20 avsnitt

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

Packet Protector Packet Pushers

    • Teknologi

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

    PP019: The God Accounts: Cloud IAM

    PP019: The God Accounts: Cloud IAM

    Today we discuss how to secure your all-powerful root accounts on the three major public cloud providers: AWS, Azure, and GCP. Our guests today, Ned Bellavance and Kyler Middleton from the Day Two Cloud podcast (soon to be Day Two DevOps podcast), describe the struggle of securely managing several root accounts at once. They take... Read more »

    PP018: RSA Recap, Including a View from the Event SOC

    PP018: RSA Recap, Including a View from the Event SOC

    Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and storage backups, and the not-so-surprising focus on IoT security and AI-assisted products. They also pull back the curtain on what the conference’s own SOC... Read more »

    • 38 min
    PP017: What’s the Matter? Understanding the Matter Protocol

    PP017: What’s the Matter? Understanding the Matter Protocol

    Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show today to walk us through this IP-based protocol for smart home devices. He compares Matter to an armored car, delivering a valuable payload securely... Read more »

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins... Read more »

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »

    • 42 min
    PP014: Good Threat Hunting

    PP014: Good Threat Hunting

    Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »

    • 33 min

Mest populära poddar inom Teknologi

SvD Tech brief
Svenska Dagbladet
Lex Fridman Podcast
Lex Fridman
AI Sweden Podcast
AI Sweden
Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Search Engine
PJ Vogt, Audacy, Jigsaw

Du kanske också gillar

Heavy Wireless
Packet Pushers
Network Break
Packet Pushers
Network Automation Nerds
Packet Pushers
Heavy Strategy
Packet Pushers
Heavy Networking
Packet Pushers
IPv6 Buzz
Packet Pushers