21 episodes

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

Packet Protector Packet Pushers

    • Technology

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

    PP020: Dropping the SBOM: The Software Bill of Materials and Risk Management

    PP020: Dropping the SBOM: The Software Bill of Materials and Risk Management

    If you care about nutrition, you check the ingredients of your food. If you care about your IT infrastructure, you check the Software Bill of Materials (SBOM) of the tech. At least that’s the future that Thomas Pace hopes for. Right now, SBOMs aren’t super common and software transparency is very low. Thomas walks us... Read more »

    • 35 min
    PP019: The God Accounts: Cloud IAM

    PP019: The God Accounts: Cloud IAM

    Today we discuss how to secure your all-powerful root accounts on the three major public cloud providers: AWS, Azure, and GCP. Our guests today, Ned Bellavance and Kyler Middleton from the Day Two Cloud podcast (soon to be Day Two DevOps podcast), describe the struggle of securely managing several root accounts at once. They take... Read more »

    PP018: RSA Recap, Including a View from the Event SOC

    PP018: RSA Recap, Including a View from the Event SOC

    Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and storage backups, and the not-so-surprising focus on IoT security and AI-assisted products. They also pull back the curtain on what the conference’s own SOC... Read more »

    • 38 min
    PP017: What’s the Matter? Understanding the Matter Protocol

    PP017: What’s the Matter? Understanding the Matter Protocol

    Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show today to walk us through this IP-based protocol for smart home devices. He compares Matter to an armored car, delivering a valuable payload securely... Read more »

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    PP016: Tabletop Security Exercises: D&D for Grown-ups

    Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins... Read more »

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More

    Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »

    • 42 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
Computer Networking
Tech4Geek
Darknet Diaries
Jack Rhysider
FT Tech Tonic
Financial Times
DataFramed
DataCamp

You Might Also Like

Heavy Wireless
Packet Pushers
Network Break
Packet Pushers
Network Automation Nerds
Packet Pushers
Heavy Strategy
Packet Pushers
Heavy Networking
Packet Pushers
IPv6 Buzz
Packet Pushers