19 episodes

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

Packet Protector Packet Pushers

    • Technology

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

    PP018: RSA Recap, Including a View from the Event SOC

    PP018: RSA Recap, Including a View from the Event SOC

    Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and storage backups, and the not-so-surprising focus on IoT security and AI-assisted products. They also pull back the curtain on what the conference’s own SOC... Read more »

    • 38 min
    PP017: What’s the Matter? Understanding the Matter Protocol

    PP017: What’s the Matter? Understanding the Matter Protocol

    Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show today to walk us through this IP-based protocol for smart home devices. He compares Matter to an armored car, delivering a valuable payload securely... Read more »

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins... Read more »

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »

    • 42 min
    PP014: Good Threat Hunting

    PP014: Good Threat Hunting

    Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »

    • 33 min
    PP013: Untangling Managed Security Services

    PP013: Untangling Managed Security Services

    What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts in cybersecurity offerings. She explains what questions you should ask vendors to make sure you’re picking the right one for your needs; negotiating... Read more »

    • 42 min

Top Podcasts In Technology

nFactorial Podcast
nFactorial school
GEMBA PODCAST
Маргулан Сейсембаев
Запуск завтра
libo/libo
Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
Радио-Т
Umputun, Bobuk, Gray, Ksenks, Alek.sys

You Might Also Like

Heavy Wireless
Packet Pushers
Network Break
Packet Pushers
Network Automation Nerds
Packet Pushers
Heavy Strategy
Packet Pushers
IPv6 Buzz
Packet Pushers
Heavy Networking
Packet Pushers