logo
episode-header-image
May 2020
32m 33s

Network Security with Adaptive DDI

Massive Studios
About this episode

Andrew Wertkin (Chief Strategy Officer @ BlueCat) talks about Enterprise DNS, DDI (DNS, DHCP, IPAM), and the differences between Adaptive network security and public cloud security.

SHOW: 451

SHOW SPONSOR LINKS:

CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw

PodCTL Podcast is Back (Enterprise Kubernetes) - http://podctl.com

SHOW NOTES:

Topic 1 - Andrew, tell everyone a little about yourself.

Topic 2 - Our topic today is all about network security and foundations. Over the years, our networks have become complex and we have multiple infrastructure systems to maintain such as on-prem DHCP, VPC connections to public cloud, public facing, etc. Tell everyone a little bit about the challenge and your findings with customers in the industry.

Topic 3 - I’ve heard Enterprise DNS and DDI (DNS, DHCP, IPAM), what’s the difference? Doesn’t everyone just use a spreadsheet still? :)  What’s changed?

Topic 4 - How has an era of new devices (VOIP, IoT, Edge, etc.) affected management and security approaches?

Topic 5 - What are the tradeoffs and design considerations when it comes to all of the above (multiple clouds, multiple types of devices, multiple vendors with management tools). Are we talking about an overlay, a replacement tool? How does this unification happen? Aren’t there differences for instance in DNS implementations between vendors?

Topic 6 - What’s next for industry? What are the use cases both today and in the future?

FEEDBACK?

Up next
Oct 8
Using AI Reasoning to Prevent AI Scams
Alan Lefort, CEO and Co-Founder, StrongestLayer, discusses how LLM-powered reasoning is transforming phishing security from reactive pattern-matching to predictive threat detection, and why traditional rule-based systems can no longer defend against sophisticated AI-generated phi ... Show More
34 m
Oct 5
Will Cloud Providers start acquiring SaaS?
As cloud matures, could the hyperscale cloud providers start looking to acquire SaaS providers to build out a bundled application portfolio? Or are the demands of AI investment too much to pursue that strategy? SHOW: 964SHOW TRANSCRIPT: The Cloudcast #964 TranscriptSHOW VIDEO: ht ... Show More
28m 16s
Oct 1
AI & Cloud Trends for September 2025
Brian Gracely (@bgracely) and Brandon Whichard (@bwhichard, @SoftwareDefTalk) discuss the top stories in Cloud and AI from September 2025.SHOW: 963SHOW TRANSCRIPT: The Cloudcast #963 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcastNET NEW TO CLOUD? CHECK OUT OUR OTHER PODC ... Show More
43m 11s
Recommended Episodes
Aug 27
AlgoSec on AI, Automation, and the Next Era of Network Management
The enterprise network is under pressure like never before. Hybrid environments, cloud migrations, edge deployments, and the sudden surge in AI workloads have made it increasingly difficult to keep application connectivity secure and reliable. The old model of device-by-device, r ... Show More
22m 30s
Jan 2022
Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)
Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is A ... Show More
14m 28s
Dec 2023
539: Rollback Required
This week, our embarrassment is your entertainment. Then, we check the age and health of all our disks with one app.Sponsored By:Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 device ... Show More
1h 12m
Sep 4
All Things BGP: Discovering BGP Zombies & More
Dive into the world of Border Gateway Protocol (BGP)—the backbone of the Internet—and explore everything from BGP zombies to BGP monitoring best practices. Tune in for this special conversation with Lefteris Manassakis and The Internet Report team. A seasoned researcher and netwo ... Show More
34m 27s
Apr 2021
An old Facebook database handed over to skids (and it’s a big database). APTs look for vulnerable FortiOS instances. Cryptojacking in GitHub infrastructure. Risk and water utilities.
An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s i ... Show More
21m 8s
Sep 3
Live From Rare Evo: Algorand’s Roadmap to a Billion Users
Marc Vanlerberghe is the Chief Strategy and Marketing Officer at The Algorand Foundation. In this episode, Marc discusses how Algorand is driving mainstream adoption of blockchain technology, decentralizing its network at record speed, and preparing for a future where billions of ... Show More
26m 16s
Dec 2024
Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration, ... Show More
39m 17s
Jan 2025
A new Mirai-based botnet.
Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFa ... Show More
32m 9s
Jan 2025
PP046: IPv6 Security, Migration, and Adoption
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of ... Show More
39m 42s