All episodes
-
Secure Sooner with Suspicious Threat Feeds
Laurent Rousseau, Solutions Architect Manager France, Infoblox
Your organisation’s security posture depends on your ability to stop threats as soon as possible, ideally well before they are identified as malicious. Discover how suspicious threat feeds empower your SecOps to do just that. Join us for Episode 1 of our Infoblox Insights Security Webinar Series, Secure Sooner with Suspicious Threat Feeds.
Attend and learn:
- The unique ways that suspicious threat feeds empower you to anticipate attacks weeks and months ahead of time
- What suspicious threat feeds consist of, how they are and why they deliver such low false positives
- How seamless integration with your existing security stack and third-party tools empowers SecOps to shift left -
Protect your brand from Lookalike domains
Infoblox
Threats from lookalike domains are devious and spreading rapidly. Along with direct monetary costs, they can also inflict lingering damage to your brand. Learn how to stop these insidious threats in their tracks—before they cause harm. Join us for Episode 2 of our InfobloxInsights Security Webinar Series.
Attend and get the latest research and practical strategies on:
- Suspicious Domains—being proactive in blocking phishing and malware
- Lookalike Domains—how to spot attempts to impersonate your company or your supply chain
- Domain Takedown—next steps after discovering a domain with criminal intent -
Strengthen Your Defence-in-Depth Strategy with DNS
Infoblox
Unique security properties contained within the Doman Name System (DNS) protocol hold the key to elevating your security posture—continuously and automatically. Please join us for Episode 3 of our Infoblox Insights Security Webinar Series, Strengthen Your Defence-in-Depth Strategy with DNS.
Attend and gain valuable knowhow, including:
- The ways that malware uses DNS in attacks such as data exfiltration, DGAs, DDoS and others.
- The emergence of Protective DNS and how to maximize its threat mitigation benefits.
- Leveraging DNS-based behavioral analytics to detect anomalous patterns or actions from infected devices.