Business Security Weekly (Audio)

Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432

Jan 28, 2026
Rob Allen, Chief Product Officer at ThreatLocker, drives product strategy and engineering. He explains ThreatLocker Cloud Control using device IPs to gate Microsoft 365 access and why phishing and MFA failures still work. He compares IP-based controls to identity, details dynamic IP updates and caching, and argues for single-agent consolidation and deny-by-default layered controls.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Enforce IP-Based Conditional Access

  • Collect device IPs and upload them to Office 365 named locations to create tight conditional access policies.
  • Allow only those specific IPs instead of entire countries to render phishing and token theft ineffective.
INSIGHT

Controls Are A Different Security Layer

  • Many security products are detection-focused and thus sit at the same layer despite being multiple tools.
  • A balanced stack needs distinct layers of control in addition to detection and response.
ADVICE

Choose Manageability Over DIY Projects

  • Prefer manageable, fast-to-adopt overlays when native platform controls are powerful but unmanageable.
  • Avoid multi-year internal projects for built-in tools when an adoptable product can secure you in months.
Get the Snipd Podcast app to discover more snips from this episode
Get the app