A Conversation with Rob Allen from ThreatLocker

A Conversation with Rob Allen from ThreatLocker

In this conversation, I speak with Rob Allen, Chief Product Officer at ThreatLocker.

We talk about:

ThreatLocker’s Unique Zero Trust Approach to Cybersecurity:
How ThreatLocker’s "deny by default, permit by exception" methodology, along with automated application learning and built-in definitions for over 4,000 applications, simplifies allowlisting and enhances endpoint security.

Innovations in ThreatLocker’s Control Features:
How ThreatLocker’s ringfencing prevents unauthorized application interactions and data access, and dynamic firewalls mitigate risks like lateral movement and ransomware attacks through endpoint-level network segmentation.

Recent Developments and Cloud Expansion:
How ThreatLocker Detect and Cloud Detect provide advanced detection capabilities for endpoint and cloud environments, including Office 365, enabling anomaly detection, centralized alerts, and proactive threat management.

And more.

Into (00:00:00)
ThreatLocker's Zero Trust Cybersecurity Approach (00:00:31)
Understanding Allow Listing in Cybersecurity (00:01:49)
Managing Software Updates with ThreatLocker (00:02:13)
Automated Application Updates for Over 4000 Programs (00:04:11)
Vendor Collaboration for Early Software Updates (00:05:40)
Challenges and Risks of Immediate Software Updates (00:06:53)
Assuming Breach: A Core Cybersecurity Principle (00:08:10)
Implementing Zero Trust Strategies with Ring Fencing (00:09:30)
Controlling Application Interactions to Prevent Threats (00:09:50)
Advanced Data Protection with Storage Control (00:13:17)
Dynamic ACLs for Smarter Network Control (00:15:48)
Ransomware Risks from Open Ports (00:16:50)
Using Shodan to Identify Open Port Vulnerabilities (00:17:19)
Building Application Allow Lists with Contextual Data (00:18:43)
Learning Mode for Application and Traffic Visibility (00:19:36)
Balancing User Behavior Control and Workflow (00:20:44)
Integrating Detection and Control with ThreatLocker Detect (00:21:44)
Why Detection is Critical in Cybersecurity Layers (00:22:41)
Response Mechanisms and Automated Remediation (00:24:02)
Lockdown Mode: Ultimate Isolation from Threats (00:25:38)
Streamlined Application Approvals with Cyber Hero (00:26:36)
Breaking Down Ransomware Attack Stages (00:27:46)
Introducing Cloud Detect for Cloud Security (00:29:39)
How to Learn More About ThreatLocker Solutions (00:30:47)

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

Episoder(532)

Unsupervised Learning: No. 58

Unsupervised Learning: No. 58

This week's topics: Yahoo!, Shadowbrokers, Building Your Own Honeytrapping Infrastructure, The Power of Newsletters, Project Aristotle, and more…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

19 Des 201614min

Unsupervised Learning: No. 57

Unsupervised Learning: No. 57

This week’s topics: Russia gave us attribution for Christmas, the NSA is shedding talent, the evilest ransomware, how to raise someone's IQ in 2 minutes, and more…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

12 Des 201629min

Unsupervised Learning: No. 56

Unsupervised Learning: No. 56

Gooligan, Korean Game Hacking Law, DoubleFlag Experian Hack, Georgia Tech Attribution Research, Amazon's re:Invent Conference Highlights, recommended links, and more…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

5 Des 201614min

Unsupervised Learning: No. 55

Unsupervised Learning: No. 55

Biowarfare defenses, AI advances, mergers and acquisitions, Facebook and censorship, IoT definitions, the philosophy of Westworld, and more...Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

28 Nov 201624min

The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks

The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks

My essay that clearly separates the differences between the core infosec terms of threat, threat actor, vulnerabilty, and risk.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

27 Nov 20165min

The Difference Between Existentialism, Nihilism, and Absurdism

The Difference Between Existentialism, Nihilism, and Absurdism

For centuries there have been people who believe there is no intrinsic meaning in the universe. Here I’ll summarize the three major branches of this belief, and how each proposes we deal with the situation.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

22 Nov 20168min

Stop Being Proud of Complexity

Stop Being Proud of Complexity

An essay on how complexity often communicates the exact opposite of its desired effect.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

22 Nov 20163min

Unsupervised Learning: No. 54

Unsupervised Learning: No. 54

Britain's new surveillance law, CRISPR biotech, the Army's new Phaser, NIST's new IoT Security guidelines, ML-based facial recognition, and more...Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

21 Nov 201614min

Populært innen Teknologi

romkapsel
rss-avskiltet
teknisk-sett
tomprat-med-gunnar-tjomlid
energi-og-klima
rss-impressions-2
shifter
nasjonal-sikkerhetsmyndighet-nsm
elektropodden
fornybaren
rss-alt-vi-kan
rss-alt-som-gar-pa-strom
smart-forklart
rss-snakk-om-sikkerhet
teknologi-og-mennesker
kunstig-intelligens-med-morten-goodwin
rss-bouvet-bobler
i-loopen
pedagogisk-intelligens
rss-digitaliseringspadden