Page 54 - Cyber Warnings
P. 54
Rod Rasmussen, Leading Threat Intelligence Expert from Infoblox to Share DNS
Security Best Practices at GISEC 2016
nd
DUBAI, United Arab Emirates, 22 March, 2016: Infoblox Inc., the network control company,
today announced that Rod Rasmussen, Vice President of Cybersecurity for the company, will
be travelling to Dubai to participate in the Gulf Information Security Expo & Conference (GISEC)
th
st
2016 taking place at Dubai World Trade Centre between 29 – 31 March, 2016.
As co-founder of internet security company IID (a company recently acquired by Infoblox), Rod is
widely recognized as a leading expert on the abuse of the Domain Name System (DNS) by cyber
criminals.
He is eager to share his vast expertise in DNS best practices with GISEC conference attendees.
Rod will discuss findings from the latest Infoblox DNS Threat Index Report, covering the increase in
malicious domain creation and usage, particularly in the case of exploit kits.
Exploit kits are a particularly alarming category of malware because they represent the automation of
cybercrime.
A small number of highly skilled hackers can create exploit kits, which are packages for delivering a
malware payload, and then sell or rent these toolkits to ordinary criminals with little technical
experience—vastly increasing the ranks of malicious attackers capable of going after individuals,
businesses, schools, and government agencies.
“Cybercriminals don’t stand still, and exploit kits are constantly evolving to take advantage of newly
discovered vulnerabilities and to avoid traditional security systems,” says Rasmussen.
“Organizations in the Middle East need to protect themselves by plugging into reliable sources of threat
intelligence, then use that intelligence to disrupt malware communications through protocols such as
DNS.”
Rod will also be discussing the Infoblox acquisition of IID and how the addition of IID’s ActiveTrust
federated threat intelligence and big-data analytics platform to Infoblox security solutions gives regional
organizations true context-aware security—harnessing real-world data from an organization’s IT
infrastructure to improve the accuracy and relevance of security decisions.
Another area that Rod will address is advanced persistent threats (APTs) and malware.
54 Cyber Warnings E-Magazine – April 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide