Business Security Weekly (Audio) Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432
Jan 28, 2026
Rob Allen, Chief Product Officer at ThreatLocker, drives product strategy and engineering. He explains ThreatLocker Cloud Control using device IPs to gate Microsoft 365 access and why phishing and MFA failures still work. He compares IP-based controls to identity, details dynamic IP updates and caching, and argues for single-agent consolidation and deny-by-default layered controls.
AI Snips
Chapters
Transcript
Episode notes
Enforce IP-Based Conditional Access
- Collect device IPs and upload them to Office 365 named locations to create tight conditional access policies.
- Allow only those specific IPs instead of entire countries to render phishing and token theft ineffective.
Controls Are A Different Security Layer
- Many security products are detection-focused and thus sit at the same layer despite being multiple tools.
- A balanced stack needs distinct layers of control in addition to detection and response.
Choose Manageability Over DIY Projects
- Prefer manageable, fast-to-adopt overlays when native platform controls are powerful but unmanageable.
- Avoid multi-year internal projects for built-in tools when an adoptable product can secure you in months.

