17 episodes

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

Packet Protector Packet Pushers

    • Technology

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins... Read more »

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »

    • 42 min
    PP014: Good Threat Hunting

    PP014: Good Threat Hunting

    Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »

    • 33 min
    PP013: Untangling Managed Security Services

    PP013: Untangling Managed Security Services

    What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts in cybersecurity offerings. She explains what questions you should ask vendors to make sure you’re picking the right one for your needs; negotiating... Read more »

    • 42 min
    PP012: Planning for a Post Quantum Cryptography World

    PP012: Planning for a Post Quantum Cryptography World

    The classical encryption algorithms that currently undergird our IT infrastructure will be broken once there’s a powerful and stable enough quantum computer to do the job. Quantum-resistant algorithms are being developed by NIST, but implementation and deployment of these algorithms still have to be addressed. So what does all this mean for busy IT and... Read more »

    • 40 min
    PP011: IoT Protocols: Detection and Protection

    PP011: IoT Protocols: Detection and Protection

    IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »

    • 46 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
Ko Kursors Tev Neraksta
Kursors.lv
#BeardyCast: гаджеты и медиакультура
BeardyCast.com
Waveform: The MKBHD Podcast
Vox Media Podcast Network
Радио-Т
Umputun, Bobuk, Gray, Ksenks, Alek.sys
Acquired
Ben Gilbert and David Rosenthal

You Might Also Like

Heavy Wireless
Packet Pushers
Network Break
Packet Pushers
Network Automation Nerds
Packet Pushers
Heavy Strategy
Packet Pushers
IPv6 Buzz
Packet Pushers
Heavy Networking
Packet Pushers