A Conversation With Slava Konstantinov From ThreatLocker

A Conversation With Slava Konstantinov From ThreatLocker

➡ Allow what you need, block everything else with ThreatLocker:
threatlocker.com

In this episode, I speak with Slava Konstantinov, ThreatLocker's MacOS Lead Architect, about their zero-trust approach to endpoint security and their latest cybersecurity innovations.

We talk about:

• ThreatLocker’s Zero Trust Approach to Cybersecurity:
How ThreatLocker enforces a default deny security model, ensuring only explicitly allowed applications and actions can run, reducing attack surfaces and unauthorized access.

• Key ThreatLocker Products and Features:
How ThreatLocker’s solutions—Application Control, Storage Control, Ring Fencing, Network Control, and ThreatLocker Detect—help organizations enhance security through granular policy enforcement.

• New & Upcoming ThreatLocker Features:
How new solutions like Patch Management, Web Control, Insights, and Cloud Detect will provide even greater security, automation, and compliance for businesses managing complex IT environments.

Chapters:
00:00 - Intro to ThreatLocker and Zero Trust Security
01:24 - How ThreatLocker’s Application Control Blocks Unauthorized Software
06:52 - Storage Control: Preventing Unauthorized Data Access and USB Threats
08:19 - Ring Fencing: Controlling App Permissions and Network Access
12:37 - Elevation Control: Granting Admin Privileges Without Risk
16:23 - Network Control: Restricting Internet and Internal Network Access
19:26 - AI-Driven Security Policies: The Future of ThreatLocker Management
24:07 - Mac vs. Windows Security: Key Differences and Challenges
29:49 - ThreatLocker’s Expansion: New Products and Future Plans
32:32 - Where to Learn More About ThreatLocker’s Security Solutions

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

Jaksot(532)

The Relationship Between Hardship, Struggle, and Meaning

The Relationship Between Hardship, Struggle, and Meaning

My essay on how struggle could be necessary for meaning, and how this could be the underlying cause of much of America's mental health problem.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

15 Loka 202013min

News & Analysis | No. 250

News & Analysis | No. 250

CrowdSec, Nudge, Trickbot Trickery, CISA Ransomware Guide, Twitter and Facebook anti-Disinformation, QAnon Takedowns, Putin Turning on Trump, Azure Vulnerabilities, PC shipments up, Virtual Sales Call AI, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

12 Loka 202026min

News & Analysis | No. 249

News & Analysis | No. 249

Operation Fortify, Cyber Pearl Harbor, Github Code Scanning, E-6B Flights, Blackbaud++, Grinder Password Reset, Cloudflare API Security, QNAP Drama, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

5 Loka 202021min

News & Analysis | No. 248

News & Analysis | No. 248

Everyday Threat Modeling, Why I Like TikTok So Much, Windows XP Leak, SSH 8.4, Renée DiResta's Latest, Student Visas Changes, Cisco IOS Vulns, QAonon Gamification, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

28 Syys 202016min

Why Creators Should Move to Direct Support Monetization

Why Creators Should Move to Direct Support Monetization

My essay about why I think creators—especially in InfoSec—should be setting up their own domains and moving to a direct model for monetization.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

24 Syys 202011min

No, Changing Your SSH Port Isn't Security by Obscurity

No, Changing Your SSH Port Isn't Security by Obscurity

My latest essay on the timeless debate on SSH ports and Security by Obscurity. I talk about why changing your port is not usually obscurity, and give what I believe to be an airtight method of how you can tell the difference between regular security and Security by Obscurity.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

23 Syys 202013min

News & Analysis | No. 247

News & Analysis | No. 247

SSH Port Obscurity, The TikTok Deal, Ransomware Death, Chinese Espionage CRM, Amazon Bribery, Instant Domain Admin, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

21 Syys 202020min

Book Summary | Naked Statistics, by Charles Wheelen

Book Summary | Naked Statistics, by Charles Wheelen

In this episode, I review the book Naked Statistics, by Charles Wheelen. I cover: My one-sentence summary of the text The table of contents, which is super helpful to see the structure of the argument My capture of the main points My takeaways, questions, and ideas that came from reading it My final summarization And then my rating of the book and whether I recommend you read the full text Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

16 Syys 202022min