mp3" length="21382934" type="audio/mpeg"/><itunes:duration>22:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD?  A breach is going to happen so limit the impact using Zero Trust principles:   Focus on the Data Trust no user  Trust no communication Deny access by default and provide minimal access when required    Consulting Senior Product Marketing Manager at Infoblox, Michael Zuckerman, joins Threat Talk to discuss Zero Trust in detail.  Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryption and microsegmentation as key components to control access and limit exposure. You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>12. Securing Your DNS Infrastructure</title><itunes:title>12. Securing Your DNS Infrastructure</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Did you know that over 90% of the malware incidents and over half of all ransomware and data theft attacks rely on DNS as a vector.</span></p> <p><span style="font-weight: 400;">In today’s day and age, securing your DNS has never been more critical.</span></p> <p><span style="font-weight: 400;">Today we’re joined by</span> <a href="https://www.linkedin.com/in/davidaayers/"><span style= "font-weight: 400;">David Ayers</span></a><span style= "font-weight: 400;">, a member of the</span> <a href= "http://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a> <span style= "font-weight: 400;">product marketing team, who is responsible for service provider and DNS privacy messaging. David fills us in on biggest security concerns and how to secure your DNS infrastructure.</span></p> <p><em><span style="font-weight: 400;">To listen to this episode and many more like it, subscribe to ThreatTalk on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or tune in</span></em> <a href= "https://info.infoblox.com/resources-podcasts-threattalk-episode-4-dns-is-everywhere.html"> <em><span style="font-weight: 400;">on our website</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Did you know that over 90% of the malware incidents and over half of all ransomware and data theft attacks rely on DNS as a vector.</span></p> <p><span style="font-weight: 400;">In today’s day and age, securing your DNS has never been more critical.</span></p> <p><span style="font-weight: 400;">Today we’re joined by</span> <a href="https://www.linkedin.com/in/davidaayers/"><span style= "font-weight: 400;">David Ayers</span></a><span style= "font-weight: 400;">, a member of the</span> <a href= "http://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a> <span style= "font-weight: 400;">product marketing team, who is responsible for service provider and DNS privacy messaging. David fills us in on biggest security concerns and how to secure your DNS infrastructure.</span></p> <p><em><span style="font-weight: 400;">To listen to this episode and many more like it, subscribe to ThreatTalk on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or tune in</span></em> <a href= "https://info.infoblox.com/resources-podcasts-threattalk-episode-4-dns-is-everywhere.html"> <em><span style="font-weight: 400;">on our website</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/12-securing-your-dns-infrastructure]]></link><guid isPermaLink="false">b6de98f5-ba65-4706-ad2b-d9fcb14d7e40</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 15 Jan 2020 06:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fad6b1b6-5622-41fe-9628-e46e4912ce61/audio-99933-9739-18747-51d2eb83-ea46-4bc2-a564-79bc6224621b-converted.mp3" length="21530892" type="audio/mpeg"/><itunes:duration>22:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Did you know that over 90% of the malware incidents and over half of all ransomware and data theft attacks rely on DNS as a vector. In today’s day and age, securing your DNS has never been more critical. Today we’re joined by David Ayers, a member of the Infoblox product marketing team, who is responsible for service provider and DNS privacy messaging. David fills us in on biggest security concerns and how to secure your DNS infrastructure. To listen to this episode and many more like it, subscribe to ThreatTalk on  Apple Podcasts or tune in  on our website.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>11. How the MITRE ATT&amp;CK Framework Increases Objectivity in Cyber Defense</title><itunes:title>11. How the MITRE ATT&amp;CK Framework Increases Objectivity in Cyber Defense</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Objectivity in cyber defense is the goal, but, too often, emotion of the room rules the day.</span></p> <p><span style="font-weight: 400;">In this episode, seasoned IT expert</span> <a href= "https://www.linkedin.com/in/michael-zuckerman-26286b6/"><span style="font-weight: 400;"> Michael Zuckerberg</span></a> <span style="font-weight: 400;">joins us to explain the MITRE ATT&CK framework and how to utilize it to reduce subjectivity and increase your cyber defense systems.</span></p> <p><span style="font-weight: 400;">Michael is a consulting senior product marketing manager at Infoblox, an expert consultant in B2B product marketing and marketing strategy, with experience in cybersecurity and enterprise SaaS software markets. He has extensive domain experience in all facets of cybersecurity.<br /> <br /></span></p> <p><span style="font-weight: 400;">What we talked about:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">MITRE ATT&CK framework</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Explain high-level tactics versus techniques</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">How to use the MITRE ATT&CK framework as a matrix</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Reducing subjectivity and increasing objectivity in cyber defense</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Addressing cyber risks</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Identifying priorities</span></li> </ul><br/> <p> </p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Objectivity in cyber defense is the goal, but, too often, emotion of the room rules the day.</span></p> <p><span style="font-weight: 400;">In this episode, seasoned IT expert</span> <a href= "https://www.linkedin.com/in/michael-zuckerman-26286b6/"><span style="font-weight: 400;"> Michael Zuckerberg</span></a> <span style="font-weight: 400;">joins us to explain the MITRE ATT&CK framework and how to utilize it to reduce subjectivity and increase your cyber defense systems.</span></p> <p><span style="font-weight: 400;">Michael is a consulting senior product marketing manager at Infoblox, an expert consultant in B2B product marketing and marketing strategy, with experience in cybersecurity and enterprise SaaS software markets. He has extensive domain experience in all facets of cybersecurity.<br /> <br /></span></p> <p><span style="font-weight: 400;">What we talked about:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">MITRE ATT&CK framework</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Explain high-level tactics versus techniques</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">How to use the MITRE ATT&CK framework as a matrix</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Reducing subjectivity and increasing objectivity in cyber defense</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Addressing cyber risks</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Identifying priorities</span></li> </ul><br/> <p> </p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/11-how-the-mitre-attck-framework-increases-objectivity-in-cyber-defense]]></link><guid isPermaLink="false">66cf6f6f-7acd-43de-92b5-85fe25efbdab</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 20 Nov 2019 08:29:13 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2250cd33-85a4-4866-ba48-ab3e16935e73/audio-99934-9739-18747-70781c48-6b90-4f24-9c0f-acf87d299531-converted.mp3" length="21165178" type="audio/mpeg"/><itunes:duration>22:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Objectivity in cyber defense is the goal, but, too often, emotion of the room rules the day. In this episode, seasoned IT expert  Michael Zuckerberg joins us to explain the MITRE ATT&amp;CK framework and how to utilize it to reduce subjectivity and increase your cyber defense systems. Michael is a consulting senior product marketing manager at Infoblox, an expert consultant in B2B product marketing and marketing strategy, with experience in cybersecurity and enterprise SaaS software markets. He has extensive domain experience in all facets of cybersecurity.  What we talked about:  MITRE ATT&amp;CK framework Explain high-level tactics versus techniques How to use the MITRE ATT&amp;CK framework as a matrix Reducing subjectivity and increasing objectivity in cyber defense Addressing cyber risks Identifying priorities    You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>10. DNS Content Filtering: Why It Makes Sense (&amp; Saves Money)</title><itunes:title>10. DNS Content Filtering: Why It Makes Sense (&amp; Saves Money)</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">“Your employer’s firewall has blocked access to this website.” That’s a good way to protect a network. But its a bad way to</span> <em><span style= "font-weight: 400;">cost effectively</span></em> <span style= "font-weight: 400;">protect your network. There’s a better way, using DNS, which costs far less, and it’s extremely accurate.</span></p> <p> </p> <p><span style="font-weight: 400;">On this episode, Director of Product Marketing at</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, discusses how DNS can be utilized to protect your network.</span></p> <p> </p> <p><span style="font-weight: 400;">What we talked about:</span></p> <ul> <li style="font-weight: 400;"><span style= "font-weight: 400;">Content filtering at the DNS level</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Blocking objectionable material</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">DNS vs firewall protection</span></li> </ul><br/> <p> </p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">“Your employer’s firewall has blocked access to this website.” That’s a good way to protect a network. But its a bad way to</span> <em><span style= "font-weight: 400;">cost effectively</span></em> <span style= "font-weight: 400;">protect your network. There’s a better way, using DNS, which costs far less, and it’s extremely accurate.</span></p> <p> </p> <p><span style="font-weight: 400;">On this episode, Director of Product Marketing at</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, discusses how DNS can be utilized to protect your network.</span></p> <p> </p> <p><span style="font-weight: 400;">What we talked about:</span></p> <ul> <li style="font-weight: 400;"><span style= "font-weight: 400;">Content filtering at the DNS level</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Blocking objectionable material</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">DNS vs firewall protection</span></li> </ul><br/> <p> </p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/10-dns-content-filtering-why-it-makes-sense-saves-money]]></link><guid isPermaLink="false">dc5be7dbdaad4051bf007b970522e5c9</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 13 Nov 2019 07:33:11 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/560e35c9-3967-4732-868a-d3a5b2e79879/audio-99935-9739-18747-36628f1e-dad5-475d-985d-5dd8c118618f-converted.mp3" length="12535156" type="audio/mpeg"/><itunes:duration>13:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>“Your employer’s firewall has blocked access to this website.” That’s a good way to protect a network. But its a bad way to cost effectively protect your network. There’s a better way, using DNS, which costs far less, and it’s extremely accurate.   On this episode, Director of Product Marketing at Infoblox, Krupa Srivatsan, discusses how DNS can be utilized to protect your network.   What we talked about:  Content filtering at the DNS level Blocking objectionable material DNS vs firewall protection    You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>9. How the NIST Cybersecurity Framework Helps You Stop Today’s Cyberthreats</title><itunes:title>9. How the NIST Cybersecurity Framework Helps You Stop Today’s Cyberthreats</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">DNS, DHCP, IPAM — most people within IT understand how these ensure connectivity. But they can, and should, also be leveraged as the major defenses for your network.</span></p> <p> </p> <p><span style="font-weight: 400;">On this episode of the ThreatTalk podcast,</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a> <span style= "font-weight: 400;">joined us to discuss the security defense methodologies inherent within DHS, DHCP, & IPAM.</span></p> <p> </p> <p><span style="font-weight: 400;">Krupa is the Director of Product Marketing at</span> <a href= "https://www.infoblox.com/"><span style="font-weight: 400;">Infoblox</span></a><span style="font-weight: 400;">. She has an MBA from Berkeley, and has worked with Pfizer, Agilent, Cisco Systems, and others.</span></p> <p> </p> <p><span style="font-weight: 400;">What we talked about:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">DNS, DHCP, & IPAM</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">IOT</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Network Insights — key feature of Infoblox’s security system</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">NetMRI</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">NIST core functions</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Improving branch officer experience</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Multi Cloud</span></li> </ul><br/> <p> </p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">DNS, DHCP, IPAM — most people within IT understand how these ensure connectivity. But they can, and should, also be leveraged as the major defenses for your network.</span></p> <p> </p> <p><span style="font-weight: 400;">On this episode of the ThreatTalk podcast,</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a> <span style= "font-weight: 400;">joined us to discuss the security defense methodologies inherent within DHS, DHCP, & IPAM.</span></p> <p> </p> <p><span style="font-weight: 400;">Krupa is the Director of Product Marketing at</span> <a href= "https://www.infoblox.com/"><span style="font-weight: 400;">Infoblox</span></a><span style="font-weight: 400;">. She has an MBA from Berkeley, and has worked with Pfizer, Agilent, Cisco Systems, and others.</span></p> <p> </p> <p><span style="font-weight: 400;">What we talked about:</span></p> <ul> <li style="font-weight: 400;"><span style="font-weight: 400;">DNS, DHCP, & IPAM</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">IOT</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Network Insights — key feature of Infoblox’s security system</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">NetMRI</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">NIST core functions</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Improving branch officer experience</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Multi Cloud</span></li> </ul><br/> <p> </p> <p><em><span style="font-weight: 400;">You can find this interview, and many more, by subscribing to the ThreatTalk podcast on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or on</span></em> <a href= "https://open.spotify.com/show/7IoJjwMzA98grXUmU0e9EO"><em><span style="font-weight: 400;"> Spotify</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/9-how-the-nist-cybersecurity-framework-helps-you-stop-todays-cyberthreats]]></link><guid isPermaLink="false">ee746601136d40c1a72289ba6cd0a162</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 06 Nov 2019 09:03:49 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/60db8291-e739-473e-97e6-00b101cf79d7/audio-99936-9739-18747-6292474b-d5e4-49f0-aa8d-f2ae2bed1af6-converted.mp3" length="17715343" type="audio/mpeg"/><itunes:duration>18:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>DNS, DHCP, IPAM — most people within IT understand how these ensure connectivity. But they can, and should, also be leveraged as the major defenses for your network.   On this episode of the ThreatTalk podcast, Krupa Srivatsan joined us to discuss the security defense methodologies inherent within DHS, DHCP, &amp; IPAM.   Krupa is the Director of Product Marketing at Infoblox. She has an MBA from Berkeley, and has worked with Pfizer, Agilent, Cisco Systems, and others.   What we talked about:  DNS, DHCP, &amp; IPAM IOT Network Insights — key feature of Infoblox’s security system NetMRI NIST core functions Improving branch officer experience Multi Cloud    You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>8. Exploring Today’s Threatscape w/ Michael Katz</title><itunes:title>8. Exploring Today’s Threatscape w/ Michael Katz</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">There are new cybersecurity tools coming out every day it seems.</span></p> <p><span style="font-weight: 400;">Why, then, are so many security breaches happening still?</span></p> <p><a href="https://www.linkedin.com/in/katznik/"><span style= "font-weight: 400;">Michael Katz</span></a><span style= "font-weight: 400;">, Security Sales Specialist at</span> <a href= "http://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">, fills us in on today’s threatscape and what companies can do to protect themselves.</span></p> <p><span style="font-weight: 400;">In this episode, we cover:</span></p> <ul> <li style="font-weight: 400;"><span style= "font-weight: 400;">Michael’s biggest security concern for today</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Investing in security tools</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Building a ground-up security strategy</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Mitigating security risks</span></li> </ul><br/> <p><em><span style="font-weight: 400;">To listen to this episode and many more like it, subscribe to ThreatTalk on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or tune in</span></em> <a href= "https://info.infoblox.com/resources-podcasts-threattalk-episode-4-dns-is-everywhere.html"> <em><span style="font-weight: 400;">on our website</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">There are new cybersecurity tools coming out every day it seems.</span></p> <p><span style="font-weight: 400;">Why, then, are so many security breaches happening still?</span></p> <p><a href="https://www.linkedin.com/in/katznik/"><span style= "font-weight: 400;">Michael Katz</span></a><span style= "font-weight: 400;">, Security Sales Specialist at</span> <a href= "http://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">, fills us in on today’s threatscape and what companies can do to protect themselves.</span></p> <p><span style="font-weight: 400;">In this episode, we cover:</span></p> <ul> <li style="font-weight: 400;"><span style= "font-weight: 400;">Michael’s biggest security concern for today</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Investing in security tools</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Building a ground-up security strategy</span></li> <li style="font-weight: 400;"><span style= "font-weight: 400;">Mitigating security risks</span></li> </ul><br/> <p><em><span style="font-weight: 400;">To listen to this episode and many more like it, subscribe to ThreatTalk on</span></em> <a href= "https://podcasts.apple.com/us/podcast/infoblox-threattalk/id1465619008"> <em><span style="font-weight: 400;">Apple Podcasts</span></em></a> <em><span style="font-weight: 400;">or tune in</span></em> <a href= "https://info.infoblox.com/resources-podcasts-threattalk-episode-4-dns-is-everywhere.html"> <em><span style="font-weight: 400;">on our website</span></em></a><em><span style= "font-weight: 400;">.</span></em></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/8-exploring-todays-threatscape-w-michael-katz]]></link><guid isPermaLink="false">4fa164d9dd2b4262bdfa5b3f668c4587</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 02 Oct 2019 17:50:20 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc38cf2b-a7c0-4d13-9d42-133c10530c91/audio-99937-9739-18747-bb054568-6540-4d1e-93cd-7aebaee558ae-converted.mp3" length="9840574" type="audio/mpeg"/><itunes:duration>10:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>There are new cybersecurity tools coming out every day it seems. Why, then, are so many security breaches happening still? Michael Katz, Security Sales Specialist at Infoblox, fills us in on today’s threatscape and what companies can do to protect themselves. In this episode, we cover:  Michael’s biggest security concern for today Investing in security tools Building a ground-up security strategy Mitigating security risks  To listen to this episode and many more like it, subscribe to ThreatTalk on  Apple Podcasts or tune in  on our website.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>7. Keep Your Cryptocurrencies Safe From Crypto-Jackers</title><itunes:title>7. Keep Your Cryptocurrencies Safe From Crypto-Jackers</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Is there ever a victimless crime?</span></p> <p> </p> <p><span style="font-weight: 400;">Cryptojacking - a form of malware that secretly infiltrates your system to steal computing resources for mining cryptocurrency - has gained traction as a steady stream of income for criminal hackers.</span></p> <p> </p> <p><span style="font-weight: 400;">We sit down with the Technology Director of Western Europe</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/gcox1/"><span style= "font-weight: 400;">Gary Cox</span></a><span style= "font-weight: 400;">, and the CEO of</span> <a href= "https://insinia.co.uk/"><span style="font-weight: 400;">INSINIA Security</span></a><span style="font-weight: 400;">,</span> <a href="https://www.linkedin.com/in/mike-g-2165a9166/"><span style="font-weight: 400;"> Mike Godfrey</span></a><span style="font-weight: 400;">, to discuss combatting cryptojacking. In this episode, we cover common cryptojacking behavior, detecting crypto-jackers, and more.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Is there ever a victimless crime?</span></p> <p> </p> <p><span style="font-weight: 400;">Cryptojacking - a form of malware that secretly infiltrates your system to steal computing resources for mining cryptocurrency - has gained traction as a steady stream of income for criminal hackers.</span></p> <p> </p> <p><span style="font-weight: 400;">We sit down with the Technology Director of Western Europe</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">,</span> <a href= "https://www.linkedin.com/in/gcox1/"><span style= "font-weight: 400;">Gary Cox</span></a><span style= "font-weight: 400;">, and the CEO of</span> <a href= "https://insinia.co.uk/"><span style="font-weight: 400;">INSINIA Security</span></a><span style="font-weight: 400;">,</span> <a href="https://www.linkedin.com/in/mike-g-2165a9166/"><span style="font-weight: 400;"> Mike Godfrey</span></a><span style="font-weight: 400;">, to discuss combatting cryptojacking. In this episode, we cover common cryptojacking behavior, detecting crypto-jackers, and more.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/7-keep-your-cryptocurrencies-safe-from-crypto-jackers]]></link><guid isPermaLink="false">7b830b85ff1147edbef046bf3168019f</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 31 Jul 2019 16:23:56 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/93281c76-7967-48c0-9838-3b62a567c697/audio-99938-9739-18747-57f8c2d6-90f6-484c-a419-10473b9c859a-converted.mp3" length="30002535" type="audio/mpeg"/><itunes:duration>31:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Is there ever a victimless crime?   Cryptojacking - a form of malware that secretly infiltrates your system to steal computing resources for mining cryptocurrency - has gained traction as a steady stream of income for criminal hackers.   We sit down with the Technology Director of Western Europe Infoblox, Gary Cox, and the CEO of INSINIA Security,  Mike Godfrey, to discuss combatting cryptojacking. In this episode, we cover common cryptojacking behavior, detecting crypto-jackers, and more.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>6. Is It Possible to Secure Billions of Devices Out in the World?</title><itunes:title>6. Is It Possible to Secure Billions of Devices Out in the World?</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Billions of devices are all connected together out there in the world... will it actually be possible to map and secure them all?</span></p> <p><span style="font-weight: 400;">If so, how? </span></p> <p><span style="font-weight: 400;">Whose responsibility should it be?</span></p> <p><span style="font-weight: 400;">In this episode we ask Gary Cox, Infoblox’s Technology Director for Western Europe, and Mike Godfrey, CEO of Insignia Security, for answers.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Billions of devices are all connected together out there in the world... will it actually be possible to map and secure them all?</span></p> <p><span style="font-weight: 400;">If so, how? </span></p> <p><span style="font-weight: 400;">Whose responsibility should it be?</span></p> <p><span style="font-weight: 400;">In this episode we ask Gary Cox, Infoblox’s Technology Director for Western Europe, and Mike Godfrey, CEO of Insignia Security, for answers.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/6-is-it-possible-to-secure-billions-of-devices-out-in-the-world]]></link><guid isPermaLink="false">88e7a7203b314a33a987ab84e8f7e810</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 24 Jul 2019 05:22:28 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e7a0f2c0-f1a5-499f-a4e0-2b559d45e09d/audio-99939-9739-18747-7e6e971f-1a0a-4575-9194-7e10c8e77596-converted.mp3" length="31602064" type="audio/mpeg"/><itunes:duration>32:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Billions of devices are all connected together out there in the world... will it actually be possible to map and secure them all? If so, how?  Whose responsibility should it be? In this episode we ask Gary Cox, Infoblox’s Technology Director for Western Europe, and Mike Godfrey, CEO of Insignia Security, for answers.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>5. Ransomware Today: Everything You Need to Know to Protect Your Business</title><itunes:title>5. Ransomware Today: Everything You Need to Know to Protect Your Business</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Global volatile ransomware attacks are increasing by 11% year over year.</span></p> <p><span style="font-weight: 400;">And it’s only continuing to evolve.</span></p> <p><span style="font-weight: 400;">What do companies need to do to decrease the likelihood of a ransomware attack? What are the best products, toolsets, and controls?</span></p> <p><span style="font-weight: 400;">These are just a few of the questions we cover with</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a> <span style= "font-weight: 400;">technology writer, Gary Cox, and CEO of</span> <a href="https://insigniatechnology.com/"><span style= "font-weight: 400;">Insignia Security</span></a><span style= "font-weight: 400;">, Mike Godfrey. </span></p> <p><span style="font-weight: 400;">In this episode, we traverse everything from cyber hygiene to cyber-attack investigations and more.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Global volatile ransomware attacks are increasing by 11% year over year.</span></p> <p><span style="font-weight: 400;">And it’s only continuing to evolve.</span></p> <p><span style="font-weight: 400;">What do companies need to do to decrease the likelihood of a ransomware attack? What are the best products, toolsets, and controls?</span></p> <p><span style="font-weight: 400;">These are just a few of the questions we cover with</span> <a href= "https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a> <span style= "font-weight: 400;">technology writer, Gary Cox, and CEO of</span> <a href="https://insigniatechnology.com/"><span style= "font-weight: 400;">Insignia Security</span></a><span style= "font-weight: 400;">, Mike Godfrey. </span></p> <p><span style="font-weight: 400;">In this episode, we traverse everything from cyber hygiene to cyber-attack investigations and more.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/5-ransomware-today-everything-you-need-to-know-to-protect-your-business]]></link><guid isPermaLink="false">5d9467a4509247e59c1d5759acdc7342</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 17 Jul 2019 19:31:45 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f21d4171-3056-4c79-8b76-a27baecd7e23/audio-99940-9739-18747-3d428e86-86c3-4390-b099-d0f0f61e73ad-converted.mp3" length="32322626" type="audio/mpeg"/><itunes:duration>33:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Global volatile ransomware attacks are increasing by 11% year over year. And it’s only continuing to evolve. What do companies need to do to decrease the likelihood of a ransomware attack? What are the best products, toolsets, and controls? These are just a few of the questions we cover with Infoblox technology writer, Gary Cox, and CEO of Insignia Security, Mike Godfrey.  In this episode, we traverse everything from cyber hygiene to cyber-attack investigations and more.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>4. DNS Is Everywhere (So Make It Your Main Cybersecurity Defense)</title><itunes:title>4. DNS Is Everywhere (So Make It Your Main Cybersecurity Defense)</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">DNS is everywhere — the public cloud, private cloud, the corporate network… That’s exactly why adversaries use it as a control plane for threats. It’s also exactly why it should become</span> <em><span style= "font-weight: 400;">the</span></em> <span style= "font-weight: 400;">foundational pillar of your cybersecurity architecture.</span></p> <p><span style="font-weight: 400;">On this episode of the Threat Talk podcast,</span> <a href= "https://www.linkedin.com/in/craigsanderson1/"><span style= "font-weight: 400;">Craig Sanderson</span></a> <span style= "font-weight: 400;"> (VP of Security Products at Infoblox) joins us to share how we should rethink cybersecurity with DNS.</span></p> <p><span style="font-weight: 400;">On this episode, we discuss how DNS can be utilized to distribute threat information across an organization, and become a basis for you cybersecurity infrastructure (and exactly how we’re doing that here at</span> <a href="https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">).</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">DNS is everywhere — the public cloud, private cloud, the corporate network… That’s exactly why adversaries use it as a control plane for threats. It’s also exactly why it should become</span> <em><span style= "font-weight: 400;">the</span></em> <span style= "font-weight: 400;">foundational pillar of your cybersecurity architecture.</span></p> <p><span style="font-weight: 400;">On this episode of the Threat Talk podcast,</span> <a href= "https://www.linkedin.com/in/craigsanderson1/"><span style= "font-weight: 400;">Craig Sanderson</span></a> <span style= "font-weight: 400;"> (VP of Security Products at Infoblox) joins us to share how we should rethink cybersecurity with DNS.</span></p> <p><span style="font-weight: 400;">On this episode, we discuss how DNS can be utilized to distribute threat information across an organization, and become a basis for you cybersecurity infrastructure (and exactly how we’re doing that here at</span> <a href="https://www.infoblox.com/"><span style= "font-weight: 400;">Infoblox</span></a><span style= "font-weight: 400;">).</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/4-dns-is-everywhere-so-make-it-your-main-cybersecurity-defense]]></link><guid isPermaLink="false">1b2d0d1829174e55b97467ed5d7e432c</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 03 Jul 2019 17:35:03 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a53bd555-3648-4e3d-a698-4df1393431dd/audio-99941-9739-18747-582e0896-5a5e-4827-93f0-12c6cec0cc14-converted.mp3" length="19912972" type="audio/mpeg"/><itunes:duration>20:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>DNS is everywhere — the public cloud, private cloud, the corporate network… That’s exactly why adversaries use it as a control plane for threats. It’s also exactly why it should become the foundational pillar of your cybersecurity architecture. On this episode of the Threat Talk podcast, Craig Sanderson  (VP of Security Products at Infoblox) joins us to share how we should rethink cybersecurity with DNS. On this episode, we discuss how DNS can be utilized to distribute threat information across an organization, and become a basis for you cybersecurity infrastructure (and exactly how we’re doing that here at Infoblox).</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>3. DNS Security Best Practices, with Matt Larson</title><itunes:title>3. DNS Security Best Practices, with Matt Larson</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Do we really want to dramatically increase cybersecurity? Enable DNSSEC… by default. Perhaps that sounds a bit self-serving from a cybersecurity company.</span></p> <p><span style="font-weight: 400;">But that wasn’t our suggestion.</span></p> <p><span style="font-weight: 400;">That’s from</span> <a href= "https://www.linkedin.com/in/matt-larson-0022712/"><span style= "font-weight: 400;">Matt Larson</span></a><span style= "font-weight: 400;">, VP of Research at ICANN. He joined us on this episode of our ThreatTalk podcast series to discuss how he sees cyber security… and that’s just one of his phenomenal ideas on the subject.</span></p> <p><span style="font-weight: 400;">In this episode, he also dives into:</span></p> <p><span style="font-weight: 400;">Completely separating recursive servers from authoritative servers, </span><span style= "font-weight: 400;">DNSSEC Validation, </span><span style= "font-weight: 400;">DNS cache poisoning, </span><span style= "font-weight: 400;">and other DNS security best practices.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Do we really want to dramatically increase cybersecurity? Enable DNSSEC… by default. Perhaps that sounds a bit self-serving from a cybersecurity company.</span></p> <p><span style="font-weight: 400;">But that wasn’t our suggestion.</span></p> <p><span style="font-weight: 400;">That’s from</span> <a href= "https://www.linkedin.com/in/matt-larson-0022712/"><span style= "font-weight: 400;">Matt Larson</span></a><span style= "font-weight: 400;">, VP of Research at ICANN. He joined us on this episode of our ThreatTalk podcast series to discuss how he sees cyber security… and that’s just one of his phenomenal ideas on the subject.</span></p> <p><span style="font-weight: 400;">In this episode, he also dives into:</span></p> <p><span style="font-weight: 400;">Completely separating recursive servers from authoritative servers, </span><span style= "font-weight: 400;">DNSSEC Validation, </span><span style= "font-weight: 400;">DNS cache poisoning, </span><span style= "font-weight: 400;">and other DNS security best practices.</span></p>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/3-dns-security-best-practices-with-matt-larson]]></link><guid isPermaLink="false">7723b93f12dc45bf94b704965e5e360f</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Wed, 19 Jun 2019 07:18:25 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/428cf19f-1e0b-4704-9419-1963ade63a21/audio-99942-9739-18747-d9db27e6-79e3-4c8c-b764-613aa92eb28f-converted.mp3" length="30457664" type="audio/mpeg"/><itunes:duration>31:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Do we really want to dramatically increase cybersecurity? Enable DNSSEC… by default. Perhaps that sounds a bit self-serving from a cybersecurity company. But that wasn’t our suggestion. That’s from Matt Larson, VP of Research at ICANN. He joined us on this episode of our ThreatTalk podcast series to discuss how he sees cyber security… and that’s just one of his phenomenal ideas on the subject. In this episode, he also dives into: Completely separating recursive servers from authoritative servers, DNSSEC Validation, DNS cache poisoning, and other DNS security best practices.</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>2. Automating Cybersecurity Through Ecosystem Integration</title><itunes:title>2. Automating Cybersecurity Through Ecosystem Integration</itunes:title><description><![CDATA[<h3><span style="font-weight: 400; font-size: 10pt;">In this episode of Infoblox ThreatTalk, we will double click on security automation and how an integrated ecosystem approach can help speed up incident response. Organizations have reached a point where they are wary of putting in yet another security tool in their network, which will create more alerts and more cycles to manage. They just want the stuff they already have to work better and help them do their jobs with minimum overhead.</span></h3> <h3><span style="font-size: 10pt;"><span style= "font-weight: 400;">Presenters:</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, Director of Product Marketing for Security at Infoblox and</span> <a href= "https://www.linkedin.com/in/craigsanderson1/"><span style= "font-weight: 400;">Craig Sanderson</span></a><span style= "font-weight: 400;">, VP of Security Product Management at Infoblox</span></span></h3>]]></description><content:encoded><![CDATA[<h3><span style="font-weight: 400; font-size: 10pt;">In this episode of Infoblox ThreatTalk, we will double click on security automation and how an integrated ecosystem approach can help speed up incident response. Organizations have reached a point where they are wary of putting in yet another security tool in their network, which will create more alerts and more cycles to manage. They just want the stuff they already have to work better and help them do their jobs with minimum overhead.</span></h3> <h3><span style="font-size: 10pt;"><span style= "font-weight: 400;">Presenters:</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, Director of Product Marketing for Security at Infoblox and</span> <a href= "https://www.linkedin.com/in/craigsanderson1/"><span style= "font-weight: 400;">Craig Sanderson</span></a><span style= "font-weight: 400;">, VP of Security Product Management at Infoblox</span></span></h3>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/2-automating-cybersecurity-through-ecosystem-integration]]></link><guid isPermaLink="false">4d5b4e11d05b49f0b3736836fba21353</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Fri, 14 Jun 2019 17:33:48 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/44b41ff3-b845-407c-adf7-d747addcaab8/audio-99943-9739-18747-0e2e7098-da7b-49f4-aa8d-c0c555384db9-converted.mp3" length="20253191" type="audio/mpeg"/><itunes:duration>21:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of Infoblox ThreatTalk, we will double click on security automation and how an integrated ecosystem approach can help speed up incident response. Organizations have reached a point where they are wary of putting in yet another security tool in their network, which will create more alerts and more cycles to manage. They just want the stuff they already have to work better and help them do their jobs with minimum overhead. Presenters: Krupa Srivatsan, Director of Product Marketing for Security at Infoblox and Craig Sanderson, VP of Security Product Management at Infoblox</itunes:summary><itunes:author>Navneet Sood</itunes:author></item><item><title>1. Using DNS as a Foundational Security Architecture for Scalable Malware Mitigation</title><itunes:title>1. Using DNS as a Foundational Security Architecture for Scalable Malware Mitigation</itunes:title><description><![CDATA[<h3><span style="font-size: 10pt;"><span style= "font-weight: 400;">In this episode of Infoblox Threat Talk, we talk about using DNS (Domain Name Service) as a foundational security architecture for automated, scalable, and early detection of malicious activity. Digital transformations like SD-WAN, IoT, and hybrid cloud are causing an impact</span> <span style= "font-weight: 400;">on</span> <span style= "font-weight: 400;">security and are causing organizations to evaluate how to protect their data and applications.</span></span></h3> <h3><span style="font-size: 10pt;"><span style= "font-weight: 400;">Presenters:</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, Director of Product Marketing for Security at Infoblox and</span> <a href= "https://www.linkedin.com/in/craigsanderson1/"><span style= "font-weight: 400;">Craig Sanderson</span></a><span style= "font-weight: 400;">, VP of Security Product Management at Infoblox</span></span></h3>]]></description><content:encoded><![CDATA[<h3><span style="font-size: 10pt;"><span style= "font-weight: 400;">In this episode of Infoblox Threat Talk, we talk about using DNS (Domain Name Service) as a foundational security architecture for automated, scalable, and early detection of malicious activity. Digital transformations like SD-WAN, IoT, and hybrid cloud are causing an impact</span> <span style= "font-weight: 400;">on</span> <span style= "font-weight: 400;">security and are causing organizations to evaluate how to protect their data and applications.</span></span></h3> <h3><span style="font-size: 10pt;"><span style= "font-weight: 400;">Presenters:</span> <a href= "https://www.linkedin.com/in/srikrupa/"><span style= "font-weight: 400;">Krupa Srivatsan</span></a><span style= "font-weight: 400;">, Director of Product Marketing for Security at Infoblox and</span> <a href= "https://www.linkedin.com/in/craigsanderson1/"><span style= "font-weight: 400;">Craig Sanderson</span></a><span style= "font-weight: 400;">, VP of Security Product Management at Infoblox</span></span></h3>]]></content:encoded><link><![CDATA[https://infoblox-threattalk.captivate.fm/episode/1-using-dns-as-a-foundational-security-architecture-for-scalable-malware-mitigation]]></link><guid isPermaLink="false">b6082de0e3144584824dfb36dc60dea2</guid><itunes:image href="https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"/><dc:creator><![CDATA[Navneet Sood]]></dc:creator><pubDate>Mon, 27 May 2019 15:30:30 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cf735313-7064-4e64-be6c-9d8fe30844fe/audio-99944-9739-18747-a4bc2cfc-abd7-464e-81e6-07bb91615c46-converted.mp3" length="20399476" type="audio/mpeg"/><itunes:duration>21:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of Infoblox Threat Talk, we talk about using DNS (Domain Name Service) as a foundational security architecture for automated, scalable, and early detection of malicious activity. Digital transformations like SD-WAN, IoT, and hybrid cloud are causing an impact on security and are causing organizations to evaluate how to protect their data and applications. Presenters: Krupa Srivatsan, Director of Product Marketing for Security at Infoblox and Craig Sanderson, VP of Security Product Management at Infoblox</itunes:summary><itunes:author>Navneet Sood</itunes:author></item></channel></rss>