logo
episode-header-image
May 2020
32m 33s

Network Security with Adaptive DDI

Massive Studios
About this episode

Andrew Wertkin (Chief Strategy Officer @ BlueCat) talks about Enterprise DNS, DDI (DNS, DHCP, IPAM), and the differences between Adaptive network security and public cloud security.

SHOW: 451

SHOW SPONSOR LINKS:

CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw

PodCTL Podcast is Back (Enterprise Kubernetes) - http://podctl.com

SHOW NOTES:

Topic 1 - Andrew, tell everyone a little about yourself.

Topic 2 - Our topic today is all about network security and foundations. Over the years, our networks have become complex and we have multiple infrastructure systems to maintain such as on-prem DHCP, VPC connections to public cloud, public facing, etc. Tell everyone a little bit about the challenge and your findings with customers in the industry.

Topic 3 - I’ve heard Enterprise DNS and DDI (DNS, DHCP, IPAM), what’s the difference? Doesn’t everyone just use a spreadsheet still? :)  What’s changed?

Topic 4 - How has an era of new devices (VOIP, IoT, Edge, etc.) affected management and security approaches?

Topic 5 - What are the tradeoffs and design considerations when it comes to all of the above (multiple clouds, multiple types of devices, multiple vendors with management tools). Are we talking about an overlay, a replacement tool? How does this unification happen? Aren’t there differences for instance in DNS implementations between vendors?

Topic 6 - What’s next for industry? What are the use cases both today and in the future?

FEEDBACK?

Up next
Yesterday
Transitioning from the Cloud era to the AI era
As we begin to transition from the Cloud era to the AI era, what types of changes can we expect to see happen in the market, within our businesses, and for individuals? SHOW: 952SHOW TRANSCRIPT: The Cloudcast #952 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD N ... Show More
26m 7s
Aug 21
Looking back on Industry Market Leaders
After a very long roadtrip, let’s explore the lessons we can learn from some of the greatest business models in tech and how or if they apply to the AI era companies. SHOW: 951SHOW TRANSCRIPT: The Cloudcast #951 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEW ... Show More
25m 39s
Aug 20
Kubernetes in the Era of GPUs
Haseeb Budhani (@haseebbudhani, CEO @rafaysystemsinc) discusses the evolution from traditional DevOps to platform engineering and what "Enterprise Ready" Kubernetes looks like in 2025. We explore AI workloads running on Kubernetes and how modern orchestration solutions can transf ... Show More
25m 11s
Recommended Episodes
Jan 2022
Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)
Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is A ... Show More
14m 28s
Dec 2023
539: Rollback Required
This week, our embarrassment is your entertainment. Then, we check the age and health of all our disks with one app.Sponsored By:Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 device ... Show More
1h 12m
Apr 2021
An old Facebook database handed over to skids (and it’s a big database). APTs look for vulnerable FortiOS instances. Cryptojacking in GitHub infrastructure. Risk and water utilities.
An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s i ... Show More
21m 8s
Jan 2025
A new Mirai-based botnet.
Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFa ... Show More
32m 9s
Jan 2025
PP046: IPv6 Security, Migration, and Adoption
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of ... Show More
39m 42s
Feb 2025
SN 1011: Jailbreaking AI - Deepseek, "ROUTERS" Act, Zyxel Vulnerability
Why was DeepSeek banned by Italian authorities? What internal proprietary DeepSeek data was found online? What is "DeepSeek" anyway? Why do we care, and what does it mean? Did Microsoft just make OpenAI's strong model available for free? Google explains how generative AI can be a ... Show More
3h 1m
Sep 2024
NB495: Fortinet Customer Data Stolen; Boeing to Test Quantum Entanglement Networking
Take a Network Break! This week we discuss the theft of 440Gbytes of customer data from a Fortinet cloud repository, how to think about resiliency after an AT&T network update kills access to Azure apps, and new troubleshooting features in Juniper Apstra. HPE goes to the bond mar ... Show More
25m 52s
Sep 2024
PP030: Volt Typhoon On the Attack, Starlink Joins the Navy, and More Security News
Today’s Packet Protector is an all-news episode. We cover the Volt Typhoon hacker group exploiting a zero-day in Versa Networks gear and a multitude of vulnerabilities in Zyxel network products. We also debate whether Microsoft’s endpoint security summit will be more than a publi ... Show More
33m 15s
Feb 2025
Rethinking Cloud Security Strategies
Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is resh ... Show More
35m 28s