Product Manager of Security Solutions at Nominum
Joined on January 23, 2013
Total Post Views: 8,495
Pat Barnes is the Product Manager of Security Solutions at Nominum, where he is responsible for security products that leverage the unique intelligence and control potential of DNS. Pat has 15 years of Product Development experience, including a Product Manager position at Arbor Networks where he was responsible for Arbor's flagship "Peakflow SP" product. As Product Manager of Peakflow SP, Pat was responsible for much of Arbor's security and network visibility solutions, including: DDoS detection/mitigation, peering evaluation tools, and comprehensive traffic reporting. Pat was also the primary product manager at Arbor Networks responsible for MSSP (Managed Security Service Provider) solutions.
Before entering the network security space, Pat held engineering positions at Open Text and PTC, focusing on their Document Management products. These efforts included the design and implementation of document storage technologies, including hardening portals against various security threats such as SQL injection and cross-site scripting vulnerabilities.
Pat has worked closely with many of the world's largest service providers and MSSPs, and is active within the service provider industry, attending events such as NANOG and participating in industry organizations such as the Online Trust Alliance (OTA).
In part 1, I talked about some of the risks associated with BYOD. But there are actions you can take to greatly reduce this risk. One effective method for limiting the risk of BYOD is to employ DNS-based security intelligence techniques. DNS-based security intelligence makes use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more»
Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more»