5 episodes

This is Decrypted Chatter – the Podcast for all things networking, troubleshooting and cybersecurity! Join our host, Mike Canney, of Accedian and Microseconds Matter, and welcome gurus from across the IT and cybersecurity ether to discuss all things tech. Topics range from network cybersecurity, cyber resilience, network performance, performance troubleshooting, and everything in between! Listen to Decrypted Chatter, where we take complex technical topics and break them down into easy to understand concepts. Follow this podcast to make sure you don’t miss an episode!

Decrypted Chatter Accedian

    • Technology
    • 5.0 • 5 Ratings

This is Decrypted Chatter – the Podcast for all things networking, troubleshooting and cybersecurity! Join our host, Mike Canney, of Accedian and Microseconds Matter, and welcome gurus from across the IT and cybersecurity ether to discuss all things tech. Topics range from network cybersecurity, cyber resilience, network performance, performance troubleshooting, and everything in between! Listen to Decrypted Chatter, where we take complex technical topics and break them down into easy to understand concepts. Follow this podcast to make sure you don’t miss an episode!

    People, process, and tools – keeping cyber attackers at bay

    People, process, and tools – keeping cyber attackers at bay

    Welcome to another episode of Decrypted Chatter – the Podcast for all things networking, troubleshooting and cybersecurity! In this episode, our host, Mike Canney, welcomes UnderDefense’s CEO, Nazar Tymoshyk. UnderDefense is a globally top-ranked firm by Gartner and Clutch, who provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

    You’ve got some tools in place, so where should you look next in terms of hardening your organization’s cyber resiliency?

    Mike and Nazar’s very topical conversation revolves around cyber resilience and business continuity. Today, more and more companies are getting breached and may not even know it. It’s no longer a matter of “if”, but “when” it can happen to you. So, how can you prepare most effectively? One suggestion, getting the people, processes, and tools in place. Listen in as they discuss how taking appropriate actions, being prepared, and knowing your assets and risks can save your organization many times over. What are the crown jewels your organization must protect at all costs? It’s time to start mulling it over!

    • 24 min
    The importance of decryption amidst the rise of TLS 1.3

    The importance of decryption amidst the rise of TLS 1.3

    Today, we are seeing the majority of network traffic being encrypted. It’s at the point where unencrypted traffic will soon be considered an exception. In this episode of Decrypted Chatter, you will learn about the importance of TLS decryption in enabling efficient network and application performance monitoring through full visibility across your network.

    But, all good things come with some challenges, too. We’ll also discuss some roadblocks that may arise with decryption, including application performance measurements, incident troubleshooting, and security management, along with what we can do to fix the issues.

    Decrypting TLS traffic, including TLS 1.3, not only allows complete visibility into all encrypted traffic, of course, but it also enables network and application performance monitoring for all business critical apps, troubleshooting, and advanced threat detection.

    • 24 min
    Shifting from TCP to UDP to get your network running QUICkly

    Shifting from TCP to UDP to get your network running QUICkly

    Welcome to the third episode of Decrypted Chatter – the Podcast for all things networking, troubleshooting and cybersecurity! In this episode, our host, Mike Canney, welcomes Chris Greer, the Packet Pioneer! Mike and Chris’s exchange revolves around the journey down the QUIC path!
    What is the QUIC transport layer network protocol and why should we be paying attention to it? Can you pinpoint why your network applications are running slowly? Listen in to find out how to get to the bottom of degradations and take advantage of UDP, kicking that bottleneck TCP to the curb. You’ll understand how to boost your network speed, better understand flow controls and what happens when congestion occurs, and learn how to ensure your data can move across the network securely and efficiently.

    • 26 min
    Anything worth doing is worth measuring – talking KPIs and network testing with Greg Spear

    Anything worth doing is worth measuring – talking KPIs and network testing with Greg Spear

    Welcome to the second episode of Decrypted Chatter – the Podcast for all things networking, troubleshooting and cybersecurity! In this episode, our host, Mike Canney, welcomes the illustrious Greg Spear, Director of Solutions Enablement at Accedian. Mike and Greg’s conversation focuses on key KPIs – anything worth doing is worth measuring, after all! They cover how to assure performance of latency-sensitive apps, the importance of delay variation in understanding network performance, and how early warning signs can predict congestion 3-4 days in advance, among other topical testing and performance measurement points.

    • 21 min
    "The man, the myth, the legend” – talking threats and securing your network with the Oldcommguy!

    "The man, the myth, the legend” – talking threats and securing your network with the Oldcommguy!

    Welcome to the first episode of Decrypted Chatter – the Podcast for all things networking, troubleshooting and cybersecurity! In this episode, our host, Mike Canney, welcomes our first guest on Decrypted Chatter, Tim O’Neill – the Doctor of all things and the original Oldcommguy! Most think that their networks are securely protected. False. Listen in on this podcast as Tim and Mike examine the importance of securing your network, how to design networks to properly keep your data safe, and how to eliminate problems before they arise. They’ll also deep dive into TCP and endpoint protection against the attack paths to security threats.

    • 31 min

Customer Reviews

5.0 out of 5
5 Ratings

5 Ratings

sjean5673 ,

Interesting

Explains very important concepts related to network security.

Top Podcasts In Technology