RSAC 2024: Infoblox: Layering In More DNS Security Features

Dr. Renée Burton, vice president of Infoblox threat intel, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss enhancements to the company’s DNS-based approach to making networks safer.

Terry Sweeney, Contributing Editor

May 20, 2024

10 Min View
Source: Informa Tech

Dr. Renée Burton, vice president of Infoblox threat intel, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss enhancements to the company’s DNS-based approach to making networks safer. She shares results from recent research about the Muddling Meerkat scourge, and a breakthrough it led to for Infoblox’s own technology suite. Burton discusses how the vendor uses DNS-based threat intel to protect its customers, and how its new zero-day DNS capability works. Burton also takes a deeper cut at the idea that “actors begin with DNS,” and how Infoblox leverages that.

Dr. Renée Burton is the Head of Threat Intel at Infoblox, where she leads the company’s global team that specializes in the creation of original intelligence for Infoblox’s BloxOne® Threat Defense platform. She and her team are responsible for helping protect customers from malware and other attacks before they can enter the network, by preventing DNS resolution of both suspicious and malicious indicators. With a combination of data science, AI algorithms, and a deep understanding of both DNS and the threat intelligence landscape, the Infoblox Threat Intel team provides 24/7 support, ensuring optimal network protection.

A DNS expert, Dr. Burton joined Infoblox in 2018 after having spent 22 years at the National Security Agency (NSA). Dr. Burton holds a PhD in mathematics and was elevated to the US Government Senior Executive Service in 2005. During her tenure at NSA, she was involved in a wide range of programs as an individual contributor, strategist, and leader of data science and computer science research programs. Dr. Burton is an avid believer in DNS as both an important control point within a network and a source to hunt threats that escape the perimeter devices.

About the Author

Terry Sweeney

Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights