Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Infoblox. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infoblox or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Do you know who or what is on your network?

29:25
 
Share
 

Manage episode 300194458 series 2683101
Content provided by Infoblox. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infoblox or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities. Network data importance has only grown with global shifts toward IoT, BYOD, and the hybrid workplace.

Infoblox veteran networking technologies expert Bob Rose joins us to dig into the gold mine of security benefits to be found in network data, tools, and technologies, much of which you probably already have.

Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.

  continue reading

78 episodes

Artwork
iconShare
 
Manage episode 300194458 series 2683101
Content provided by Infoblox. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infoblox or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Call it 'context,' 'metadata,' or just 'data,' but security teams need lots of it to defend, investigate, and respond more effectively. This episode goes beyond user names and IP addresses to understand the network data that is often overlooked and underutilized. We will talk about how this is sacrificing potential value to strengthen defenses, speed investigations, and improve incident response capabilities. Network data importance has only grown with global shifts toward IoT, BYOD, and the hybrid workplace.

Infoblox veteran networking technologies expert Bob Rose joins us to dig into the gold mine of security benefits to be found in network data, tools, and technologies, much of which you probably already have.

Tune in to the live broadcast on LinkedIn every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.

  continue reading

78 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play