Artwork

Daniel Miessler에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Daniel Miessler 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

A Conversation with Rob Allen from ThreatLocker

32:18
 
공유
 

Manage episode 450724016 series 3012020
Daniel Miessler에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Daniel Miessler 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

In this conversation, I speak with Rob Allen, Chief Product Officer at ThreatLocker.

We talk about:

ThreatLocker’s Unique Zero Trust Approach to Cybersecurity:
How ThreatLocker’s "deny by default, permit by exception" methodology, along with automated application learning and built-in definitions for over 4,000 applications, simplifies allowlisting and enhances endpoint security.

Innovations in ThreatLocker’s Control Features:
How ThreatLocker’s ringfencing prevents unauthorized application interactions and data access, and dynamic firewalls mitigate risks like lateral movement and ransomware attacks through endpoint-level network segmentation.

Recent Developments and Cloud Expansion:
How ThreatLocker Detect and Cloud Detect provide advanced detection capabilities for endpoint and cloud environments, including Office 365, enabling anomaly detection, centralized alerts, and proactive threat management.

And more.

Into (00:00:00)
ThreatLocker's Zero Trust Cybersecurity Approach (00:00:31)
Understanding Allow Listing in Cybersecurity (00:01:49)
Managing Software Updates with ThreatLocker (00:02:13)
Automated Application Updates for Over 4000 Programs (00:04:11)
Vendor Collaboration for Early Software Updates (00:05:40)
Challenges and Risks of Immediate Software Updates (00:06:53)
Assuming Breach: A Core Cybersecurity Principle (00:08:10)
Implementing Zero Trust Strategies with Ring Fencing (00:09:30)
Controlling Application Interactions to Prevent Threats (00:09:50)
Advanced Data Protection with Storage Control (00:13:17)
Dynamic ACLs for Smarter Network Control (00:15:48)
Ransomware Risks from Open Ports (00:16:50)
Using Shodan to Identify Open Port Vulnerabilities (00:17:19)
Building Application Allow Lists with Contextual Data (00:18:43)
Learning Mode for Application and Traffic Visibility (00:19:36)
Balancing User Behavior Control and Workflow (00:20:44)
Integrating Detection and Control with ThreatLocker Detect (00:21:44)
Why Detection is Critical in Cybersecurity Layers (00:22:41)
Response Mechanisms and Automated Remediation (00:24:02)
Lockdown Mode: Ultimate Isolation from Threats (00:25:38)
Streamlined Application Approvals with Cyber Hero (00:26:36)
Breaking Down Ransomware Attack Stages (00:27:46)
Introducing Cloud Detect for Cloud Security (00:29:39)
How to Learn More About ThreatLocker Solutions (00:30:47)

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

  continue reading

100 에피소드

Artwork
icon공유
 
Manage episode 450724016 series 3012020
Daniel Miessler에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Daniel Miessler 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

In this conversation, I speak with Rob Allen, Chief Product Officer at ThreatLocker.

We talk about:

ThreatLocker’s Unique Zero Trust Approach to Cybersecurity:
How ThreatLocker’s "deny by default, permit by exception" methodology, along with automated application learning and built-in definitions for over 4,000 applications, simplifies allowlisting and enhances endpoint security.

Innovations in ThreatLocker’s Control Features:
How ThreatLocker’s ringfencing prevents unauthorized application interactions and data access, and dynamic firewalls mitigate risks like lateral movement and ransomware attacks through endpoint-level network segmentation.

Recent Developments and Cloud Expansion:
How ThreatLocker Detect and Cloud Detect provide advanced detection capabilities for endpoint and cloud environments, including Office 365, enabling anomaly detection, centralized alerts, and proactive threat management.

And more.

Into (00:00:00)
ThreatLocker's Zero Trust Cybersecurity Approach (00:00:31)
Understanding Allow Listing in Cybersecurity (00:01:49)
Managing Software Updates with ThreatLocker (00:02:13)
Automated Application Updates for Over 4000 Programs (00:04:11)
Vendor Collaboration for Early Software Updates (00:05:40)
Challenges and Risks of Immediate Software Updates (00:06:53)
Assuming Breach: A Core Cybersecurity Principle (00:08:10)
Implementing Zero Trust Strategies with Ring Fencing (00:09:30)
Controlling Application Interactions to Prevent Threats (00:09:50)
Advanced Data Protection with Storage Control (00:13:17)
Dynamic ACLs for Smarter Network Control (00:15:48)
Ransomware Risks from Open Ports (00:16:50)
Using Shodan to Identify Open Port Vulnerabilities (00:17:19)
Building Application Allow Lists with Contextual Data (00:18:43)
Learning Mode for Application and Traffic Visibility (00:19:36)
Balancing User Behavior Control and Workflow (00:20:44)
Integrating Detection and Control with ThreatLocker Detect (00:21:44)
Why Detection is Critical in Cybersecurity Layers (00:22:41)
Response Mechanisms and Automated Remediation (00:24:02)
Lockdown Mode: Ultimate Isolation from Threats (00:25:38)
Streamlined Application Approvals with Cyber Hero (00:26:36)
Breaking Down Ransomware Attack Stages (00:27:46)
Introducing Cloud Detect for Cloud Security (00:29:39)
How to Learn More About ThreatLocker Solutions (00:30:47)

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

  continue reading

100 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생