logo
episode-header-image
May 2020
32m 33s

Network Security with Adaptive DDI

Massive Studios
About this episode
Andrew Wertkin (Chief Strategy Officer @ BlueCat) talks about Enterprise DNS, DDI (DNS, DHCP, IPAM), and the differences between Adaptive network security and public cloud security. SHOW: 451 SHOW SPONSOR LINKS: Logz.io Homepage - Start your free Logz.io trial here, and receive a t-shirt, on us!OpenObservability.io online event (May 27, 2020)strongDM Homep ... Show More
Up next
Today
Time Series for AI
<p><b>SHOW: 979</b></p><p>SHOW TRANSCRIPT: <a href='https://docs.google.com/document/d/1_2aWErv0t9ehrQX6MvfKSfkAf9NSxVzoJ3ljXWjhdpg/edit?usp=sharing'>The Cloudcast #979 Transcript</a></p><p>SHOW VIDEO: <a href='https://youtube.com/@TheCloudcastNET'>https://youtube.com/@TheCloudca ... Show More
29m 17s
Nov 23
After NVIDIA's Latest Earnings
<p>Once again NVIDIA had a record earnings quarter (Q3FY26), but the strength of their on-going success will be dependent on many factors that may or may not be within their control. Let&apos;s explore those broader factors.</p><p><b>SHOW: 978</b></p><p><b>SHOW TRANSCRIPT:</b> <a ... Show More
22m 47s
Nov 19
Shadow AI
<p><b>SHOW: </b>977</p><p>Rohan Sathe (@rssathe, CEO @NightfallAI) discusses the rise of Shadow AI, where employees unknowingly leak sensitive corporate data through generative AI tools like ChatGPT. </p><p><b>SHOW TRANSCRIPT: </b><a href='https://docs.google.com/document/d/17nnu ... Show More
25m 52s
Recommended Episodes
Aug 27
AlgoSec on AI, Automation, and the Next Era of Network Management
<p>The enterprise network is under pressure like never before. Hybrid environments, cloud migrations, edge deployments, and the sudden surge in AI workloads have made it increasingly difficult to keep application connectivity secure and reliable. The old model of device-by-device ... Show More
22m 30s
Jan 2022
Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)
Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is A ... Show More
14m 28s
Dec 2023
539: Rollback Required
This week, our embarrassment is your entertainment. Then, we check the age and health of all our disks with one app. 
1h 12m
Sep 4
All Things BGP: Discovering BGP Zombies & More
Dive into the world of Border Gateway Protocol (BGP)—the backbone of the Internet—and explore everything from BGP zombies to BGP monitoring best practices. Tune in for this special conversation with Lefteris Manassakis and The Internet Report team. A seasoned researcher and netwo ... Show More
34m 27s
Apr 2021
An old Facebook database handed over to skids (and it’s a big database). APTs look for vulnerable FortiOS instances. Cryptojacking in GitHub infrastructure. Risk and water utilities.
An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s i ... Show More
21m 8s
Sep 3
Live From Rare Evo: Algorand's Roadmap to a Billion Users
Marc Vanlerberghe is the Chief Strategy and Marketing Officer at The Algorand Foundation. In this episode, Marc discusses how Algorand is driving mainstream adoption of blockchain technology, decentralizing its network at record speed, and preparing for a future where billions of ... Show More
26m 16s
Dec 2024
Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration ... Show More
39m 17s
Jan 2025
A new Mirai-based botnet.
Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFa ... Show More
26m 9s
Jan 2025
PP046: IPv6 Security, Migration, and Adoption
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of ... Show More
39m 42s