<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~files/feed-premium.xsl"?>
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:rawvoice="https://blubrry.com/developer/rawvoice-rss/" xmlns:feedpress="https://feed.press/xmlns" xmlns:media="http://search.yahoo.com/mrss/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" version="2.0">
  <channel>
    <feedpress:locale>en</feedpress:locale>
    <image>
      <link>https://packetpushers.net/podcast/packet-protector/</link>
      <title><![CDATA[Packet Protector]]></title>
      <url>https://static.feedpress.com/logo/packet-protector-65bd5d0249742.jpg</url>
    </image>
    <itunes:category text="Technology"/>
    <media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Technology</media:category>
    <itunes:category text="Business">
      <itunes:category text="Careers"/>
    </itunes:category>
    <media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Business/Careers</media:category>
    <media:rating>nonadult</media:rating>
    <media:description type="plain">Practical conversations at the intersection of security and networking</media:description>
    <media:credit role="author">Packet Pushers</media:credit>
    <media:keywords>cybersecurity, networking, engineers, security, compliance, </media:keywords>
    <media:copyright>© Packet Pushers Interactive LLC</media:copyright>
    <dc:creator>Packet Pushers</dc:creator>
    <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
    <itunes:summary>Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.</itunes:summary>
    <itunes:subtitle>Practical conversations at the intersection of security and networking</itunes:subtitle>
    <googleplay:email>operations@packetpushers.net</googleplay:email>
    <googleplay:description>Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.</googleplay:description>
    <googleplay:explicit>no</googleplay:explicit>
    <googleplay:author>Packet Pushers</googleplay:author>
    <title>Packet Protector</title>
    <atom:link href="https://feeds.packetpushers.net/packet-protector" rel="self" type="application/rss+xml"/>
    <link>https://packetpushers.net/podcast/packet-protector/</link>
    <description>Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.</description>
    <lastBuildDate>Tue, 31 Mar 2026 18:20:22 +0000</lastBuildDate>
    <language>en</language>
    <sy:updatePeriod>
hourly</sy:updatePeriod>
    <sy:updateFrequency>
1</sy:updateFrequency>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:locked>no</podcast:locked>
    <itunes:author>Packet Pushers</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://static.feedpress.com/logo/packet-protector-65bd5d0249742.jpg"/>
    <itunes:type>episodic</itunes:type>
    <itunes:owner>
      <itunes:name>Packet Pushers</itunes:name>
    </itunes:owner>
    <copyright>© Packet Pushers Interactive LLC</copyright>
    <podcast:license>© Packet Pushers Interactive LLC</podcast:license>
    <podcast:medium>podcast</podcast:medium>
    <podcast:podping usesPodping="true"/>
    <podcast:guid>b50f91ad-7704-5166-83fb-cf890ea8e838</podcast:guid>
    <rawvoice:subscribe feed="https://packetpushers.net/podcast/packet-protector/feed/?597a=1775524218" html="https://packetpushers.net/podcasts/" blubrry="https://blubrry.com/packetpushers/"/>
    <item>
      <title>PP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp103-firemon-brings-clarity-to-firewall-rule-chaos-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 31 Mar 2026 16:09:53 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[automation]]></category>
      <category><![CDATA[FireMon]]></category>
      <category><![CDATA[firewall]]></category>
      <category><![CDATA[firewall rules]]></category>
      <category><![CDATA[governance]]></category>
      <category><![CDATA[Jody Brazil]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[policies]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[security operations]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74612</guid>
      <description><![CDATA[Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp103-firemon-brings-clarity-to-firewall-rule-chaos-sponsored/" title="ReadPP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17310615/PP103.mp3" length="136608128" type="audio/mpeg"/>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>Firemon Brings Clarity to Firewall Rule Chaos (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>56:55</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks.…</itunes:subtitle>
      <itunes:summary>Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp103-firemon-brings-clarity-to-firewall-rule-chaos-sponsored/" title="ReadPP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP102: What’s Driving SASE Adoption?</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp102-whats-driving-sase-adoption/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 24 Mar 2026 17:19:55 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Cato Networks]]></category>
      <category><![CDATA[cloud]]></category>
      <category><![CDATA[firewalls]]></category>
      <category><![CDATA[Mauricio Sanchez]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[Palo Alto Networks]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[SASE]]></category>
      <category><![CDATA[SD-WAN]]></category>
      <category><![CDATA[spending]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Zscaler]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74523</guid>
      <description><![CDATA[Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell&#8217;Oro Group. Today on Packet Protector we talk with that forecast&#8217;s author about what&#8217;s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp102-whats-driving-sase-adoption/" title="ReadPP102: What&#8217;s Driving SASE Adoption?">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17305351/PP102.mp3" length="134643968" type="audio/mpeg"/>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>What's Driving SASE Adoption?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>56:06</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that f…</itunes:subtitle>
      <itunes:summary>Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell&amp;#8217;Oro Group. Today on Packet Protector we talk with that forecast&amp;#8217;s author about what&amp;#8217;s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp102-whats-driving-sase-adoption/" title="ReadPP102: What&amp;#8217;s Driving SASE Adoption?"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP101: Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp101-hackers-tap-intune-to-wipe-windows-devices-tricksters-trump-e2e-encryption/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 17 Mar 2026 19:29:49 +0000</pubDate>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[cyber strategy]]></category>
      <category><![CDATA[Entra]]></category>
      <category><![CDATA[exploits]]></category>
      <category><![CDATA[hack]]></category>
      <category><![CDATA[Iran]]></category>
      <category><![CDATA[KEV]]></category>
      <category><![CDATA[Microsoft Intune]]></category>
      <category><![CDATA[passkeys]]></category>
      <category><![CDATA[phishing]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[social engineering]]></category>
      <category><![CDATA[Stryker]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <category><![CDATA[White House]]></category>
      <category><![CDATA[Windows]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74405</guid>
      <description><![CDATA[On today&#8217;s news roundup we assess the White House&#8217;s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn&#8217;t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp101-hackers-tap-intune-to-wipe-windows-devices-tricksters-trump-e2e-encryption/" title="ReadPP101: Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17301092/PP101.mp3" length="105864128" type="audio/mpeg"/>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:07</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of dev…</itunes:subtitle>
      <itunes:summary>On today&amp;#8217;s news roundup we assess the White House&amp;#8217;s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn&amp;#8217;t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp101-hackers-tap-intune-to-wipe-windows-devices-tricksters-trump-e2e-encryption/" title="ReadPP101: Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP100: Building and Securing AI Agents – A Case Study</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp100-building-and-securing-ai-agents-a-case-study/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 10 Mar 2026 17:12:11 +0000</pubDate>
      <category><![CDATA[A2A]]></category>
      <category><![CDATA[agentic AI]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[bot]]></category>
      <category><![CDATA[Kyler Middleton]]></category>
      <category><![CDATA[MCP]]></category>
      <category><![CDATA[Model Context Protocol]]></category>
      <category><![CDATA[OAuth]]></category>
      <category><![CDATA[risk]]></category>
      <category><![CDATA[risk management]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Slack]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74292</guid>
      <description><![CDATA[Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp100-building-and-securing-ai-agents-a-case-study/" title="ReadPP100: Building and Securing AI Agents &#8211; A Case Study">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17296966/PP100.mp3" length="103480448" type="audio/mpeg"/>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>Building and Securing AI Agents - A Case Study</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>43:07</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector,…</itunes:subtitle>
      <itunes:summary>Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp100-building-and-securing-ai-agents-a-case-study/" title="ReadPP100: Building and Securing AI Agents &amp;#8211; A Case Study"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP099: The Care and Feeding of Kerberos for Windows Environments</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp099-the-care-and-feeding-of-kerberos-for-windows-environments/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 03 Mar 2026 15:35:07 +0000</pubDate>
      <category><![CDATA[Active Directory]]></category>
      <category><![CDATA[authentication protocol]]></category>
      <category><![CDATA[cryptographic keys]]></category>
      <category><![CDATA[Eric Keuhn]]></category>
      <category><![CDATA[Kerebos]]></category>
      <category><![CDATA[Microsoft Entra]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74181</guid>
      <description><![CDATA[Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We’ll dive into<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp099-the-care-and-feeding-of-kerberos-for-windows-environments/" title="ReadPP099: The Care and Feeding of Kerberos for Windows Environments">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17288793/PP099B.mp3" length="126928448" type="audio/mpeg"/>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>The Care and Feeding of Kerberos for Windows Environments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>52:53</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses c…</itunes:subtitle>
      <itunes:summary>Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We’ll dive into&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp099-the-care-and-feeding-of-kerberos-for-windows-environments/" title="ReadPP099: The Care and Feeding of Kerberos for Windows Environments"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP098: What Goes On Inside a Firewall?</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp098-what-goes-on-inside-a-firewall/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 24 Feb 2026 19:40:58 +0000</pubDate>
      <category><![CDATA[CPU]]></category>
      <category><![CDATA[firewall]]></category>
      <category><![CDATA[hardware]]></category>
      <category><![CDATA[header]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[packet processing]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[stateful inspection]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74098</guid>
      <description><![CDATA[On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what&#8217;s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp098-what-goes-on-inside-a-firewall/" title="ReadPP098: What Goes On Inside a Firewall?">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17283061/PP098.mp3" length="55469452" type="audio/mpeg"/>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>What Goes On Inside a Firewall?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>57:47</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, h…</itunes:subtitle>
      <itunes:summary>On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what&amp;#8217;s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp098-what-goes-on-inside-a-firewall/" title="ReadPP098: What Goes On Inside a Firewall?"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp097-how-and-why-to-turn-the-browser-into-a-universal-security-agent-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 17 Feb 2026 17:50:32 +0000</pubDate>
      <category><![CDATA[agentic AI]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[browser]]></category>
      <category><![CDATA[DLP]]></category>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[Javascript]]></category>
      <category><![CDATA[Palo Alto Networks]]></category>
      <category><![CDATA[Prisma Browser]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Unit 42]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=74020</guid>
      <description><![CDATA[With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp097-how-and-why-to-turn-the-browser-into-a-universal-security-agent-sponsored/" title="ReadPP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17278054/PP097.mp3" length="42536541" type="audio/mpeg"/>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>How and Why to Turn the Browser into a Universal Security Agent (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:19</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On t…</itunes:subtitle>
      <itunes:summary>With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp097-how-and-why-to-turn-the-browser-into-a-universal-security-agent-sponsored/" title="ReadPP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp096-taking-note-of-a-notepad-attack-telnet-and-ntlm-are-still-a-thing/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 10 Feb 2026 18:48:50 +0000</pubDate>
      <category><![CDATA[cyberattack]]></category>
      <category><![CDATA[Forward Networks]]></category>
      <category><![CDATA[Kimwolf Botnet]]></category>
      <category><![CDATA[moltbot]]></category>
      <category><![CDATA[Notepad++]]></category>
      <category><![CDATA[ntlm]]></category>
      <category><![CDATA[Open Claw AI]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[shadow AI]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Telnet]]></category>
      <category><![CDATA[Vishing]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73940</guid>
      <description><![CDATA[Everything old is new again in today&#8217;s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other news, Google takes down a sprawling residential proxy network, the popular Notepad++ app takes steps to recover from a serious compromise, and a Polish<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp096-taking-note-of-a-notepad-attack-telnet-and-ntlm-are-still-a-thing/" title="ReadPP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17273829/PP096.mp3" length="49251891" type="audio/mpeg"/>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>51:18</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other n…</itunes:subtitle>
      <itunes:summary>Everything old is new again in today&amp;#8217;s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other news, Google takes down a sprawling residential proxy network, the popular Notepad++ app takes steps to recover from a serious compromise, and a Polish&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp096-taking-note-of-a-notepad-attack-telnet-and-ntlm-are-still-a-thing/" title="ReadPP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP095: OT and ICS – Where Digital and Physical Risks Meet</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp095-ot-and-ics-where-digital-and-physical-risks-meet/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 03 Feb 2026 19:04:12 +0000</pubDate>
      <category><![CDATA[ICS]]></category>
      <category><![CDATA[incident response plan]]></category>
      <category><![CDATA[industrial control systems]]></category>
      <category><![CDATA[OT]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[Purdue Model]]></category>
      <category><![CDATA[Sam Van Ryder]]></category>
      <category><![CDATA[SANS]]></category>
      <category><![CDATA[tabletop exercise]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73858</guid>
      <description><![CDATA[Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants, manufacturing sites, municipal power and water plants, and more, are under increasing attack. On today&#8217;s Packet Protector we return to the OT/ICS realm to talk about<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp095-ot-and-ics-where-digital-and-physical-risks-meet/" title="ReadPP095: OT and ICS &#8211; Where Digital and Physical Risks Meet">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17269360/PP095.mp3" length="51532276" type="audio/mpeg"/>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>OT and ICS - Where Digital and Physical Risks Meet</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>53:41</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants,…</itunes:subtitle>
      <itunes:summary>Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants, manufacturing sites, municipal power and water plants, and more, are under increasing attack. On today&amp;#8217;s Packet Protector we return to the OT/ICS realm to talk about&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp095-ot-and-ics-where-digital-and-physical-risks-meet/" title="ReadPP095: OT and ICS &amp;#8211; Where Digital and Physical Risks Meet"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP094: Understanding OAuth and Reducing Authorization Risks</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp094-understanding-oauth-and-reducing-authorization-risks/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 27 Jan 2026 17:02:34 +0000</pubDate>
      <category><![CDATA[Aaron Turner]]></category>
      <category><![CDATA[access tokens]]></category>
      <category><![CDATA[authorization]]></category>
      <category><![CDATA[IAM]]></category>
      <category><![CDATA[identity]]></category>
      <category><![CDATA[IETF]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[OAuth]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[protocol]]></category>
      <category><![CDATA[Rich Mogull]]></category>
      <category><![CDATA[SAML]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[token theft]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73753</guid>
      <description><![CDATA[OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp094-understanding-oauth-and-reducing-authorization-risks/" title="ReadPP094: Understanding OAuth and Reducing Authorization Risks">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17264583/PP094.mp3" length="168140288" type="audio/mpeg"/>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>Understanding OAuth and Reducing Authorization Risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>1:10:04</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope…</itunes:subtitle>
      <itunes:summary>OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp094-understanding-oauth-and-reducing-authorization-risks/" title="ReadPP094: Understanding OAuth and Reducing Authorization Risks"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP093: Security Priorities for 2026 – A Roundtable Discussion</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp093-security-priorities-for-2026-a-roundtable-discussion/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 20 Jan 2026 19:15:55 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[bugs]]></category>
      <category><![CDATA[code quality]]></category>
      <category><![CDATA[cryptography]]></category>
      <category><![CDATA[Jimmy Taylor]]></category>
      <category><![CDATA[Marvin Martin]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[quantum]]></category>
      <category><![CDATA[roundtable]]></category>
      <category><![CDATA[secure browser]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[software]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73639</guid>
      <description><![CDATA[The start of a new year is a good time to assess what&#8217;s important. We&#8217;ve gathered some Packet Protector listeners to talk about their security priorities for 2026 in a roundtable discussion with hosts JJ and Drew. We talk about key risks for 2026, whether those risks have changed since last year, use cases for<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp093-security-priorities-for-2026-a-roundtable-discussion/" title="ReadPP093: Security Priorities for 2026 &#8211; A Roundtable Discussion">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17258717/PP093.mp3" length="60368351" type="audio/mpeg"/>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Security Priorities for 2026 - A Roundtable Discussion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>1:02:53</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>The start of a new year is a good time to assess what’s important. We’ve gathered some Packet Protector listeners to talk about their security priorities for 2026 in a roundtable discussion with hos…</itunes:subtitle>
      <itunes:summary>The start of a new year is a good time to assess what&amp;#8217;s important. We&amp;#8217;ve gathered some Packet Protector listeners to talk about their security priorities for 2026 in a roundtable discussion with hosts JJ and Drew. We talk about key risks for 2026, whether those risks have changed since last year, use cases for&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp093-security-priorities-for-2026-a-roundtable-discussion/" title="ReadPP093: Security Priorities for 2026 &amp;#8211; A Roundtable Discussion"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP092: News Roundup–Old Gear Faces New Attacks, Cyber Trust Mark’s Trust Issues, Alarms Howl for Kimwolf Botnet</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp092-news-roundup-old-gear-faces-new-attacks-cyber-trust-marks-trust-issues-alarms-howl-for-kimwolf-botnet/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 13 Jan 2026 17:48:56 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[botnet]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[Cyber Trust Mark]]></category>
      <category><![CDATA[D-Link]]></category>
      <category><![CDATA[deepfake]]></category>
      <category><![CDATA[FCC]]></category>
      <category><![CDATA[Fortinet]]></category>
      <category><![CDATA[Forward Networks]]></category>
      <category><![CDATA[Grok]]></category>
      <category><![CDATA[npm]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[sexualized]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73552</guid>
      <description><![CDATA[Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp092-news-roundup-old-gear-faces-new-attacks-cyber-trust-marks-trust-issues-alarms-howl-for-kimwolf-botnet/" title="ReadPP092: News Roundup&#8211;Old Gear Faces New Attacks, Cyber Trust Mark&#8217;s Trust Issues, Alarms Howl for Kimwolf Botnet">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17252627/PP092.mp3" length="49785625" type="audio/mpeg"/>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>News Roundup--Old Gear Faces New Attacks, Cyber Trust Mark's Trust Issues, Alarms Howl for Kimwolf Botnet</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>51:52</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being…</itunes:subtitle>
      <itunes:summary>Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp092-news-roundup-old-gear-faces-new-attacks-cyber-trust-marks-trust-issues-alarms-howl-for-kimwolf-botnet/" title="ReadPP092: News Roundup&amp;#8211;Old Gear Faces New Attacks, Cyber Trust Mark&amp;#8217;s Trust Issues, Alarms Howl for Kimwolf Botnet"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP091: News Roundup–Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids’ Toys</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp091-news-roundup-securing-mcp-hunting-backdoors-and-getting-the-creeps-from-ai-kids-toys/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 16 Dec 2025 18:35:42 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[BRICKSTORM]]></category>
      <category><![CDATA[browser plug-ins]]></category>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[MCP]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[OWASP]]></category>
      <category><![CDATA[React2shell]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[spyware]]></category>
      <category><![CDATA[toilet camera]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73407</guid>
      <description><![CDATA[Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker&#8217;s pledge to follow<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp091-news-roundup-securing-mcp-hunting-backdoors-and-getting-the-creeps-from-ai-kids-toys/" title="ReadPP091: News Roundup&#8211;Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids&#8217; Toys">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17235736/PP091.mp3" length="51834461" type="audio/mpeg"/>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>News Roundup--Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids' Toys</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>54:00</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject…</itunes:subtitle>
      <itunes:summary>Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker&amp;#8217;s pledge to follow&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp091-news-roundup-securing-mcp-hunting-backdoors-and-getting-the-creeps-from-ai-kids-toys/" title="ReadPP091: News Roundup&amp;#8211;Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids&amp;#8217; Toys"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp090-why-native-controls-arent-enough-to-protect-your-cloud-workspaces-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 09 Dec 2025 18:41:53 +0000</pubDate>
      <category><![CDATA[Abhishek Agrawal]]></category>
      <category><![CDATA[data security]]></category>
      <category><![CDATA[file security]]></category>
      <category><![CDATA[Google Workspace]]></category>
      <category><![CDATA[Material Security]]></category>
      <category><![CDATA[Microsoft 365]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73274</guid>
      <description><![CDATA[Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspace, including email<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp090-why-native-controls-arent-enough-to-protect-your-cloud-workspaces-sponsored/" title="ReadPP090: Why Native Controls Aren&#8217;t Enough to Protect Your Cloud Workspaces (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17227993/PP090.mp3" length="44746291" type="audio/mpeg"/>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Why Native Controls Aren't Enough to Protect Your Cloud Workspaces (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>46:37</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive…</itunes:subtitle>
      <itunes:summary>Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspace, including email&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp090-why-native-controls-arent-enough-to-protect-your-cloud-workspaces-sponsored/" title="ReadPP090: Why Native Controls Aren&amp;#8217;t Enough to Protect Your Cloud Workspaces (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp089-hidden-wi-fi-misconfigurations-and-wi-fi-7-issues-to-be-aware-of/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 02 Dec 2025 19:54:07 +0000</pubDate>
      <category><![CDATA[EAP]]></category>
      <category><![CDATA[Forward Networks]]></category>
      <category><![CDATA[misconfigurations]]></category>
      <category><![CDATA[networking]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[RADIUS]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Wi-Fi 7]]></category>
      <category><![CDATA[WLPC]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73147</guid>
      <description><![CDATA[There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your WLAN less secure. Jennifer &#8220;JJ&#8221; Minella goes from Packet Protector co-host to guest as she discusses these issues with Drew Conry-Murray. This episode<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp089-hidden-wi-fi-misconfigurations-and-wi-fi-7-issues-to-be-aware-of/" title="ReadPP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17220995/PP089B.mp3" length="123087890" type="audio/mpeg"/>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>1:02:49</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your…</itunes:subtitle>
      <itunes:summary>There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your WLAN less secure. Jennifer &amp;#8220;JJ&amp;#8221; Minella goes from Packet Protector co-host to guest as she discusses these issues with Drew Conry-Murray. This episode&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp089-hidden-wi-fi-misconfigurations-and-wi-fi-7-issues-to-be-aware-of/" title="ReadPP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp088-how-fortinet-delivers-web-app-security-in-the-ai-era-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 25 Nov 2025 17:15:05 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[application security]]></category>
      <category><![CDATA[Ben Zilberman]]></category>
      <category><![CDATA[cybersecurity]]></category>
      <category><![CDATA[Fortinet]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[secure networking]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=73079</guid>
      <description><![CDATA[Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers of complexity<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp088-how-fortinet-delivers-web-app-security-in-the-ai-era-sponsored/" title="ReadPP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17216788/PP088.mp3" length="42746774" type="audio/mpeg"/>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>How Fortinet Delivers Web App Security in the AI Era (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:32</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be m…</itunes:subtitle>
      <itunes:summary>Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers of complexity&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp088-how-fortinet-delivers-web-app-security-in-the-ai-era-sponsored/" title="ReadPP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP087: Why SBOMs Are Cooler and More Useful Than You Think</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp087-why-sboms-are-cooler-and-more-useful-than-you-think/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 18 Nov 2025 15:05:51 +0000</pubDate>
      <category><![CDATA[cybersecurity]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[Natalie Somersall]]></category>
      <category><![CDATA[SBOM]]></category>
      <category><![CDATA[software bill of materials]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72981</guid>
      <description><![CDATA[Just what&#8217;s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp087-why-sboms-are-cooler-and-more-useful-than-you-think/" title="ReadPP087: Why SBOMs Are Cooler and More Useful Than You Think">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17211574/PP087.mp3" length="44287372" type="audio/mpeg"/>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Why SBOMs Are Cooler and More Useful Than You Think</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>46:08</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of M…</itunes:subtitle>
      <itunes:summary>Just what&amp;#8217;s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp087-why-sboms-are-cooler-and-more-useful-than-you-think/" title="ReadPP087: Why SBOMs Are Cooler and More Useful Than You Think"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp086-using-lets-encrypt-and-the-acme-protocol-for-domain-validation-certificates/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 11 Nov 2025 12:33:15 +0000</pubDate>
      <category><![CDATA[ACME protocol]]></category>
      <category><![CDATA[automation]]></category>
      <category><![CDATA[certificate authority]]></category>
      <category><![CDATA[certificates]]></category>
      <category><![CDATA[domain validation]]></category>
      <category><![CDATA[Ed Harmoush]]></category>
      <category><![CDATA[Let's Encrypt]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[RFC 8555]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72859</guid>
      <description><![CDATA[Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today&#8217;s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp086-using-lets-encrypt-and-the-acme-protocol-for-domain-validation-certificates/" title="ReadPP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17207170/PP86.mp3" length="107165684" type="audio/mpeg"/>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:39</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a d…</itunes:subtitle>
      <itunes:summary>Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today&amp;#8217;s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp086-using-lets-encrypt-and-the-acme-protocol-for-domain-validation-certificates/" title="ReadPP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp085-news-roundup-brickstorm-backdoor-targets-network-appliances-github-unveils-supply-chain-defense-plans/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Wed, 05 Nov 2025 15:34:53 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[BIND]]></category>
      <category><![CDATA[cache poisoning]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[DNS]]></category>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[geostationary]]></category>
      <category><![CDATA[Google]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[quantum]]></category>
      <category><![CDATA[satellite]]></category>
      <category><![CDATA[YouTube]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72790</guid>
      <description><![CDATA[Did you know college students are snooping on satellite transmissions? On today&#8217;s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp085-news-roundup-brickstorm-backdoor-targets-network-appliances-github-unveils-supply-chain-defense-plans/" title="ReadPP085: News Roundup &#8211; Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17203823/PP085.mp3" length="50373275" type="audio/mpeg"/>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>News Roundup - Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>52:28</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept t…</itunes:subtitle>
      <itunes:summary>Did you know college students are snooping on satellite transmissions? On today&amp;#8217;s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp085-news-roundup-brickstorm-backdoor-targets-network-appliances-github-unveils-supply-chain-defense-plans/" title="ReadPP085: News Roundup &amp;#8211; Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP084: Inside the CVE Process With Cisco (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp084-inside-the-cve-process-with-cisco-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Thu, 30 Oct 2025 16:43:46 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[bugs]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[CVE]]></category>
      <category><![CDATA[CVEs]]></category>
      <category><![CDATA[CVSS]]></category>
      <category><![CDATA[Marco Cassini]]></category>
      <category><![CDATA[Mitre]]></category>
      <category><![CDATA[NVD]]></category>
      <category><![CDATA[oe Malcolm]]></category>
      <category><![CDATA[Osman Hashmi]]></category>
      <category><![CDATA[PSIRT]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[software quality]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72596</guid>
      <description><![CDATA[CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp084-inside-the-cve-process-with-cisco-sponsored/" title="ReadPP084: Inside the CVE Process With Cisco (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17200060/PP084.mp3" length="107582240" type="audio/mpeg"/>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Inside the CVE Process With Cisco (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:50</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes…</itunes:subtitle>
      <itunes:summary>CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp084-inside-the-cve-process-with-cisco-sponsored/" title="ReadPP084: Inside the CVE Process With Cisco (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP083: A CISO’s Perspective on Model Context Protocol (MCP)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp083-a-cisos-perspective-on-model-context-protocol-mcp/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 21 Oct 2025 16:31:10 +0000</pubDate>
      <category><![CDATA[Agent Payments Protocol (AP2)]]></category>
      <category><![CDATA[Chuck Kesler]]></category>
      <category><![CDATA[CISO]]></category>
      <category><![CDATA[MCP (Model Context Protocol)]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72476</guid>
      <description><![CDATA[Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understand how<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp083-a-cisos-perspective-on-model-context-protocol-mcp/" title="ReadPP083: A CISO’s Perspective on Model Context Protocol (MCP)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17190643/PP083.mp3" length="42294124" type="audio/mpeg"/>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>A CISO’s Perspective on Model Context Protocol (MCP)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:03</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations…</itunes:subtitle>
      <itunes:summary>Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understand how&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp083-a-cisos-perspective-on-model-context-protocol-mcp/" title="ReadPP083: A CISO’s Perspective on Model Context Protocol (MCP)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp082-building-a-workable-mobile-security-strategy-in-a-world-of-risky-apps/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 14 Oct 2025 17:39:04 +0000</pubDate>
      <category><![CDATA[Akili Akridge]]></category>
      <category><![CDATA[BYOD]]></category>
      <category><![CDATA[jailbroken]]></category>
      <category><![CDATA[libraries]]></category>
      <category><![CDATA[lockdown]]></category>
      <category><![CDATA[MAST]]></category>
      <category><![CDATA[mobile]]></category>
      <category><![CDATA[risk management]]></category>
      <category><![CDATA[rooted]]></category>
      <category><![CDATA[smartphones]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72372</guid>
      <description><![CDATA[Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp082-building-a-workable-mobile-security-strategy-in-a-world-of-risky-apps/" title="ReadPP082: Building a Workable Mobile Security Strategy In a World of Risky Apps">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17185660/PP082.mp3" length="59533269" type="audio/mpeg"/>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Building a Workable Mobile Security Strategy In a World of Risky Apps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>1:02:01</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fo…</itunes:subtitle>
      <itunes:summary>Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp082-building-a-workable-mobile-security-strategy-in-a-world-of-risky-apps/" title="ReadPP082: Building a Workable Mobile Security Strategy In a World of Risky Apps"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp081-news-roundup-brickstorm-backdoor-targets-network-appliances-github-unveils-supply-chain-defense-plans/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 07 Oct 2025 16:14:29 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[exploits]]></category>
      <category><![CDATA[GitHub]]></category>
      <category><![CDATA[Google]]></category>
      <category><![CDATA[MCP server]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[npm]]></category>
      <category><![CDATA[packages]]></category>
      <category><![CDATA[Secret Service]]></category>
      <category><![CDATA[SIM farm]]></category>
      <category><![CDATA[SonicWall]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72275</guid>
      <description><![CDATA[From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub&#8217;s plans to harden npm packages.<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp081-news-roundup-brickstorm-backdoor-targets-network-appliances-github-unveils-supply-chain-defense-plans/" title="ReadPP081: News Roundup &#8211; BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17180817/PP081.mp3" length="46496286" type="audio/mpeg"/>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>News Roundup - BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>48:26</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against…</itunes:subtitle>
      <itunes:summary>From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub&amp;#8217;s plans to harden npm packages.&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp081-news-roundup-brickstorm-backdoor-targets-network-appliances-github-unveils-supply-chain-defense-plans/" title="ReadPP081: News Roundup &amp;#8211; BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP080: The State of OT Risks in 2025 (and What to Do About Them)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp080-the-state-of-ot-risks-in-2025-and-what-to-do-about-them/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 30 Sep 2025 16:44:54 +0000</pubDate>
      <category><![CDATA[asset inventory]]></category>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[cybersecurity]]></category>
      <category><![CDATA[Dragos]]></category>
      <category><![CDATA[Fortinet]]></category>
      <category><![CDATA[ICS]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[OT]]></category>
      <category><![CDATA[reports]]></category>
      <category><![CDATA[risk]]></category>
      <category><![CDATA[taxonomy]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72179</guid>
      <description><![CDATA[What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp080-the-state-of-ot-risks-in-2025-and-what-to-do-about-them/" title="ReadPP080: The State of OT Risks in 2025 (and What to Do About Them)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17174607/PP080.mp3" length="42750954" type="audio/mpeg"/>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>The State of OT Risks in 2025 (and What to Do About Them)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:32</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss…</itunes:subtitle>
      <itunes:summary>What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp080-the-state-of-ot-risks-in-2025-and-what-to-do-about-them/" title="ReadPP080: The State of OT Risks in 2025 (and What to Do About Them)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP079: Rethinking the Architecture of Microsegmentation</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp079-rethinking-the-architecture-of-microsegmentation/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 23 Sep 2025 15:32:33 +0000</pubDate>
      <category><![CDATA[Cloud Security Alliance]]></category>
      <category><![CDATA[CSA]]></category>
      <category><![CDATA[eBPF]]></category>
      <category><![CDATA[Meter]]></category>
      <category><![CDATA[microsegmentation]]></category>
      <category><![CDATA[Philip Griffiths]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[software defined perimeter]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[zero trust]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=72079</guid>
      <description><![CDATA[Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a working<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp079-rethinking-the-architecture-of-microsegmentation/" title="ReadPP079: Rethinking the Architecture of Microsegmentation">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17169077/PP079.mp3" length="55384188" type="audio/mpeg"/>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Rethinking the Architecture of Microsegmentation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>57:41</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just t…</itunes:subtitle>
      <itunes:summary>Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a working&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp079-rethinking-the-architecture-of-microsegmentation/" title="ReadPP079: Rethinking the Architecture of Microsegmentation"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP078: Using Free Tools for Detection Engineering</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp078-using-free-tools-for-detection-engineering/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 16 Sep 2025 16:34:37 +0000</pubDate>
      <category><![CDATA[IDS]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[log management]]></category>
      <category><![CDATA[Matt Gracie]]></category>
      <category><![CDATA[open source]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Security Onion]]></category>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Zeek]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71986</guid>
      <description><![CDATA[You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp078-using-free-tools-for-detection-engineering/" title="ReadPP078: Using Free Tools for Detection Engineering">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17161291/PP078.mp3" length="47440874" type="audio/mpeg"/>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Using Free Tools for Detection Engineering</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>49:25</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior…</itunes:subtitle>
      <itunes:summary>You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp078-using-free-tools-for-detection-engineering/" title="ReadPP078: Using Free Tools for Detection Engineering"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp077-news-roundup-drift-breach-has-long-reach-fcc-investigates-its-own-iot-security-program/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 09 Sep 2025 14:03:27 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[FCC]]></category>
      <category><![CDATA[Frostbyte 10]]></category>
      <category><![CDATA[ICS]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[kill switch]]></category>
      <category><![CDATA[OAuth]]></category>
      <category><![CDATA[Paragon]]></category>
      <category><![CDATA[Salesforce]]></category>
      <category><![CDATA[Salesloft]]></category>
      <category><![CDATA[ScreenConnect]]></category>
      <category><![CDATA[tokens]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71913</guid>
      <description><![CDATA[Is any publicity good publicity? On today&#8217;s News Roundup we talk about how Salesloft, which makes the Drift chat agent that&#8217;s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and Microsoft making<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp077-news-roundup-drift-breach-has-long-reach-fcc-investigates-its-own-iot-security-program/" title="ReadPP077: News Roundup&#8211;Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17140472/PP077.mp3" length="35843760" type="audio/mpeg"/>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>News Roundup--Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>37:20</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data bre…</itunes:subtitle>
      <itunes:summary>Is any publicity good publicity? On today&amp;#8217;s News Roundup we talk about how Salesloft, which makes the Drift chat agent that&amp;#8217;s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and Microsoft making&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp077-news-roundup-drift-breach-has-long-reach-fcc-investigates-its-own-iot-security-program/" title="ReadPP077: News Roundup&amp;#8211;Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP076: RF Risks and How to See Unseen Threats</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp076-rf-risks-and-how-to-see-unseen-threats/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 02 Sep 2025 17:17:27 +0000</pubDate>
      <category><![CDATA[Bluetooth]]></category>
      <category><![CDATA[Brett Walkenhorst]]></category>
      <category><![CDATA[radio frequencies]]></category>
      <category><![CDATA[RF]]></category>
      <category><![CDATA[SDR]]></category>
      <category><![CDATA[software-defined radio]]></category>
      <category><![CDATA[threats]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <category><![CDATA[WLAN]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71820</guid>
      <description><![CDATA[Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today&#8217;s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp076-rf-risks-and-how-to-see-unseen-threats/" title="ReadPP076: RF Risks and How to See Unseen Threats">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17134648/PP076.mp3" length="57565517" type="audio/mpeg"/>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>RF Risks and How to See Unseen Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>59:58</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have…</itunes:subtitle>
      <itunes:summary>Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today&amp;#8217;s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp076-rf-risks-and-how-to-see-unseen-threats/" title="ReadPP076: RF Risks and How to See Unseen Threats"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP075: Kernel Vs. User Mode In Endpoint Security Software</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp075-kernel-vs-user-mode-in-endpoint-security-software/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 19 Aug 2025 16:25:51 +0000</pubDate>
      <category><![CDATA[CrowdStrike]]></category>
      <category><![CDATA[Dan Massameno]]></category>
      <category><![CDATA[endpoint security]]></category>
      <category><![CDATA[kernel]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[operating system]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Windows]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71645</guid>
      <description><![CDATA[Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft&#8217;s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to talk about the role<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp075-kernel-vs-user-mode-in-endpoint-security-software/" title="ReadPP075: Kernel Vs. User Mode In Endpoint Security Software">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17122310/PP075.mp3" length="104754044" type="audio/mpeg"/>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Kernel Vs. User Mode In Endpoint Security Software</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>43:39</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running s…</itunes:subtitle>
      <itunes:summary>Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft&amp;#8217;s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to talk about the role&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp075-kernel-vs-user-mode-in-endpoint-security-software/" title="ReadPP075: Kernel Vs. User Mode In Endpoint Security Software"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP074: News Roundup – Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp074-news-roundup-microsoft-dumps-digital-escorts-palo-alto-bundles-billions-aboard-cyberark/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 12 Aug 2025 18:34:18 +0000</pubDate>
      <category><![CDATA[CyberArk]]></category>
      <category><![CDATA[digital escorts]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[National Guard]]></category>
      <category><![CDATA[North Korea]]></category>
      <category><![CDATA[Palo Alto Networks]]></category>
      <category><![CDATA[Scattered Spider]]></category>
      <category><![CDATA[SharePoint]]></category>
      <category><![CDATA[SonicWall]]></category>
      <category><![CDATA[TSMC]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71536</guid>
      <description><![CDATA[Packet Protector goes global for today&#8217;s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense&#8217;s cloud infrastructure (with the help of US &#8216;digital escorts&#8217;), Taiwanese chipmaker TSMC fires several employees over allegations of attempted theft of sensitive tech, an Arizona woman gets 8 years in prison<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp074-news-roundup-microsoft-dumps-digital-escorts-palo-alto-bundles-billions-aboard-cyberark/" title="ReadPP074: News Roundup &#8211; Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17118592/PP074.mp3" length="102213992" type="audio/mpeg"/>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:35</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Packet Protector goes global for today’s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense’s cloud infrastructure (with the he…</itunes:subtitle>
      <itunes:summary>Packet Protector goes global for today&amp;#8217;s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense&amp;#8217;s cloud infrastructure (with the help of US &amp;#8216;digital escorts&amp;#8217;), Taiwanese chipmaker TSMC fires several employees over allegations of attempted theft of sensitive tech, an Arizona woman gets 8 years in prison&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp074-news-roundup-microsoft-dumps-digital-escorts-palo-alto-bundles-billions-aboard-cyberark/" title="ReadPP074: News Roundup &amp;#8211; Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP073: Identify Yourself: Authentication From SAML to FIDO2</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp073-identify-yourself-authentication-from-saml-to-fido2/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 05 Aug 2025 19:50:32 +0000</pubDate>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[authorization]]></category>
      <category><![CDATA[FIDO2]]></category>
      <category><![CDATA[identity]]></category>
      <category><![CDATA[J Wolfgang Goerlich]]></category>
      <category><![CDATA[OAuth]]></category>
      <category><![CDATA[passkeys]]></category>
      <category><![CDATA[SAML]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71458</guid>
      <description><![CDATA[From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about authorization<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp073-identify-yourself-authentication-from-saml-to-fido2/" title="ReadPP073: Identify Yourself: Authentication From SAML to FIDO2">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17112019/PP073.mp3" length="96241268" type="audio/mpeg"/>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>Identify Yourself: Authentication From SAML to FIDO2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>40:06</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by th…</itunes:subtitle>
      <itunes:summary>From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about authorization&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp073-identify-yourself-authentication-from-saml-to-fido2/" title="ReadPP073: Identify Yourself: Authentication From SAML to FIDO2"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP072: Mobile Device Threat Management</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp072-mobile-device-threat-management/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 29 Jul 2025 18:53:08 +0000</pubDate>
      <category><![CDATA[Akili Akridge]]></category>
      <category><![CDATA[BYOD]]></category>
      <category><![CDATA[malware]]></category>
      <category><![CDATA[MAM]]></category>
      <category><![CDATA[MDM]]></category>
      <category><![CDATA[mobile device]]></category>
      <category><![CDATA[MTM]]></category>
      <category><![CDATA[Pegasus]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[spyware]]></category>
      <category><![CDATA[threat management]]></category>
      <category><![CDATA[threats]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71369</guid>
      <description><![CDATA[Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today&#8217;s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off suspects as a<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp072-mobile-device-threat-management/" title="ReadPP072: Mobile Device Threat Management">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17105920/PP072.mp3" length="113336768" type="audio/mpeg"/>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Mobile Device Threat Management </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>47:13</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s P…</itunes:subtitle>
      <itunes:summary>Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today&amp;#8217;s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off suspects as a&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp072-mobile-device-threat-management/" title="ReadPP072: Mobile Device Threat Management"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp071-sse-vendor-test-results-can-hpe-and-juniper-get-along/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 22 Jul 2025 19:14:03 +0000</pubDate>
      <category><![CDATA[acquisition]]></category>
      <category><![CDATA[Aruba]]></category>
      <category><![CDATA[CyberRatings]]></category>
      <category><![CDATA[HPE]]></category>
      <category><![CDATA[Juniper]]></category>
      <category><![CDATA[Mist]]></category>
      <category><![CDATA[SSE]]></category>
      <category><![CDATA[testing]]></category>
      <category><![CDATA[WLAN]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71264</guid>
      <description><![CDATA[CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp071-sse-vendor-test-results-can-hpe-and-juniper-get-along/" title="ReadPP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17101967/PP071.mp3" length="111198656" type="audio/mpeg"/>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>SSE Vendor Test Results; Can HPE and Juniper Get Along?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>46:20</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services.…</itunes:subtitle>
      <itunes:summary>CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp071-sse-vendor-test-results-can-hpe-and-juniper-get-along/" title="ReadPP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp070-news-roundup-scattered-spider-bites-msps-microsoft-rethinks-kernel-access-north-koreans-seem-good-at-their-illicit-jobs/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 15 Jul 2025 13:40:09 +0000</pubDate>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[DNA]]></category>
      <category><![CDATA[Google]]></category>
      <category><![CDATA[kernel]]></category>
      <category><![CDATA[LibreOffice]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[open source]]></category>
      <category><![CDATA[ransomware]]></category>
      <category><![CDATA[Scattered Spider]]></category>
      <category><![CDATA[Windows]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71122</guid>
      <description><![CDATA[There&#8217;s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleged operators of laptop farms that<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp070-news-roundup-scattered-spider-bites-msps-microsoft-rethinks-kernel-access-north-koreans-seem-good-at-their-illicit-jobs/" title="ReadPP070: News Roundup &#8211; Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17093705/PP070.mp3" length="105711392" type="audio/mpeg"/>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>News Roundup - Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:03</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows r…</itunes:subtitle>
      <itunes:summary>There&amp;#8217;s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleged operators of laptop farms that&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp070-news-roundup-scattered-spider-bites-msps-microsoft-rethinks-kernel-access-north-koreans-seem-good-at-their-illicit-jobs/" title="ReadPP070: News Roundup &amp;#8211; Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP069: A Quantum Primer: It’s More Than Cracking Crypto</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp069-a-quantum-primer-its-more-than-cracking-crypto/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 01 Jul 2025 18:51:12 +0000</pubDate>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[Johna Johnson]]></category>
      <category><![CDATA[key distribution]]></category>
      <category><![CDATA[PQE]]></category>
      <category><![CDATA[QKD]]></category>
      <category><![CDATA[quantum]]></category>
      <category><![CDATA[quantum computing]]></category>
      <category><![CDATA[qubits]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=71026</guid>
      <description><![CDATA[Quantum computing is here, and it&#8217;s being used for more than cracking encryption. On today&#8217;s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp069-a-quantum-primer-its-more-than-cracking-crypto/" title="ReadPP069: A Quantum Primer: It&#8217;s More Than Cracking Crypto">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17067353/PP069.mp3" length="100155224" type="audio/mpeg"/>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>A Quantum Primer: It's More Than Cracking Crypto</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>41:44</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for…</itunes:subtitle>
      <itunes:summary>Quantum computing is here, and it&amp;#8217;s being used for more than cracking encryption. On today&amp;#8217;s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp069-a-quantum-primer-its-more-than-cracking-crypto/" title="ReadPP069: A Quantum Primer: It&amp;#8217;s More Than Cracking Crypto"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP068: Common Kubernetes Risks and What to Do About Them</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp068-common-kubernetes-risks-and-what-to-do-about-them/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 24 Jun 2025 16:04:35 +0000</pubDate>
      <category><![CDATA[access management]]></category>
      <category><![CDATA[containers]]></category>
      <category><![CDATA[identity]]></category>
      <category><![CDATA[Kubernetes]]></category>
      <category><![CDATA[Natalie Somersall]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[service mesh]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70930</guid>
      <description><![CDATA[Today&#8217;s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp068-common-kubernetes-risks-and-what-to-do-about-them/" title="ReadPP068: Common Kubernetes Risks and What to Do About Them">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17062649/PP068.mp3" length="93970568" type="audio/mpeg"/>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Common Kubernetes Risks and What to Do About Them</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>39:09</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest o…</itunes:subtitle>
      <itunes:summary>Today&amp;#8217;s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp068-common-kubernetes-risks-and-what-to-do-about-them/" title="ReadPP068: Common Kubernetes Risks and What to Do About Them"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP067: Protecting Secrets With Vault and TruffleHog</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp067-protecting-secrets-with-vault-and-trufflehog/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 17 Jun 2025 19:11:55 +0000</pubDate>
      <category><![CDATA[AutoCon]]></category>
      <category><![CDATA[Git]]></category>
      <category><![CDATA[John Howard]]></category>
      <category><![CDATA[OpenBao]]></category>
      <category><![CDATA[secrets management]]></category>
      <category><![CDATA[TruffleHog]]></category>
      <category><![CDATA[Vault]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70847</guid>
      <description><![CDATA[Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don&#8217;t expose your privates. John discusses work he&#8217;s done to build an automated process in his organization for developers and<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp067-protecting-secrets-with-vault-and-trufflehog/" title="ReadPP067: Protecting Secrets With Vault and TruffleHog">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17058169/PP067.mp3" length="85401416" type="audio/mpeg"/>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Protecting Secrets With Vault and TruffleHog</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>35:35</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault a…</itunes:subtitle>
      <itunes:summary>Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don&amp;#8217;t expose your privates. John discusses work he&amp;#8217;s done to build an automated process in his organization for developers and&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp067-protecting-secrets-with-vault-and-trufflehog/" title="ReadPP067: Protecting Secrets With Vault and TruffleHog"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp066-news-roundup-nists-new-exploit-metric-windows-rdp-issues-compromised-routers-and-more/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 10 Jun 2025 16:49:04 +0000</pubDate>
      <category><![CDATA[backdoor]]></category>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[NIST]]></category>
      <category><![CDATA[PowerSchool]]></category>
      <category><![CDATA[routers]]></category>
      <category><![CDATA[Telemessage]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <category><![CDATA[Windows]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70734</guid>
      <description><![CDATA[Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from &#8220;unexplained communications equipment&#8221; being found in Chinese-made electrical equipment<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp066-news-roundup-nists-new-exploit-metric-windows-rdp-issues-compromised-routers-and-more/" title="ReadPP066: News Roundup &#8211; NIST&#8217;s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17048862/PP066.mp3" length="99762680" type="audio/mpeg"/>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>News Roundup - NIST's New Exploit Metric, Windows RDP Issues, Compromised Routers, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>41:34</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via…</itunes:subtitle>
      <itunes:summary>Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from &amp;#8220;unexplained communications equipment&amp;#8221; being found in Chinese-made electrical equipment&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp066-news-roundup-nists-new-exploit-metric-windows-rdp-issues-compromised-routers-and-more/" title="ReadPP066: News Roundup &amp;#8211; NIST&amp;#8217;s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP065: A Microsegmentation Overview</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp065-a-microsegmentation-overview/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 03 Jun 2025 16:41:47 +0000</pubDate>
      <category><![CDATA[LAN]]></category>
      <category><![CDATA[microsegmentation]]></category>
      <category><![CDATA[networking]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[workload microsegmentation]]></category>
      <category><![CDATA[zero trust]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70638</guid>
      <description><![CDATA[Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero trust strategy, and the product landscape. Episode Links:<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp065-a-microsegmentation-overview/" title="ReadPP065: A Microsegmentation Overview">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17044167/PP065.mp3" length="81076124" type="audio/mpeg"/>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>A Microsegmentation Overview</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>33:47</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and s…</itunes:subtitle>
      <itunes:summary>Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero trust strategy, and the product landscape. Episode Links:&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp065-a-microsegmentation-overview/" title="ReadPP065: A Microsegmentation Overview"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp064-how-aviatrix-tackles-multi-cloud-security-challenges-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 27 May 2025 08:47:49 +0000</pubDate>
      <category><![CDATA[agentic AI]]></category>
      <category><![CDATA[Aviatrix]]></category>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[Azure]]></category>
      <category><![CDATA[Cloud firewall]]></category>
      <category><![CDATA[copilot]]></category>
      <category><![CDATA[Equinix]]></category>
      <category><![CDATA[GCP]]></category>
      <category><![CDATA[Google]]></category>
      <category><![CDATA[HybridSDN]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[Oracle]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Traffic engineering]]></category>
      <category><![CDATA[VPC]]></category>
      <category><![CDATA[zero trust]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70538</guid>
      <description><![CDATA[Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today&#8217;s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp064-how-aviatrix-tackles-multi-cloud-security-challenges-sponsored/" title="ReadPP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17038847/PP064.mp3" length="102826820" type="audio/mpeg"/>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:51</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how A…</itunes:subtitle>
      <itunes:summary>Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today&amp;#8217;s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp064-how-aviatrix-tackles-multi-cloud-security-challenges-sponsored/" title="ReadPP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp063-wi-fi-security-and-ai-in-the-wlan-at-mobility-field-day/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 20 May 2025 20:23:13 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Mobility Field Day]]></category>
      <category><![CDATA[nac]]></category>
      <category><![CDATA[PSK]]></category>
      <category><![CDATA[SAE]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[wireless]]></category>
      <category><![CDATA[WLAN]]></category>
      <category><![CDATA[WPA3]]></category>
      <category><![CDATA[zero trust]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70461</guid>
      <description><![CDATA[Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss &#8220;secure by default&#8221; efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp063-wi-fi-security-and-ai-in-the-wlan-at-mobility-field-day/" title="ReadPP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17034805/PP063.mp3" length="127063280" type="audio/mpeg"/>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Wi-Fi Security and AI in the WLAN at Mobility Field Day</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>52:57</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC…</itunes:subtitle>
      <itunes:summary>Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss &amp;#8220;secure by default&amp;#8221; efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp063-wi-fi-security-and-ai-in-the-wlan-at-mobility-field-day/" title="ReadPP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP062: Hunting for Host Security and Performance Issues with Stratoshark</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp062-hunting-for-host-security-and-performance-issues-with-stratoshark/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 13 May 2025 16:03:13 +0000</pubDate>
      <category><![CDATA[Falco]]></category>
      <category><![CDATA[Gerald Combs]]></category>
      <category><![CDATA[kernel]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[NordLayer]]></category>
      <category><![CDATA[OS]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Stratoshark]]></category>
      <category><![CDATA[Sysdig]]></category>
      <category><![CDATA[system calls]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70342</guid>
      <description><![CDATA[Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today&#8217;s Packet Protector we talk with Gerald Combs of the Wireshark Foundation about<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp062-hunting-for-host-security-and-performance-issues-with-stratoshark/" title="ReadPP062: Hunting for Host Security and Performance Issues with Stratoshark">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17030030/PP062.mp3" length="80985296" type="audio/mpeg"/>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Hunting for Host Security and Performance Issues with Stratoshark</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>33:45</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and…</itunes:subtitle>
      <itunes:summary>Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today&amp;#8217;s Packet Protector we talk with Gerald Combs of the Wireshark Foundation about&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp062-hunting-for-host-security-and-performance-issues-with-stratoshark/" title="ReadPP062: Hunting for Host Security and Performance Issues with Stratoshark"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp061-comparing-breach-reports-rsac-2025-highlights-and-a-security-awareness-soapbox/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 06 May 2025 22:09:21 +0000</pubDate>
      <category><![CDATA[breach reports]]></category>
      <category><![CDATA[dwell time]]></category>
      <category><![CDATA[M-Trends]]></category>
      <category><![CDATA[Mandiant]]></category>
      <category><![CDATA[ransomware]]></category>
      <category><![CDATA[RSAC]]></category>
      <category><![CDATA[security awareness training]]></category>
      <category><![CDATA[Verizon DBIR]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70248</guid>
      <description><![CDATA[New breach reports show threat actor dwell times are dropping significantly. It&#8217;s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp061-comparing-breach-reports-rsac-2025-highlights-and-a-security-awareness-soapbox/" title="ReadPP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17023336/PP061.mp3" length="85440044" type="audio/mpeg"/>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>35:36</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of t…</itunes:subtitle>
      <itunes:summary>New breach reports show threat actor dwell times are dropping significantly. It&amp;#8217;s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp061-comparing-breach-reports-rsac-2025-highlights-and-a-security-awareness-soapbox/" title="ReadPP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP060: Subsea Cables and the Watery Risks to Critical Infrastructure</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp060-subsea-cables-and-the-watery-risks-to-critical-infrastructure/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 29 Apr 2025 21:53:30 +0000</pubDate>
      <category><![CDATA[Andy Champagne]]></category>
      <category><![CDATA[connectivity]]></category>
      <category><![CDATA[espionage]]></category>
      <category><![CDATA[national security]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[snooping]]></category>
      <category><![CDATA[submarine cables]]></category>
      <category><![CDATA[subsea cables]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70154</guid>
      <description><![CDATA[Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to travel hundreds<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp060-subsea-cables-and-the-watery-risks-to-critical-infrastructure/" title="ReadPP060: Subsea Cables and the Watery Risks to Critical Infrastructure">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17018733/PP060.mp3" length="107312888" type="audio/mpeg"/>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Subsea Cables and the Watery Risks to Critical Infrastructure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>44:43</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet…</itunes:subtitle>
      <itunes:summary>Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to travel hundreds&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp060-subsea-cables-and-the-watery-risks-to-critical-infrastructure/" title="ReadPP060: Subsea Cables and the Watery Risks to Critical Infrastructure"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp059-news-roundup-oracle-plays-breach-word-games-fast-flux-worries-cisa-ai-package-hallucinations-and-more/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 22 Apr 2025 18:35:59 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Chris Krebs]]></category>
      <category><![CDATA[fast flux]]></category>
      <category><![CDATA[Fortinet]]></category>
      <category><![CDATA[Ivanti]]></category>
      <category><![CDATA[news roundup]]></category>
      <category><![CDATA[package hallucinations]]></category>
      <category><![CDATA[ransomware]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=70020</guid>
      <description><![CDATA[Once a month, the Packet Protector podcast likes to see what&#8217;s going on out there via our news roundup. There&#8217;s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you&#8217;ve applied the patch for the original threat. Avanti VPNs<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp059-news-roundup-oracle-plays-breach-word-games-fast-flux-worries-cisa-ai-package-hallucinations-and-more/" title="ReadPP059: News Roundup &#8211; Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17012482/PP059.mp3" length="81956216" type="audio/mpeg"/>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>News Roundup - Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>34:09</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way …</itunes:subtitle>
      <itunes:summary>Once a month, the Packet Protector podcast likes to see what&amp;#8217;s going on out there via our news roundup. There&amp;#8217;s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you&amp;#8217;ve applied the patch for the original threat. Avanti VPNs&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp059-news-roundup-oracle-plays-breach-word-games-fast-flux-worries-cisa-ai-package-hallucinations-and-more/" title="ReadPP059: News Roundup &amp;#8211; Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP058: Network Discovery with NMAP: You’ve Got Swaptions</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp058-network-discovery-with-nmap-youve-got-swaptions/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 15 Apr 2025 16:06:55 +0000</pubDate>
      <category><![CDATA[Chris Greer]]></category>
      <category><![CDATA[fingerprinting]]></category>
      <category><![CDATA[NMAP]]></category>
      <category><![CDATA[packet analysis]]></category>
      <category><![CDATA[port scans]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[synack]]></category>
      <category><![CDATA[threat hunting]]></category>
      <category><![CDATA[Wireshark]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69910</guid>
      <description><![CDATA[We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term &#8220;swaptions&#8221; as we have some fun with NMAP terminology. He also gives details on how to<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp058-network-discovery-with-nmap-youve-got-swaptions/" title="ReadPP058: Network Discovery with NMAP: You’ve Got Swaptions">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17006679/PP058.mp3" length="108369416" type="audio/mpeg"/>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Network Discovery with NMAP: You’ve Got Swaptions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>45:09</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting wor…</itunes:subtitle>
      <itunes:summary>We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term &amp;#8220;swaptions&amp;#8221; as we have some fun with NMAP terminology. He also gives details on how to&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp058-network-discovery-with-nmap-youve-got-swaptions/" title="ReadPP058: Network Discovery with NMAP: You’ve Got Swaptions"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp057-behind-the-scenes-at-cisco-psirt-ai-cves-and-vex/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 08 Apr 2025 15:08:00 +0000</pubDate>
      <category><![CDATA[Armor Blox]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[Cognitive Security]]></category>
      <category><![CDATA[CVE]]></category>
      <category><![CDATA[Jaguar Tooth]]></category>
      <category><![CDATA[Omar Santos]]></category>
      <category><![CDATA[OpenEoX]]></category>
      <category><![CDATA[product security]]></category>
      <category><![CDATA[PSIRT]]></category>
      <category><![CDATA[VEX]]></category>
      <category><![CDATA[vulnerability management]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69786</guid>
      <description><![CDATA[Cisco Systems has a sprawling portfolio of home-grown and acquired products. What&#8217;s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp057-behind-the-scenes-at-cisco-psirt-ai-cves-and-vex/" title="ReadPP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17001456/PP057.mp3" length="130102364" type="audio/mpeg"/>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>54:13</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished E…</itunes:subtitle>
      <itunes:summary>Cisco Systems has a sprawling portfolio of home-grown and acquired products. What&amp;#8217;s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp057-behind-the-scenes-at-cisco-psirt-ai-cves-and-vex/" title="ReadPP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP056: Ask A CISO with Joe Evangelisto</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp056-ask-a-ciso-with-joe-evangelisto/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 01 Apr 2025 14:49:58 +0000</pubDate>
      <category><![CDATA[CISO]]></category>
      <category><![CDATA[Joe Evangelisto]]></category>
      <category><![CDATA[leadership]]></category>
      <category><![CDATA[professional development]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[SOC]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69711</guid>
      <description><![CDATA[On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp056-ask-a-ciso-with-joe-evangelisto/" title="ReadPP056: Ask A CISO with Joe Evangelisto">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16996468/PP056.mp3" length="92397260" type="audio/mpeg"/>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Ask A CISO with Joe Evangelisto</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>38:30</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, a…</itunes:subtitle>
      <itunes:summary>On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp056-ask-a-ciso-with-joe-evangelisto/" title="ReadPP056: Ask A CISO with Joe Evangelisto"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp055-news-roundup-botnet-targets-tp-link-threat-hunting-in-the-electric-grid-apple-vs-uk-snoops-and-more/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 25 Mar 2025 18:38:25 +0000</pubDate>
      <category><![CDATA[Apple]]></category>
      <category><![CDATA[CrowdStrike]]></category>
      <category><![CDATA[DDOS]]></category>
      <category><![CDATA[Juniper]]></category>
      <category><![CDATA[Medusa]]></category>
      <category><![CDATA[PowerSchool]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[TP-Link]]></category>
      <category><![CDATA[Volt Typhoon]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69598</guid>
      <description><![CDATA[This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant used in streaming devices,<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp055-news-roundup-botnet-targets-tp-link-threat-hunting-in-the-electric-grid-apple-vs-uk-snoops-and-more/" title="ReadPP055: News Roundup &#8211; BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16991496/PP055.mp3" length="92328356" type="audio/mpeg"/>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>News Roundup - BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>38:28</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors…</itunes:subtitle>
      <itunes:summary>This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant used in streaming devices,&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp055-news-roundup-botnet-targets-tp-link-threat-hunting-in-the-electric-grid-apple-vs-uk-snoops-and-more/" title="ReadPP055: News Roundup &amp;#8211; BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp054-understanding-wireguard-and-overlay-vpns-with-tom-lawrence/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 18 Mar 2025 14:16:25 +0000</pubDate>
      <category><![CDATA[IKE]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[IPsec]]></category>
      <category><![CDATA[Lawrence Systems]]></category>
      <category><![CDATA[OpenVPN]]></category>
      <category><![CDATA[overlay VPN]]></category>
      <category><![CDATA[personal VPN]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Tailscale]]></category>
      <category><![CDATA[Tom Lawrence]]></category>
      <category><![CDATA[Wireguard]]></category>
      <category><![CDATA[ZeroTier]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69510</guid>
      <description><![CDATA[WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard&#8217;s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of overlay VPNs<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp054-understanding-wireguard-and-overlay-vpns-with-tom-lawrence/" title="ReadPP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16985806/PP054.mp3" length="118029548" type="audio/mpeg"/>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Understanding WireGuard and Overlay VPNs with Tom Lawrence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>49:11</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s …</itunes:subtitle>
      <itunes:summary>WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard&amp;#8217;s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of overlay VPNs&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp054-understanding-wireguard-and-overlay-vpns-with-tom-lawrence/" title="ReadPP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp053-rethinking-secure-network-access-and-zero-trust-with-bowtie-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 11 Mar 2025 18:36:19 +0000</pubDate>
      <category><![CDATA[Bowtie]]></category>
      <category><![CDATA[SASE]]></category>
      <category><![CDATA[secure remote access]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[Wireguard]]></category>
      <category><![CDATA[zero trust]]></category>
      <category><![CDATA[zero trust network access]]></category>
      <category><![CDATA[ZTNA]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69414</guid>
      <description><![CDATA[On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp053-rethinking-secure-network-access-and-zero-trust-with-bowtie-sponsored/" title="ReadPP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/17009417/PP053B.mp3" length="83729088" type="audio/mpeg"/>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:47</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think aga…</itunes:subtitle>
      <itunes:summary>On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp053-rethinking-secure-network-access-and-zero-trust-with-bowtie-sponsored/" title="ReadPP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP052: The State of the Network Security Market In 2025</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp052-the-state-of-the-network-security-market-in-2025/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 04 Mar 2025 17:50:25 +0000</pubDate>
      <category><![CDATA[analyst]]></category>
      <category><![CDATA[Dell'Oro Group]]></category>
      <category><![CDATA[firewalls]]></category>
      <category><![CDATA[market size]]></category>
      <category><![CDATA[Mauricio Sanchez]]></category>
      <category><![CDATA[networking]]></category>
      <category><![CDATA[revenues]]></category>
      <category><![CDATA[SASE]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[SSE]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69301</guid>
      <description><![CDATA[How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He&#8217;s Sr. Director, Enterprise Security and Networking at the Dell&#8217;Oro Group, a<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp052-the-state-of-the-network-security-market-in-2025/" title="ReadPP052: The State of the Network Security Market In 2025">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16976330/PP052.mp3" length="97523300" type="audio/mpeg"/>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>The State of the Network Security Market In 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>40:38</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective…</itunes:subtitle>
      <itunes:summary>How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He&amp;#8217;s Sr. Director, Enterprise Security and Networking at the Dell&amp;#8217;Oro Group, a&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp052-the-state-of-the-network-security-market-in-2025/" title="ReadPP052: The State of the Network Security Market In 2025"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP051: Security Certifications From Beginner to Advanced</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp051-security-certifications-from-beginner-to-advanced/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 25 Feb 2025 19:02:06 +0000</pubDate>
      <category><![CDATA[career]]></category>
      <category><![CDATA[certifications]]></category>
      <category><![CDATA[cyber security]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69174</guid>
      <description><![CDATA[Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today&#8217;s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp051-security-certifications-from-beginner-to-advanced/" title="ReadPP051: Security Certifications From Beginner to Advanced">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16970936/PP051.mp3" length="88536548" type="audio/mpeg"/>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Security Certifications From Beginner to Advanced</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>36:53</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look a…</itunes:subtitle>
      <itunes:summary>Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today&amp;#8217;s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp051-security-certifications-from-beginner-to-advanced/" title="ReadPP051: Security Certifications From Beginner to Advanced"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP050: Understanding–and Protecting Yourself From–the Malware Economy</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp050-understanding-and-protecting-yourself-from-the-malware-economy/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 18 Feb 2025 21:28:52 +0000</pubDate>
      <category><![CDATA[infostealers]]></category>
      <category><![CDATA[Jake Williams]]></category>
      <category><![CDATA[malware]]></category>
      <category><![CDATA[ransomware]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[threat hunting]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=69030</guid>
      <description><![CDATA[There&#8217;s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today&#8217;s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and the most effective strategies<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp050-understanding-and-protecting-yourself-from-the-malware-economy/" title="ReadPP050: Understanding&#8211;and Protecting Yourself From&#8211;the Malware Economy">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16965841/PP050.mp3" length="102408176" type="audio/mpeg"/>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Understanding--and Protecting Yourself From--the Malware Economy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:40</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On t…</itunes:subtitle>
      <itunes:summary>There&amp;#8217;s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today&amp;#8217;s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and the most effective strategies&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp050-understanding-and-protecting-yourself-from-the-malware-economy/" title="ReadPP050: Understanding&amp;#8211;and Protecting Yourself From&amp;#8211;the Malware Economy"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP049: CSMM – A Practical Model for Improving Your Cloud Security</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp049-csmm-a-practical-model-for-improving-your-cloud-security/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 11 Feb 2025 18:32:52 +0000</pubDate>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[cloud]]></category>
      <category><![CDATA[Cloud Security Maturity Model]]></category>
      <category><![CDATA[CSMM]]></category>
      <category><![CDATA[Rich Mogull]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=68882</guid>
      <description><![CDATA[The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp049-csmm-a-practical-model-for-improving-your-cloud-security/" title="ReadPP049: CSMM &#8211; A Practical Model for Improving Your Cloud Security">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16960565/PP049.mp3" length="103015784" type="audio/mpeg"/>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>CSMM - A Practical Model for Improving Your Cloud Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:55</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and…</itunes:subtitle>
      <itunes:summary>The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp049-csmm-a-practical-model-for-improving-your-cloud-security/" title="ReadPP049: CSMM &amp;#8211; A Practical Model for Improving Your Cloud Security"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp048-news-roundup-5g-vulnerabilities-abound-csrb-disbanded-magic-packets-target-juniper-routers-and-more/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 04 Feb 2025 17:15:52 +0000</pubDate>
      <category><![CDATA[5G]]></category>
      <category><![CDATA[exploit]]></category>
      <category><![CDATA[Fortinet]]></category>
      <category><![CDATA[Juniper]]></category>
      <category><![CDATA[patch]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[vulnerability]]></category>
      <category><![CDATA[zero day]]></category>
      <category><![CDATA[Zyxel]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=68800</guid>
      <description><![CDATA[JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp048-news-roundup-5g-vulnerabilities-abound-csrb-disbanded-magic-packets-target-juniper-routers-and-more/" title="ReadPP048: News Roundup &#8211; 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16955167/PP048.mp3" length="93929852" type="audio/mpeg"/>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>News Roundup - 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>39:08</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US…</itunes:subtitle>
      <itunes:summary>JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp048-news-roundup-5g-vulnerabilities-abound-csrb-disbanded-magic-packets-target-juniper-routers-and-more/" title="ReadPP048: News Roundup &amp;#8211; 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp047-why-packet-analysis-and-wireshark-should-be-in-your-security-toolkit/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 28 Jan 2025 20:09:30 +0000</pubDate>
      <category><![CDATA[Chris Greer]]></category>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[incident response]]></category>
      <category><![CDATA[network performance]]></category>
      <category><![CDATA[packet analysis]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[SharkFest]]></category>
      <category><![CDATA[Stratoshark]]></category>
      <category><![CDATA[threat hunting]]></category>
      <category><![CDATA[Wireshark]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=66701</guid>
      <description><![CDATA[Don’t underestimate the value of packet analysis in your security strategy. And if you&#8217;re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, particularly in threat hunting<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp047-why-packet-analysis-and-wireshark-should-be-in-your-security-toolkit/" title="ReadPP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16950095/PP047.mp3" length="104102588" type="audio/mpeg"/>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>43:23</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris…</itunes:subtitle>
      <itunes:summary>Don’t underestimate the value of packet analysis in your security strategy. And if you&amp;#8217;re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, particularly in threat hunting&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp047-why-packet-analysis-and-wireshark-should-be-in-your-security-toolkit/" title="ReadPP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP046: IPv6 Security, Migration, and Adoption</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp046-ipv6-security-migration-and-adoption/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 21 Jan 2025 15:18:43 +0000</pubDate>
      <category><![CDATA[automation]]></category>
      <category><![CDATA[Ed Horley]]></category>
      <category><![CDATA[firewalls]]></category>
      <category><![CDATA[ipv4]]></category>
      <category><![CDATA[IPv6]]></category>
      <category><![CDATA[IPv6 migration]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[training]]></category>
      <category><![CDATA[vendor support]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=66555</guid>
      <description><![CDATA[You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn&#8217;t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp046-ipv6-security-migration-and-adoption/" title="ReadPP046: IPv6 Security, Migration, and Adoption">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16944466/PP046B.mp3" length="95267216" type="audio/mpeg"/>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>IPv6 Security, Migration, and Adoption</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>39:42</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general s…</itunes:subtitle>
      <itunes:summary>You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn&amp;#8217;t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp046-ipv6-security-migration-and-adoption/" title="ReadPP046: IPv6 Security, Migration, and Adoption"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp045-reducing-the-risk-of-compromised-digital-certificates-with-caa-and-certificate-transparency/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 14 Jan 2025 16:47:04 +0000</pubDate>
      <category><![CDATA[Certificate Authority Authorization]]></category>
      <category><![CDATA[Certificate Transparency]]></category>
      <category><![CDATA[DNS records]]></category>
      <category><![CDATA[Ed Harmoush]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[TLS certificate]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=66479</guid>
      <description><![CDATA[Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today&#8217;s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp045-reducing-the-risk-of-compromised-digital-certificates-with-caa-and-certificate-transparency/" title="ReadPP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16939997/PP045.mp3" length="75526220" type="audio/mpeg"/>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>31:28</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the v…</itunes:subtitle>
      <itunes:summary>Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today&amp;#8217;s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp045-reducing-the-risk-of-compromised-digital-certificates-with-caa-and-certificate-transparency/" title="ReadPP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP044: Optimizing Security and Performance with ADEM and App Acceleration (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp044-optimizing-security-and-performance-with-adem-and-app-acceleration-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 17 Dec 2024 15:27:02 +0000</pubDate>
      <category><![CDATA[ADEM]]></category>
      <category><![CDATA[app acceleration]]></category>
      <category><![CDATA[client]]></category>
      <category><![CDATA[digital experience]]></category>
      <category><![CDATA[endpoints]]></category>
      <category><![CDATA[Palo Alto Networks]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[sponsored]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=66278</guid>
      <description><![CDATA[Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path&#8212;including the home user network, first mile and last mile, and the WAN. On today&#8217;s Packet Protector, we learn how ADEM can complement your network and security efforts with<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp044-optimizing-security-and-performance-with-adem-and-app-acceleration-sponsored/" title="ReadPP044: Optimizing Security and Performance with ADEM and App Acceleration (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16923091/PP044.mp3" length="99645752" type="audio/mpeg"/>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Optimizing Security and Performance with ADEM &amp; App Acceleration (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>41:31</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data…</itunes:subtitle>
      <itunes:summary>Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path&amp;#8212;including the home user network, first mile and last mile, and the WAN. On today&amp;#8217;s Packet Protector, we learn how ADEM can complement your network and security efforts with&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp044-optimizing-security-and-performance-with-adem-and-app-acceleration-sponsored/" title="ReadPP044: Optimizing Security and Performance with ADEM and App Acceleration (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP043: The Perils and Perks of the CISO Track</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp043-the-perils-and-perks-of-the-ciso-track/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 10 Dec 2024 20:43:11 +0000</pubDate>
      <category><![CDATA[career]]></category>
      <category><![CDATA[CISO]]></category>
      <category><![CDATA[infosec]]></category>
      <category><![CDATA[leadership]]></category>
      <category><![CDATA[liability]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[training]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=66071</guid>
      <description><![CDATA[A Chief Information Security Officer (CISO) helps to architect and drive an organization&#8217;s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technical teams actually running security operations.<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp043-the-perils-and-perks-of-the-ciso-track/" title="ReadPP043: The Perils and Perks of the CISO Track">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16916551/PP043.mp3" length="95576240" type="audio/mpeg"/>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>The Perils and Perks of the CISO Track</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>39:49</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong c…</itunes:subtitle>
      <itunes:summary>A Chief Information Security Officer (CISO) helps to architect and drive an organization&amp;#8217;s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technical teams actually running security operations.&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp043-the-perils-and-perks-of-the-ciso-track/" title="ReadPP043: The Perils and Perks of the CISO Track"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP042: CISO Liability Insurance, A Seriously Dangerous Menu Hack, and more Security News</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp042-ciso-liability-insurance-a-seriously-dangerous-menu-hack-and-more-security-news/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 03 Dec 2024 17:42:39 +0000</pubDate>
      <category><![CDATA[CISO]]></category>
      <category><![CDATA[CVE]]></category>
      <category><![CDATA[hack]]></category>
      <category><![CDATA[insurance]]></category>
      <category><![CDATA[telecom]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=66004</guid>
      <description><![CDATA[Our monthly news roundup discusses liability insurance for CISOs (if you are one, you should get it), serious intrusions of US telecom companies by Chinese state actors (according to the FBI), and a novel attack that leapt across multiple Wi-Fi networks. We also discuss significant vulnerabilities affecting Palo Alto Networks&#8217; Expedition migration product, how fake<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp042-ciso-liability-insurance-a-seriously-dangerous-menu-hack-and-more-security-news/" title="ReadPP042: CISO Liability Insurance, A Seriously Dangerous Menu Hack, and more Security News">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16909813/PP042.mp3" length="64210304" type="audio/mpeg"/>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>CISO Liability Insurance, A Seriously Dangerous Menu Hack, and more Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>26:45</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Our monthly news roundup discusses liability insurance for CISOs (if you are one, you should get it), serious intrusions of US telecom companies by Chinese state actors (according to the FBI), and a…</itunes:subtitle>
      <itunes:summary>Our monthly news roundup discusses liability insurance for CISOs (if you are one, you should get it), serious intrusions of US telecom companies by Chinese state actors (according to the FBI), and a novel attack that leapt across multiple Wi-Fi networks. We also discuss significant vulnerabilities affecting Palo Alto Networks&amp;#8217; Expedition migration product, how fake&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp042-ciso-liability-insurance-a-seriously-dangerous-menu-hack-and-more-security-news/" title="ReadPP042: CISO Liability Insurance, A Seriously Dangerous Menu Hack, and more Security News"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP041: Cyber Insurance from a Policyholder Perspective</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp041-cyber-insurance-from-a-policyholder-perspective/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 26 Nov 2024 17:39:57 +0000</pubDate>
      <category><![CDATA[breach]]></category>
      <category><![CDATA[cyber insurance]]></category>
      <category><![CDATA[insurance]]></category>
      <category><![CDATA[risk management]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65940</guid>
      <description><![CDATA[Cyber insurance provides compensation if a company suffers financial loss due to a security incident such as a ransonware payment, costs of data recovery, legal expenses or fines, or damage to a company&#8217;s reputation. Today on the Packet Protector podcast, we discuss the ins and outs of cyber insurance with a policy holder. Joe Stern<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp041-cyber-insurance-from-a-policyholder-perspective/" title="ReadPP041: Cyber Insurance from a Policyholder Perspective">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16899231/PP041.mp3" length="59866220" type="audio/mpeg"/>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Cyber Insurance from a Policyholder Perspective</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>24:57</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Cyber insurance provides compensation if a company suffers financial loss due to a security incident such as a ransonware payment, costs of data recovery, legal expenses or fines, or damage to a…</itunes:subtitle>
      <itunes:summary>Cyber insurance provides compensation if a company suffers financial loss due to a security incident such as a ransonware payment, costs of data recovery, legal expenses or fines, or damage to a company&amp;#8217;s reputation. Today on the Packet Protector podcast, we discuss the ins and outs of cyber insurance with a policy holder. Joe Stern&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp041-cyber-insurance-from-a-policyholder-perspective/" title="ReadPP041: Cyber Insurance from a Policyholder Perspective"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP040: Personal Privacy Tools</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp040-personal-privacy-tools/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 19 Nov 2024 17:09:59 +0000</pubDate>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[end-to-end encryption]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Signal]]></category>
      <category><![CDATA[VPN]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65833</guid>
      <description><![CDATA[Surveillance is a fact of life with modern technology, be it corporate data harvesting or government snooping. If you&#8217;re thinking about personal privacy, today&#8217;s episode covers common tools for communication and Web browsing. We dig into the end-to-end encryption capabilities of the messaging tools Signal and WhatsApp, look at the capabilities and limits of the<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp040-personal-privacy-tools/" title="ReadPP040: Personal Privacy Tools">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16891018/PP040.mp3" length="77227940" type="audio/mpeg"/>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Personal Privacy Tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>32:11</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Surveillance is a fact of life with modern technology, be it corporate data harvesting or government snooping. If you’re thinking about personal privacy, today’s episode covers common tools for com…</itunes:subtitle>
      <itunes:summary>Surveillance is a fact of life with modern technology, be it corporate data harvesting or government snooping. If you&amp;#8217;re thinking about personal privacy, today&amp;#8217;s episode covers common tools for communication and Web browsing. We dig into the end-to-end encryption capabilities of the messaging tools Signal and WhatsApp, look at the capabilities and limits of the&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp040-personal-privacy-tools/" title="ReadPP040: Personal Privacy Tools"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP039: Securing Active Directory from a Pen Tester’s Perspective</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp039-securing-active-directory-from-a-pen-testers-perspective/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 12 Nov 2024 20:57:08 +0000</pubDate>
      <category><![CDATA[AD security]]></category>
      <category><![CDATA[ciscontrols]]></category>
      <category><![CDATA[directory security]]></category>
      <category><![CDATA[hardening]]></category>
      <category><![CDATA[ir]]></category>
      <category><![CDATA[kerberos]]></category>
      <category><![CDATA[nac]]></category>
      <category><![CDATA[network security]]></category>
      <category><![CDATA[ntlm]]></category>
      <category><![CDATA[pam]]></category>
      <category><![CDATA[pentesting]]></category>
      <category><![CDATA[pim]]></category>
      <category><![CDATA[privilege escalation]]></category>
      <category><![CDATA[social engineering]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65752</guid>
      <description><![CDATA[Microsoft&#8217;s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today&#8217;s Packet Protector, we talk with penetration tester and security consultant Eric Kuehn about how he approaches compromising AD/Entra ID, common problems he sees during client engagements, quick wins for administrators and security pros to fortify their<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp039-securing-active-directory-from-a-pen-testers-perspective/" title="ReadPP039: Securing Active Directory from a Pen Tester&#8217;s Perspective">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16884299/PP039.mp3" length="111853568" type="audio/mpeg"/>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Securing Active Directory from a Pen Tester's Perspective</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>46:36</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Microsoft’s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today’s Packet Protector, we talk with penetration tester and sec…</itunes:subtitle>
      <itunes:summary>Microsoft&amp;#8217;s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today&amp;#8217;s Packet Protector, we talk with penetration tester and security consultant Eric Kuehn about how he approaches compromising AD/Entra ID, common problems he sees during client engagements, quick wins for administrators and security pros to fortify their&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp039-securing-active-directory-from-a-pen-testers-perspective/" title="ReadPP039: Securing Active Directory from a Pen Tester&amp;#8217;s Perspective"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP038: A Peek Inside the Security Mind</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp038-a-peek-inside-the-security-mind/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 05 Nov 2024 18:59:49 +0000</pubDate>
      <category><![CDATA[burnout]]></category>
      <category><![CDATA[leadership]]></category>
      <category><![CDATA[professional development]]></category>
      <category><![CDATA[psychology]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Stacy Thayer]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65643</guid>
      <description><![CDATA[Security professionals often have an impulse to want to move on to the next new thing. While that can be helpful in a field that thrives on change, it can also make it hard to focus on routine tasks and mundane (yet essential) security controls and practices. Whether this impulse is due to varying degrees<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp038-a-peek-inside-the-security-mind/" title="ReadPP038: A Peek Inside the Security Mind">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16876038/PP038B.mp3" length="78125939" type="audio/mpeg"/>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title> A Peek Inside the Security Mind</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>39:59</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Security professionals often have an impulse to want to move on to the next new thing. While that can be helpful in a field that thrives on change, it can also make it hard to focus on routine tasks…</itunes:subtitle>
      <itunes:summary>Security professionals often have an impulse to want to move on to the next new thing. While that can be helpful in a field that thrives on change, it can also make it hard to focus on routine tasks and mundane (yet essential) security controls and practices. Whether this impulse is due to varying degrees&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp038-a-peek-inside-the-security-mind/" title="ReadPP038: A Peek Inside the Security Mind"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP037: From Supply Chain Security to Post-Quantum Cryptography – Live from XFD!</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp037-from-supply-chain-security-to-post-quantum-cryptography-live-from-xfd/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 29 Oct 2024 14:10:29 +0000</pubDate>
      <category><![CDATA[Citrix]]></category>
      <category><![CDATA[Dell]]></category>
      <category><![CDATA[DigiCert]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Security Field Day 12]]></category>
      <category><![CDATA[SonicWall]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65511</guid>
      <description><![CDATA[This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix. These presentations covered topics including digital certificate management, post-quantum cryptography, supply chain security, recovering from ransomware, Zero Trust Network Access (ZTNA), and Secure Service<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp037-from-supply-chain-security-to-post-quantum-cryptography-live-from-xfd/" title="ReadPP037: From Supply Chain Security to Post-Quantum Cryptography &#8211; Live from XFD!">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16868339/PP037.mp3" length="73894208" type="audio/mpeg"/>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>From Supply Chain Security to Post-Quantum Cryptography - Live from XFD!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>30:47</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix.…</itunes:subtitle>
      <itunes:summary>This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix. These presentations covered topics including digital certificate management, post-quantum cryptography, supply chain security, recovering from ransomware, Zero Trust Network Access (ZTNA), and Secure Service&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp037-from-supply-chain-security-to-post-quantum-cryptography-live-from-xfd/" title="ReadPP037: From Supply Chain Security to Post-Quantum Cryptography &amp;#8211; Live from XFD!"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP036: News Roundup – NIST Nixes Password Resets, Cargo Crane Espionage Risks, Municipal Govs Targeted, and More</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp036-news-roundup-nist-nixes-password-resets-cargo-crane-espionage-risks-municipal-govs-targeted-and-more/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 22 Oct 2024 17:40:36 +0000</pubDate>
      <category><![CDATA[cybersecurity]]></category>
      <category><![CDATA[homeland security]]></category>
      <category><![CDATA[HPE]]></category>
      <category><![CDATA[NIST]]></category>
      <category><![CDATA[podcast]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65415</guid>
      <description><![CDATA[Today&#8217;s Packet Protector rounds up recent security news, including revised password guidelines from NIST, a White House push to help fill infosec jobs, and potential espionage risks from Chinese-made cranes being used at US ports. We also cover a hospital data breach that leaked nude patient photos, discuss why municipal governments are rich targets for<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp036-news-roundup-nist-nixes-password-resets-cargo-crane-espionage-risks-municipal-govs-targeted-and-more/" title="ReadPP036: News Roundup &#8211; NIST Nixes Password Resets, Cargo Crane Espionage Risks, Municipal Govs Targeted, and More">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16862365/PP036.mp3" length="81804608" type="audio/mpeg"/>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>News Roundup - NIST Nixes Password Resets, Cargo Crane Espionage Risks, Municipal Govs Targeted, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>34:05</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today’s Packet Protector rounds up recent security news, including revised password guidelines from NIST, a White House push to help fill infosec jobs, and potential espionage risks from C…</itunes:subtitle>
      <itunes:summary>Today&amp;#8217;s Packet Protector rounds up recent security news, including revised password guidelines from NIST, a White House push to help fill infosec jobs, and potential espionage risks from Chinese-made cranes being used at US ports. We also cover a hospital data breach that leaked nude patient photos, discuss why municipal governments are rich targets for&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp036-news-roundup-nist-nixes-password-resets-cargo-crane-espionage-risks-municipal-govs-targeted-and-more/" title="ReadPP036: News Roundup &amp;#8211; NIST Nixes Password Resets, Cargo Crane Espionage Risks, Municipal Govs Targeted, and More"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP035: What IT Should Know About Securing Industrial Systems</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp035-what-it-should-know-about-securing-industrial-systems/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 15 Oct 2024 20:04:08 +0000</pubDate>
      <category><![CDATA[ICS]]></category>
      <category><![CDATA[IT]]></category>
      <category><![CDATA[Mike Holcomb]]></category>
      <category><![CDATA[NMAP]]></category>
      <category><![CDATA[OT]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Wireshark]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65333</guid>
      <description><![CDATA[Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today&#8217;s Packet Protector, guest Mike Holcomb demystifies ICS and OT for IT<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp035-what-it-should-know-about-securing-industrial-systems/" title="ReadPP035: What IT Should Know About Securing Industrial Systems">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16855343/PP035.mp3" length="114051968" type="audio/mpeg"/>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>What IT Should Know About Securing Industrial Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>47:31</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers,…</itunes:subtitle>
      <itunes:summary>Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today&amp;#8217;s Packet Protector, guest Mike Holcomb demystifies ICS and OT for IT&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp035-what-it-should-know-about-securing-industrial-systems/" title="ReadPP035: What IT Should Know About Securing Industrial Systems"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP034: Driving Security and Network Assurance with Juniper Networks (Sponsored)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp034-driving-security-and-network-assurance-with-juniper-networks-sponsored/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 08 Oct 2024 18:32:44 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Mike Spanbauer]]></category>
      <category><![CDATA[ML]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[sponsored]]></category>
      <category><![CDATA[ZTNA]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65228</guid>
      <description><![CDATA[Today on the Packet Protector podcast we talk with sponsor Juniper Networks about how to simplify the complexity that affects network and cybersecurity teams alike. From tool sprawl to floods of data, complexity bedevils operations and troubleshooting. We talk about what Juniper brings to the table for networking and security professionals to help them do<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp034-driving-security-and-network-assurance-with-juniper-networks-sponsored/" title="ReadPP034: Driving Security and Network Assurance with Juniper Networks (Sponsored)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16837225/PP034.mp3" length="88968128" type="audio/mpeg"/>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Driving Security and Network Assurance with Juniper Networks (Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>37:04</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today on the Packet Protector podcast we talk with sponsor Juniper Networks about how to simplify the complexity that affects network and cybersecurity teams alike. From tool sprawl to floods of…</itunes:subtitle>
      <itunes:summary>Today on the Packet Protector podcast we talk with sponsor Juniper Networks about how to simplify the complexity that affects network and cybersecurity teams alike. From tool sprawl to floods of data, complexity bedevils operations and troubleshooting. We talk about what Juniper brings to the table for networking and security professionals to help them do&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp034-driving-security-and-network-assurance-with-juniper-networks-sponsored/" title="ReadPP034: Driving Security and Network Assurance with Juniper Networks (Sponsored)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP033: AI and Machine Learning 101 for Cybersecurity</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp033-ai-and-machine-learning-101-for-cybersecurity/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 01 Oct 2024 17:59:40 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[cybersecurity]]></category>
      <category><![CDATA[Jeff Crume]]></category>
      <category><![CDATA[LLMs]]></category>
      <category><![CDATA[machine learning]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=65099</guid>
      <description><![CDATA[The terms &#8220;AI&#8221; and &#8220;machine learning (ML)&#8221; get thrown around pretty regularly in IT and cybersecurity. On today&#8217;s Packet Protector we get an introduction to AI and ML to help you ask the right questions when vendors tout their latest AI-infused products. Our guest is Jeff Crume, a distinguished engineer and cybersecurity architect at IBM.<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp033-ai-and-machine-learning-101-for-cybersecurity/" title="ReadPP033: AI and Machine Learning 101 for Cybersecurity">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16829588/PP033.mp3" length="33375152" type="audio/mpeg"/>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>AI and Machine Learning 101 for Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>46:21</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>The terms “AI” and “machine learning (ML)” get thrown around pretty regularly in IT and cybersecurity. On today’s Packet Protector we get an introduction to AI and ML to help you ask the right questi…</itunes:subtitle>
      <itunes:summary>The terms &amp;#8220;AI&amp;#8221; and &amp;#8220;machine learning (ML)&amp;#8221; get thrown around pretty regularly in IT and cybersecurity. On today&amp;#8217;s Packet Protector we get an introduction to AI and ML to help you ask the right questions when vendors tout their latest AI-infused products. Our guest is Jeff Crume, a distinguished engineer and cybersecurity architect at IBM.&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp033-ai-and-machine-learning-101-for-cybersecurity/" title="ReadPP033: AI and Machine Learning 101 for Cybersecurity"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP032: Unpacking RPKI for BGP Security</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp032-unpacking-rpki-for-bgp-security/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 24 Sep 2024 19:17:01 +0000</pubDate>
      <category><![CDATA[Akamai]]></category>
      <category><![CDATA[BGP]]></category>
      <category><![CDATA[DDOS]]></category>
      <category><![CDATA[government]]></category>
      <category><![CDATA[internet]]></category>
      <category><![CDATA[RIPE]]></category>
      <category><![CDATA[routing]]></category>
      <category><![CDATA[Russ White]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[White House]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64998</guid>
      <description><![CDATA[Today on Packet Protector we get into BGP security. BGP is an essential protocol for directing traffic across the Internet, but it wasn’t designed with bad actors in mind, not to mention plain old configuration mistakes. Without additional controls in place, BGP is susceptible to issues such as route leaks and route hijacks that can<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp032-unpacking-rpki-for-bgp-security/" title="ReadPP032: Unpacking RPKI for BGP Security">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16819615/PP032.mp3" length="88764608" type="audio/mpeg"/>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Unpacking RPKI for BGP Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>36:59</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today on Packet Protector we get into BGP security. BGP is an essential protocol for directing traffic across the Internet, but it wasn’t designed with bad actors in mind, not to mention plain old c…</itunes:subtitle>
      <itunes:summary>Today on Packet Protector we get into BGP security. BGP is an essential protocol for directing traffic across the Internet, but it wasn’t designed with bad actors in mind, not to mention plain old configuration mistakes. Without additional controls in place, BGP is susceptible to issues such as route leaks and route hijacks that can&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp032-unpacking-rpki-for-bgp-security/" title="ReadPP032: Unpacking RPKI for BGP Security"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP031: Cloud Firewall Architecture Essentials</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp031-cloud-firewall-architecture-essentials/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 17 Sep 2024 18:12:54 +0000</pubDate>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[cloud infrastructure]]></category>
      <category><![CDATA[cloud security]]></category>
      <category><![CDATA[firewall management]]></category>
      <category><![CDATA[Fortinet]]></category>
      <category><![CDATA[Juniper]]></category>
      <category><![CDATA[network automation]]></category>
      <category><![CDATA[network security]]></category>
      <category><![CDATA[Palo Alto Networks]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64895</guid>
      <description><![CDATA[Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’ll dive into what you need to know, including deployment options, the role of high availability in public cloud, selecting the right<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp031-cloud-firewall-architecture-essentials/" title="ReadPP031: Cloud Firewall Architecture Essentials">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16811457/PP031.mp3" length="80829248" type="audio/mpeg"/>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Cloud Firewall Architecture Essentials</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>33:41</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’…</itunes:subtitle>
      <itunes:summary>Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’ll dive into what you need to know, including deployment options, the role of high availability in public cloud, selecting the right&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp031-cloud-firewall-architecture-essentials/" title="ReadPP031: Cloud Firewall Architecture Essentials"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP030: Volt Typhoon On the Attack, Starlink Joins the Navy, and More Security News</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp030-volt-typhoon-on-the-attack-starlink-joins-the-navy-and-more-security-news/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 10 Sep 2024 18:13:33 +0000</pubDate>
      <category><![CDATA[CrowdStrike]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[SD-WAN]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Starlink]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64815</guid>
      <description><![CDATA[Today&#8217;s Packet Protector is an all-news episode. We cover the Volt Typhoon hacker group exploiting a zero-day in Versa Networks gear and a multitude of vulnerabilities in Zyxel network products. We also debate whether Microsoft&#8217;s endpoint security summit will be more than a public relations exercise, a serious backdoor in RFID cards used in offices<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp030-volt-typhoon-on-the-attack-starlink-joins-the-navy-and-more-security-news/" title="ReadPP030: Volt Typhoon On the Attack, Starlink Joins the Navy, and More Security News">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16802710/PP030.mp3" length="79784696" type="audio/mpeg"/>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Volt Typhoon On the Attack, Starlink Joins the Navy, and More Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>33:15</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today’s Packet Protector is an all-news episode. We cover the Volt Typhoon hacker group exploiting a zero-day in Versa Networks gear and a multitude of vulnerabilities in Zyxel network products. We a…</itunes:subtitle>
      <itunes:summary>Today&amp;#8217;s Packet Protector is an all-news episode. We cover the Volt Typhoon hacker group exploiting a zero-day in Versa Networks gear and a multitude of vulnerabilities in Zyxel network products. We also debate whether Microsoft&amp;#8217;s endpoint security summit will be more than a public relations exercise, a serious backdoor in RFID cards used in offices&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp030-volt-typhoon-on-the-attack-starlink-joins-the-navy-and-more-security-news/" title="ReadPP030: Volt Typhoon On the Attack, Starlink Joins the Navy, and More Security News"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP029: Translating Security Objectives into Business Outcomes</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp029-translating-security-objectives-into-business-outcomes/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 03 Sep 2024 14:36:32 +0000</pubDate>
      <category><![CDATA[business]]></category>
      <category><![CDATA[leadership]]></category>
      <category><![CDATA[persuasion]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64717</guid>
      <description><![CDATA[On today&#8217;s Packet Protector we talk about how to talk about security objectives in ways that resonate with business and non-technical leaders in your organization. Tying security objectives to business outcomes can help you maintain (or increase) budgets, build trust and credibility with executives, and better align your risk management efforts with the organization&#8217;s broader<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp029-translating-security-objectives-into-business-outcomes/" title="ReadPP029: Translating Security Objectives into Business Outcomes">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16791838/PP0029_Translating_Security_Objectives_to_Business_Outcomes.mp3" length="132885248" type="audio/mpeg"/>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Translating Security Objectives into Business Outcomes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>55:22</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>On today’s Packet Protector we talk about how to talk about security objectives in ways that resonate with business and non-technical leaders in your organization. Tying security objectives to b…</itunes:subtitle>
      <itunes:summary>On today&amp;#8217;s Packet Protector we talk about how to talk about security objectives in ways that resonate with business and non-technical leaders in your organization. Tying security objectives to business outcomes can help you maintain (or increase) budgets, build trust and credibility with executives, and better align your risk management efforts with the organization&amp;#8217;s broader&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp029-translating-security-objectives-into-business-outcomes/" title="ReadPP029: Translating Security Objectives into Business Outcomes"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP028: Can SecOps and NetOps Work Together?</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp028-can-secops-and-netops-work-together/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 27 Aug 2024 20:38:36 +0000</pubDate>
      <category><![CDATA[firewalls]]></category>
      <category><![CDATA[logs]]></category>
      <category><![CDATA[networking]]></category>
      <category><![CDATA[operations]]></category>
      <category><![CDATA[Scott Robohn]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64613</guid>
      <description><![CDATA[IT tends to divide itself by job function and technological specialization, especially as technology gets more complex. However, each IT domain is part of a larger system, and these systems require coordination and cooperation to operate effectively. On today&#8217;s Packet Protector we look at how and why Security Operations (SecOps) and Network Operations (NetOps) should<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp028-can-secops-and-netops-work-together/" title="ReadPP028: Can SecOps and NetOps Work Together?">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16785410/PP028C.mp3" length="98057057" type="audio/mpeg"/>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Can SecOps and NetOps Work Together?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>50:10</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>IT tends to divide itself by job function and technological specialization, especially as technology gets more complex. However, each IT domain is part of a larger system, and these systems require…</itunes:subtitle>
      <itunes:summary>IT tends to divide itself by job function and technological specialization, especially as technology gets more complex. However, each IT domain is part of a larger system, and these systems require coordination and cooperation to operate effectively. On today&amp;#8217;s Packet Protector we look at how and why Security Operations (SecOps) and Network Operations (NetOps) should&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp028-can-secops-and-netops-work-together/" title="ReadPP028: Can SecOps and NetOps Work Together?"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP027: How Wi-Fi Positioning Systems Enable Mass Surveillance</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp027-how-wi-fi-positioning-systems-enable-mass-surveillance/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 20 Aug 2024 16:37:55 +0000</pubDate>
      <category><![CDATA[Android]]></category>
      <category><![CDATA[Apple]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Starlink]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64527</guid>
      <description><![CDATA[Smartphones use Wi-Fi based Positioning Systems (WPSes) to collect data about nearby Wi-Fi access points and other wireless devices to help determine the phones&#8217; geographic location. Researchers at the University of Maryland show how WPSes from Apple and Google can be used for mass surveillance of access points and, potentially, owners and users of those<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp027-how-wi-fi-positioning-systems-enable-mass-surveillance/" title="ReadPP027: How Wi-Fi Positioning Systems Enable Mass Surveillance">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16776751/PP027.mp3" length="34381300" type="audio/mpeg"/>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>How Wi-Fi Positioning Systems Enable Mass Surveillance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>47:45</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Smartphones use Wi-Fi based Positioning Systems (WPSes) to collect data about nearby Wi-Fi access points and other wireless devices to help determine the phones’ geographic location. Researchers at t…</itunes:subtitle>
      <itunes:summary>Smartphones use Wi-Fi based Positioning Systems (WPSes) to collect data about nearby Wi-Fi access points and other wireless devices to help determine the phones&amp;#8217; geographic location. Researchers at the University of Maryland show how WPSes from Apple and Google can be used for mass surveillance of access points and, potentially, owners and users of those&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp027-how-wi-fi-positioning-systems-enable-mass-surveillance/" title="ReadPP027: How Wi-Fi Positioning Systems Enable Mass Surveillance"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP026: Security Considerations for Working from Anywhere</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp026-security-considerations-for-working-from-anywhere/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 13 Aug 2024 19:40:15 +0000</pubDate>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[red team]]></category>
      <category><![CDATA[remote work]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[VPN]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64467</guid>
      <description><![CDATA[Remote work is now a norm. And whether it&#8217;s a day or two at home every week, or relocating overseas so you can log in to the office from an Italian piazza or a beach in Thailand, there are lots of opportunities to do our jobs outside traditional workplaces. On today&#8217;s Packet Protector, we look<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp026-security-considerations-for-working-from-anywhere/" title="ReadPP026: Security Considerations for Working from Anywhere">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16769972/PP026.mp3" length="31260377" type="audio/mpeg"/>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>PP026: Security Considerations for Working from Anywhere</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>43:25</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Remote work is now a norm. And whether it’s a day or two at home every week, or relocating overseas so you can log in to the office from an Italian piazza or a beach in Thailand, there are lots of o…</itunes:subtitle>
      <itunes:summary>Remote work is now a norm. And whether it&amp;#8217;s a day or two at home every week, or relocating overseas so you can log in to the office from an Italian piazza or a beach in Thailand, there are lots of opportunities to do our jobs outside traditional workplaces. On today&amp;#8217;s Packet Protector, we look&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp026-security-considerations-for-working-from-anywhere/" title="ReadPP026: Security Considerations for Working from Anywhere"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP025: Wi-Fi Security Part 2 – Listener Q&amp;A</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp025-wi-fi-security-part-2-listener-qa/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 06 Aug 2024 18:43:23 +0000</pubDate>
      <category><![CDATA[networking]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Stephen Orr]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <category><![CDATA[Wi-Fi Alliance]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64390</guid>
      <description><![CDATA[On today&#8217;s Packet Protector we answer listener questions about Wi-Fi security with guest Stephen Orr. Stephen is Chair of the Security Technical Task Group for the Wi-Fi Alliance and a Distinguished Solutions Engineer at Cisco. Questions include what recommendations Stephen would make for using multiple SSIDs vs. role-based device segmentation, what he sees as the<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp025-wi-fi-security-part-2-listener-qa/" title="ReadPP025: Wi-Fi Security Part 2 &#8211; Listener Q&#038;A">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16763599/PP025.mp3" length="81222284" type="audio/mpeg"/>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>PP025: Wi-Fi Security Part 2 - Listener Q&amp;A</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>33:51</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>On today’s Packet Protector we answer listener questions about Wi-Fi security with guest Stephen Orr. Stephen is Chair of the Security Technical Task Group for the Wi-Fi Alliance and a Distinguished …</itunes:subtitle>
      <itunes:summary>On today&amp;#8217;s Packet Protector we answer listener questions about Wi-Fi security with guest Stephen Orr. Stephen is Chair of the Security Technical Task Group for the Wi-Fi Alliance and a Distinguished Solutions Engineer at Cisco. Questions include what recommendations Stephen would make for using multiple SSIDs vs. role-based device segmentation, what he sees as the&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp025-wi-fi-security-part-2-listener-qa/" title="ReadPP025: Wi-Fi Security Part 2 &amp;#8211; Listener Q&amp;#038;A"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP024: Considering Resiliency in a Time of Global Outages</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp024-considering-resiliency-in-a-time-of-global-outages/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 30 Jul 2024 21:12:51 +0000</pubDate>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[infrastructure]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[outage]]></category>
      <category><![CDATA[resiliency]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[Windows]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64268</guid>
      <description><![CDATA[In the wake of one of the largest global IT outages, resiliency is the theme of today&#8217;s show. We dig into the CrowdStrike debacle as well as an Azure outage that kinda flew under the radar. We also look at the Resiliency Planning Framework Playbook from CISA and other frameworks for building resilient infrastructure. We<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp024-considering-resiliency-in-a-time-of-global-outages/" title="ReadPP024: Considering Resiliency in a Time of Global Outages">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16757355/PP024B.mp3" length="27040824" type="audio/mpeg"/>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>PP024: Considering Resiliency in a Time of Global Outages</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>37:33</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>In the wake of one of the largest global IT outages, resiliency is the theme of today’s show. We dig into the CrowdStrike debacle as well as an Azure outage that kinda flew under the radar. We also l…</itunes:subtitle>
      <itunes:summary>In the wake of one of the largest global IT outages, resiliency is the theme of today&amp;#8217;s show. We dig into the CrowdStrike debacle as well as an Azure outage that kinda flew under the radar. We also look at the Resiliency Planning Framework Playbook from CISA and other frameworks for building resilient infrastructure. We&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp024-considering-resiliency-in-a-time-of-global-outages/" title="ReadPP024: Considering Resiliency in a Time of Global Outages"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP023: Wi-Fi Security Part 1 – Unpacking Vulnerabilities and Exploits</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp023-wi-fi-security-part-1-unpacking-vulnerabilities-and-exploits/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 23 Jul 2024 18:20:22 +0000</pubDate>
      <category><![CDATA[security]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64155</guid>
      <description><![CDATA[From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm. On today’s Packet Protector podcast we talk with Wi-Fi security expert Stephen Orr to get his take on the severity of these issues,<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp023-wi-fi-security-part-1-unpacking-vulnerabilities-and-exploits/" title="ReadPP023: Wi-Fi Security Part 1 &#8211; Unpacking Vulnerabilities and Exploits">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16751290/PP023_.mp3" length="31513594" type="audio/mpeg"/>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>PP023: Wi-Fi Security Part 1 - Unpacking Vulnerabilities and Exploits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>43:46</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm.…</itunes:subtitle>
      <itunes:summary>From an SSID confusion exploit to a RADIUS attack to a critical vulnerability in a Windows Wi-Fi driver, the past several months have seen multiple attacks and exploits targeting the wireless realm. On today’s Packet Protector podcast we talk with Wi-Fi security expert Stephen Orr to get his take on the severity of these issues,&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp023-wi-fi-security-part-1-unpacking-vulnerabilities-and-exploits/" title="ReadPP023: Wi-Fi Security Part 1 &amp;#8211; Unpacking Vulnerabilities and Exploits"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP022: Inside an Equipment Test Lab</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp022-inside-an-equipment-test-lab/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 09 Jul 2024 16:43:32 +0000</pubDate>
      <category><![CDATA[Android]]></category>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[CyberRatings]]></category>
      <category><![CDATA[DorothyEVader]]></category>
      <category><![CDATA[firewall]]></category>
      <category><![CDATA[Google]]></category>
      <category><![CDATA[Ixia]]></category>
      <category><![CDATA[Keysight]]></category>
      <category><![CDATA[labs]]></category>
      <category><![CDATA[midnightblizzard]]></category>
      <category><![CDATA[ngfw]]></category>
      <category><![CDATA[OpenSSH]]></category>
      <category><![CDATA[Palo Alto]]></category>
      <category><![CDATA[Pixel]]></category>
      <category><![CDATA[Qualys]]></category>
      <category><![CDATA[SASE]]></category>
      <category><![CDATA[SD-WAN]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[SSE]]></category>
      <category><![CDATA[supplychain]]></category>
      <category><![CDATA[teamviewer]]></category>
      <category><![CDATA[testing]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=64038</guid>
      <description><![CDATA[Third-party test labs can help buyers make decisions about which products to purchase. While a testing lab can’t mimic the conditions of your specific production environment, it can assess a product’s fundamental capabilities and measure throughput, performance, and–in the case of security devices–effectiveness against a test suite of malware or attack techniques. On today’s episode<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp022-inside-an-equipment-test-lab/" title="ReadPP022: Inside an Equipment Test Lab">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16738595/PP_0709_rev1.mp3" length="33973737" type="audio/mpeg"/>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>PP022: Inside an Equipment Test Lab</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>47:11</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Third-party test labs can help buyers make decisions about which products to purchase. While a testing lab can’t mimic the conditions of your specific production environment, it can assess a p…</itunes:subtitle>
      <itunes:summary>Third-party test labs can help buyers make decisions about which products to purchase. While a testing lab can’t mimic the conditions of your specific production environment, it can assess a product’s fundamental capabilities and measure throughput, performance, and–in the case of security devices–effectiveness against a test suite of malware or attack techniques. On today’s episode&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp022-inside-an-equipment-test-lab/" title="ReadPP022: Inside an Equipment Test Lab"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP021: Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp021-critical-vulnerabilities-ai-assisted-scams-compromised-vpns-and-more-security-news/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 02 Jul 2024 19:36:58 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[firewalls]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <category><![CDATA[zero trust]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63979</guid>
      <description><![CDATA[It&#8217;s an all-news episode for this week&#8217;s Packet Protector podcast. We cover critical vulnerabilities in the MOVEit file transfer software and in thousands of ASUS routers, and a remote code execution vulnerability in a Windows wireless driver that you really should patch. We discuss a Wall Street Journal article about how AI tools are helping<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp021-critical-vulnerabilities-ai-assisted-scams-compromised-vpns-and-more-security-news/" title="ReadPP021: Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16731741/PP_0702_No_Ads_.mp3" length="26420458" type="audio/mpeg"/>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>PP021: Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>36:42</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>It’s an all-news episode for this week’s Packet Protector podcast. We cover critical vulnerabilities in the MOVEit file transfer software and in thousands of ASUS routers, and a remote code exe…</itunes:subtitle>
      <itunes:summary>It&amp;#8217;s an all-news episode for this week&amp;#8217;s Packet Protector podcast. We cover critical vulnerabilities in the MOVEit file transfer software and in thousands of ASUS routers, and a remote code execution vulnerability in a Windows wireless driver that you really should patch. We discuss a Wall Street Journal article about how AI tools are helping&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp021-critical-vulnerabilities-ai-assisted-scams-compromised-vpns-and-more-security-news/" title="ReadPP021: Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP020: Dropping the SBOM: The Software Bill of Materials and Risk Management</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp020-dropping-the-sbom-the-software-bill-of-materials-and-risk-management/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 25 Jun 2024 18:33:29 +0000</pubDate>
      <category><![CDATA[firmware]]></category>
      <category><![CDATA[OWASP]]></category>
      <category><![CDATA[SaaS]]></category>
      <category><![CDATA[software]]></category>
      <category><![CDATA[supply chain]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63935</guid>
      <description><![CDATA[If you care about nutrition, you check the ingredients of your food. If you care about your IT infrastructure, you check the Software Bill of Materials (SBOM) of the tech. At least that’s the future that Thomas Pace hopes for. Right now, SBOMs aren’t super common and software transparency is very low. Thomas walks us<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp020-dropping-the-sbom-the-software-bill-of-materials-and-risk-management/" title="ReadPP020: Dropping the SBOM: The Software Bill of Materials and Risk Management">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16724729/PP020.mp3" length="25549379" type="audio/mpeg"/>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>PP020: Dropping the SBOM: The Software Bill of Materials and Risk Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>35:29</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>If you care about nutrition, you check the ingredients of your food. If you care about your IT infrastructure, you check the Software Bill of Materials (SBOM) of the tech. At least that’s the future …</itunes:subtitle>
      <itunes:summary>If you care about nutrition, you check the ingredients of your food. If you care about your IT infrastructure, you check the Software Bill of Materials (SBOM) of the tech. At least that’s the future that Thomas Pace hopes for. Right now, SBOMs aren’t super common and software transparency is very low. Thomas walks us&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp020-dropping-the-sbom-the-software-bill-of-materials-and-risk-management/" title="ReadPP020: Dropping the SBOM: The Software Bill of Materials and Risk Management"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP019: The God Accounts: Cloud IAM</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp019-the-god-accounts-cloud-iam/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 18 Jun 2024 16:08:07 +0000</pubDate>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[Azure]]></category>
      <category><![CDATA[Google]]></category>
      <category><![CDATA[identity]]></category>
      <category><![CDATA[public cloud]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63762</guid>
      <description><![CDATA[Today we discuss how to secure your all-powerful root accounts on the three major public cloud providers: AWS, Azure, and GCP. Our guests today, Ned Bellavance and Kyler Middleton from the Day Two Cloud podcast (soon to be Day Two DevOps podcast), describe the struggle of securely managing several root accounts at once. They take<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp019-the-god-accounts-cloud-iam/" title="ReadPP019: The God Accounts: Cloud IAM">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16718764/PP019.mp3" length="34166895" type="audio/mpeg"/>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>PP019: The God Accounts: Cloud IAM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today we discuss how to secure your all-powerful root accounts on the three major public cloud providers: AWS, Azure, and GCP. Our guests today, Ned Bellavance and Kyler Middleton from the Day Two…</itunes:subtitle>
      <itunes:summary>Today we discuss how to secure your all-powerful root accounts on the three major public cloud providers: AWS, Azure, and GCP. Our guests today, Ned Bellavance and Kyler Middleton from the Day Two Cloud podcast (soon to be Day Two DevOps podcast), describe the struggle of securely managing several root accounts at once. They take&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp019-the-god-accounts-cloud-iam/" title="ReadPP019: The God Accounts: Cloud IAM"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP018: RSA Recap, Including a View from the Event SOC</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp018-rsa-recap-including-a-view-from-the-event-soc/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 11 Jun 2024 17:50:18 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[backup]]></category>
      <category><![CDATA[microsegmentation]]></category>
      <category><![CDATA[VPN]]></category>
      <category><![CDATA[zero trust]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63673</guid>
      <description><![CDATA[Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and storage backups, and the not-so-surprising focus on IoT security and AI-assisted products. They also pull back the curtain on what the conference’s own SOC<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp018-rsa-recap-including-a-view-from-the-event-soc/" title="ReadPP018: RSA Recap, Including a View from the Event SOC">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16710960/PP018.mp3" length="27916911" type="audio/mpeg"/>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>PP018: RSA Recap, Including a View from the Event SOC </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>38:46</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and…</itunes:subtitle>
      <itunes:summary>Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and storage backups, and the not-so-surprising focus on IoT security and AI-assisted products. They also pull back the curtain on what the conference’s own SOC&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp018-rsa-recap-including-a-view-from-the-event-soc/" title="ReadPP018: RSA Recap, Including a View from the Event SOC"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP017: What’s the Matter? Understanding the Matter Protocol</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp017-whats-the-matter-understanding-the-matter-protocol/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 04 Jun 2024 15:44:48 +0000</pubDate>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[certificates]]></category>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[IP]]></category>
      <category><![CDATA[protocols]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63590</guid>
      <description><![CDATA[Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show today to walk us through this IP-based protocol for smart home devices. He compares Matter to an armored car, delivering a valuable payload securely<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp017-whats-the-matter-understanding-the-matter-protocol/" title="ReadPP017: What’s the Matter? Understanding the Matter Protocol">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16703551/PP017.mp3" length="5242880" type="audio/mpeg"/>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>PP017: What’s the Matter? Understanding the Matter Protocol</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show…</itunes:subtitle>
      <itunes:summary>Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show today to walk us through this IP-based protocol for smart home devices. He compares Matter to an armored car, delivering a valuable payload securely&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp017-whats-the-matter-understanding-the-matter-protocol/" title="ReadPP017: What’s the Matter? Understanding the Matter Protocol"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP016: Tabletop Security Exercises: D&amp;D for Grown-ups</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp016-tabletop-security-exercises-dd-for-grown-ups/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 28 May 2024 16:59:07 +0000</pubDate>
      <category><![CDATA[breach]]></category>
      <category><![CDATA[pen testing]]></category>
      <category><![CDATA[quantum]]></category>
      <category><![CDATA[ransomware]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63529</guid>
      <description><![CDATA[Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp016-tabletop-security-exercises-dd-for-grown-ups/" title="ReadPP016: Tabletop Security Exercises: D&#038;D for Grown-ups">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16697072/PP016.mp3" length="5242880" type="audio/mpeg"/>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>PP016: Tabletop Security Exercises: D&amp;D for Grown-ups</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise,…</itunes:subtitle>
      <itunes:summary>Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp016-tabletop-security-exercises-dd-for-grown-ups/" title="ReadPP016: Tabletop Security Exercises: D&amp;#038;D for Grown-ups"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp015-zero-trust-architecture-because-you-cant-trust-anybody-any-more/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 21 May 2024 20:32:42 +0000</pubDate>
      <category><![CDATA[access]]></category>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[remote access]]></category>
      <category><![CDATA[zero trust]]></category>
      <category><![CDATA[ZTNA]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63486</guid>
      <description><![CDATA[Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp015-zero-trust-architecture-because-you-cant-trust-anybody-any-more/" title="ReadPP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16689231/PP015.mp3" length="30345478" type="audio/mpeg"/>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>PP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:09</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security a…</itunes:subtitle>
      <itunes:summary>Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp015-zero-trust-architecture-because-you-cant-trust-anybody-any-more/" title="ReadPP015: Zero Trust Architecture: Because You Can’t Trust Anybody Any More"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP014: Good Threat Hunting</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp014-good-threat-hunting/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 14 May 2024 18:08:42 +0000</pubDate>
      <category><![CDATA[blue team]]></category>
      <category><![CDATA[logs]]></category>
      <category><![CDATA[monitoring]]></category>
      <category><![CDATA[purple team]]></category>
      <category><![CDATA[red team]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63413</guid>
      <description><![CDATA[Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&#038;D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp014-good-threat-hunting/" title="ReadPP014: Good Threat Hunting">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16681977/PP014.mp3" length="23776234" type="audio/mpeg"/>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>PP014: Good Threat Hunting</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>33:01</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&amp;D of detection engineering. A threat hun…</itunes:subtitle>
      <itunes:summary>Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&amp;#038;D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp014-good-threat-hunting/" title="ReadPP014: Good Threat Hunting"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP013: Untangling Managed Security Services</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp013-untangling-managed-security-services/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 07 May 2024 15:57:02 +0000</pubDate>
      <category><![CDATA[as-a-service]]></category>
      <category><![CDATA[cloud]]></category>
      <category><![CDATA[monitoring]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[service provider]]></category>
      <category><![CDATA[visibility]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63372</guid>
      <description><![CDATA[What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts in cybersecurity offerings. She explains what questions you should ask vendors to make sure you’re picking the right one for your needs; negotiating<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp013-untangling-managed-security-services/" title="ReadPP013: Untangling Managed Security Services">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16675509/PP013.mp3" length="30820925" type="audio/mpeg"/>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>PP013: Untangling Managed Security Services</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>42:48</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts …</itunes:subtitle>
      <itunes:summary>What’s the difference between cybersecurity “as a service” vs. “managed” vs. “hosted”? And what’s the difference between an MSP and an MSSP? In this episode, JJ helps untangle the terms and concepts in cybersecurity offerings. She explains what questions you should ask vendors to make sure you’re picking the right one for your needs; negotiating&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp013-untangling-managed-security-services/" title="ReadPP013: Untangling Managed Security Services"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP012: Planning for a Post Quantum Cryptography World</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp012-planning-for-a-post-quantum-cryptography-world/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 30 Apr 2024 19:17:26 +0000</pubDate>
      <category><![CDATA[Cisco]]></category>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[Palo Alto Networks]]></category>
      <category><![CDATA[quantum]]></category>
      <category><![CDATA[quantum computing]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63289</guid>
      <description><![CDATA[The classical encryption algorithms that currently undergird our IT infrastructure will be broken once there’s a powerful and stable enough quantum computer to do the job. Quantum-resistant algorithms are being developed by NIST, but implementation and deployment of these algorithms still have to be addressed. So what does all this mean for busy IT and<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp012-planning-for-a-post-quantum-cryptography-world/" title="ReadPP012: Planning for a Post Quantum Cryptography World">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16668901/PP012.mp3" length="29495683" type="audio/mpeg"/>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>PP012: Planning for a Post Quantum Cryptography World</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>40:58</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>The classical encryption algorithms that currently undergird our IT infrastructure will be broken once there’s a powerful and stable enough quantum computer to do the job. Quantum-resistant a…</itunes:subtitle>
      <itunes:summary>The classical encryption algorithms that currently undergird our IT infrastructure will be broken once there’s a powerful and stable enough quantum computer to do the job. Quantum-resistant algorithms are being developed by NIST, but implementation and deployment of these algorithms still have to be addressed. So what does all this mean for busy IT and&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp012-planning-for-a-post-quantum-cryptography-world/" title="ReadPP012: Planning for a Post Quantum Cryptography World"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP011: IoT Protocols: Detection and Protection</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp011-iot-protocols-detection-and-protection/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 23 Apr 2024 20:28:24 +0000</pubDate>
      <category><![CDATA[bandwidth]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[IPv6]]></category>
      <category><![CDATA[protocols]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <category><![CDATA[wireless]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63219</guid>
      <description><![CDATA[IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp011-iot-protocols-detection-and-protection/" title="ReadPP011: IoT Protocols: Detection and Protection">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16661934/PP011.mp3" length="33718679" type="audio/mpeg"/>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PP011: IoT Protocols: Detection and Protection  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>46:50</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins t…</itunes:subtitle>
      <itunes:summary>IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp011-iot-protocols-detection-and-protection/" title="ReadPP011: IoT Protocols: Detection and Protection"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP010: CISA’s Cyber Incident Reporting Law: What You Need to Know</title>
      <link>https://packetpushers.net/podcasts/packet-protector/p010-cisas-cyber-incident-reporting-law-what-you-need-to-know/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 16 Apr 2024 15:08:14 +0000</pubDate>
      <category><![CDATA[breach]]></category>
      <category><![CDATA[DDOS]]></category>
      <category><![CDATA[government]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63143</guid>
      <description><![CDATA[The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/p010-cisas-cyber-incident-reporting-law-what-you-need-to-know/" title="ReadPP010: CISA’s Cyber Incident Reporting Law: What You Need to Know">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16651836/PP010.mp3" length="26968834" type="audio/mpeg"/>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>PP010: CISA’s Cyber Incident Reporting Law: What You Need to Know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>37:27</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical I…</itunes:subtitle>
      <itunes:summary>The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/p010-cisas-cyber-incident-reporting-law-what-you-need-to-know/" title="ReadPP010: CISA’s Cyber Incident Reporting Law: What You Need to Know"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP009: Don’t Forget the Firmware</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp009-dont-forget-the-firmware/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 09 Apr 2024 20:08:34 +0000</pubDate>
      <category><![CDATA[hardware]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[supply chain]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=63063</guid>
      <description><![CDATA[If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp009-dont-forget-the-firmware/" title="ReadPP009: Don’t Forget the Firmware">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16645755/PP009.mp3" length="30048441" type="audio/mpeg"/>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>PP009: Don’t Forget the Firmware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>41:44</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and fo…</itunes:subtitle>
      <itunes:summary>If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp009-dont-forget-the-firmware/" title="ReadPP009: Don’t Forget the Firmware"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP008: Dishin’ Up Cloud SLAW (Security Lab A Week)</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp008-dishin-up-cloud-slaw-security-lab-a-week/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 02 Apr 2024 19:54:15 +0000</pubDate>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[cloud]]></category>
      <category><![CDATA[labs]]></category>
      <category><![CDATA[public cloud]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62991</guid>
      <description><![CDATA[Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he emails subscribers a new hands-on lab, building a full enterprise deployment week-by-week, step-by-step. Rich explains all the details to JJ and Drew including the cost<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp008-dishin-up-cloud-slaw-security-lab-a-week/" title="ReadPP008: Dishin’ Up Cloud SLAW (Security Lab A Week)">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16638770/PP008.mp3" length="5242880" type="audio/mpeg"/>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>PP008: Dishin’ Up Cloud SLAW (Security Lab A Week)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he e…</itunes:subtitle>
      <itunes:summary>Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he emails subscribers a new hands-on lab, building a full enterprise deployment week-by-week, step-by-step. Rich explains all the details to JJ and Drew including the cost&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp008-dishin-up-cloud-slaw-security-lab-a-week/" title="ReadPP008: Dishin’ Up Cloud SLAW (Security Lab A Week)"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP007: IPv6 Security Essentials</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp007-ipv6-security-essentials/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 26 Mar 2024 14:57:00 +0000</pubDate>
      <category><![CDATA[addressing]]></category>
      <category><![CDATA[firewall]]></category>
      <category><![CDATA[ipv4]]></category>
      <category><![CDATA[IPv6]]></category>
      <category><![CDATA[remote access]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62887</guid>
      <description><![CDATA[You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So let’s stop trying to disable it whack-a-mole style, and start<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp007-ipv6-security-essentials/" title="ReadPP007: IPv6 Security Essentials">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16631983/PP007.mp3" length="76495195" type="audio/mpeg"/>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>PP007: IPv6 Security Essentials</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>53:04</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mob…</itunes:subtitle>
      <itunes:summary>You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So let’s stop trying to disable it whack-a-mole style, and start&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp007-ipv6-security-essentials/" title="ReadPP007: IPv6 Security Essentials"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP006: Effective Security for Small IT Shops</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp006-effective-security-for-small-it-shops/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 19 Mar 2024 14:17:24 +0000</pubDate>
      <category><![CDATA[authentication]]></category>
      <category><![CDATA[firewall]]></category>
      <category><![CDATA[IT]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62808</guid>
      <description><![CDATA[This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern has been filling this role for an 80-person company for almost 30 years. We talk about how he prioritizes risks, security tools<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp006-effective-security-for-small-it-shops/" title="ReadPP006: Effective Security for Small IT Shops">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16624577/PP006.mp3" length="70888018" type="audio/mpeg"/>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>PP006: Effective Security for Small IT Shops</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>49:11</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern ha…</itunes:subtitle>
      <itunes:summary>This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern has been filling this role for an 80-person company for almost 30 years. We talk about how he prioritizes risks, security tools&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp006-effective-security-for-small-it-shops/" title="ReadPP006: Effective Security for Small IT Shops"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp005-red-blue-purple-choosing-the-right-teams-for-security-testing-and-defense/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 12 Mar 2024 19:31:52 +0000</pubDate>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[management]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[user experience]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62684</guid>
      <description><![CDATA[According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp005-red-blue-purple-choosing-the-right-teams-for-security-testing-and-defense/" title="ReadPP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16611140/PP005.mp3" length="31241284" type="audio/mpeg"/>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>43:23</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security…</itunes:subtitle>
      <itunes:summary>According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp005-red-blue-purple-choosing-the-right-teams-for-security-testing-and-defense/" title="ReadPP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP004: Exploiting Vulnerabilities, Not Customers: How to Pick Good Pen Testers</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp004-exploiting-vulnerabilities-not-customers-how-to-pick-good-pen-testers/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 05 Mar 2024 15:47:49 +0000</pubDate>
      <category><![CDATA[open source]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[testing]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62618</guid>
      <description><![CDATA[When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS course creator, and OWASP board member Kevin Johnson joins the show to share tips for what to look for in<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp004-exploiting-vulnerabilities-not-customers-how-to-pick-good-pen-testers/" title="ReadPP004: Exploiting Vulnerabilities, Not Customers: How to Pick Good Pen Testers">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16602292/PP_004.mp3" length="35626727" type="audio/mpeg"/>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>PP004: Exploiting Vulnerabilities, Not Customers: How to Pick Good Pen Testers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>49:29</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS …</itunes:subtitle>
      <itunes:summary>When you’re picking a penetration tester to poke at your security infrastructure, how do you know if you’re picking a good one? Is pen testing even the right service for your needs? Pen tester, SANS course creator, and OWASP board member Kevin Johnson joins the show to share tips for what to look for in&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp004-exploiting-vulnerabilities-not-customers-how-to-pick-good-pen-testers/" title="ReadPP004: Exploiting Vulnerabilities, Not Customers: How to Pick Good Pen Testers"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP003: An Insider’s Look At Security Certs</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp003-an-insiders-look-at-security-certs/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 27 Feb 2024 14:36:55 +0000</pubDate>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[certification]]></category>
      <category><![CDATA[cloud]]></category>
      <category><![CDATA[security]]></category>
      <category><![CDATA[vulnerabilities]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62563</guid>
      <description><![CDATA[What are the best cybersecurity certs to get? Do advancements in cloud and AI mean security professionals need to re-skill? How do certifying organizations decide what new courses to create? Chief Curriculum Director and Faculty Lead at the SANS Institute, Rob Lee, joins Jennifer “JJ” Minella and Drew Conry-Murray to give an insider’s view on<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp003-an-insiders-look-at-security-certs/" title="ReadPP003: An Insider’s Look At Security Certs">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16594419/PP003.mp3" length="78245274" type="audio/mpeg"/>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>PP003: An Insider’s Look At Security Certs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>54:17</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>What are the best cybersecurity certs to get? Do advancements in cloud and AI mean security professionals need to re-skill? How do certifying organizations decide what new courses to create? Chief…</itunes:subtitle>
      <itunes:summary>What are the best cybersecurity certs to get? Do advancements in cloud and AI mean security professionals need to re-skill? How do certifying organizations decide what new courses to create? Chief Curriculum Director and Faculty Lead at the SANS Institute, Rob Lee, joins Jennifer “JJ” Minella and Drew Conry-Murray to give an insider’s view on&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp003-an-insiders-look-at-security-certs/" title="ReadPP003: An Insider’s Look At Security Certs"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP002: The Tricky Biz Of Secrets Management</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp002-the-tricky-biz-of-secrets-management/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 20 Feb 2024 15:08:41 +0000</pubDate>
      <category><![CDATA[access]]></category>
      <category><![CDATA[API]]></category>
      <category><![CDATA[certificates]]></category>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62434</guid>
      <description><![CDATA[Today we look at secrets management and privileged access management from the perspective of a network engineer. How do you and your team securely store sensitive data including passwords, SSH keys, API keys, and private certificate keys, while still being able to work nimbly? What Privileged Access Management (PAM) practices can help put guardrails in<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp002-the-tricky-biz-of-secrets-management/" title="ReadPP002: The Tricky Biz Of Secrets Management">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16584641/PP_002.mp3" length="53241428" type="audio/mpeg"/>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>P002: The Tricky Biz Of Secrets Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>36:58</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Today we look at secrets management and privileged access management from the perspective of a network engineer. How do you and your team securely store sensitive data including passwords, SSH keys,…</itunes:subtitle>
      <itunes:summary>Today we look at secrets management and privileged access management from the perspective of a network engineer. How do you and your team securely store sensitive data including passwords, SSH keys, API keys, and private certificate keys, while still being able to work nimbly? What Privileged Access Management (PAM) practices can help put guardrails in&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp002-the-tricky-biz-of-secrets-management/" title="ReadPP002: The Tricky Biz Of Secrets Management"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>PP001: WPA3: Everything You Wanted To Know But Were Afraid To Ask</title>
      <link>https://packetpushers.net/podcasts/packet-protector/pp001-wpa3-everything-you-wanted-to-know-but-were-afraid-to-ask/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Tue, 13 Feb 2024 22:45:21 +0000</pubDate>
      <category><![CDATA[encryption]]></category>
      <category><![CDATA[HPE]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[Juniper]]></category>
      <category><![CDATA[Microsoft]]></category>
      <category><![CDATA[Wi-Fi]]></category>
      <category><![CDATA[WLAN]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62351</guid>
      <description><![CDATA[It’s time to make the switch from WPA2 to WPA3. We cover how to do it and what migration challenges to be prepared for no matter what WLAN you are dealing with (open, passphrase, or 802.1x) . We also discuss what features make WPA3 an improvement over WPA2, particularly the replacement of PSK with SAE.<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp001-wpa3-everything-you-wanted-to-know-but-were-afraid-to-ask/" title="ReadPP001: WPA3: Everything You Wanted To Know But Were Afraid To Ask">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16576513/PP001.mp3" length="30700502" type="audio/mpeg"/>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>WPA3: Everything You Wanted To Know But Were Afraid To Ask</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>31:59</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>It’s time to make the switch from WPA2 to WPA3. We cover how to do it and what migration challenges to be prepared for no matter what WLAN you are dealing with (open, passphrase, or 802.1x) . We a…</itunes:subtitle>
      <itunes:summary>It’s time to make the switch from WPA2 to WPA3. We cover how to do it and what migration challenges to be prepared for no matter what WLAN you are dealing with (open, passphrase, or 802.1x) . We also discuss what features make WPA3 an improvement over WPA2, particularly the replacement of PSK with SAE.&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/pp001-wpa3-everything-you-wanted-to-know-but-were-afraid-to-ask/" title="ReadPP001: WPA3: Everything You Wanted To Know But Were Afraid To Ask"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
    <item>
      <title>Join Us For Packet Protector, A New Cybersecurity Podcast</title>
      <link>https://packetpushers.net/podcasts/packet-protector/join-us-for-packet-protector-a-new-cybersecurity-podcast/</link>
      <dc:creator>Packet Pushers</dc:creator>
      <pubDate>Fri, 02 Feb 2024 20:32:07 +0000</pubDate>
      <category><![CDATA[security]]></category>
      <guid isPermaLink="false">https://packetpushers.net/?post_type=podcast&amp;p=62076</guid>
      <description><![CDATA[Hi, I&#8217;m Jennifer Minella and I&#8217;m excited to finally share with you all that I&#8217;ll be co-hosting a new podcast on the Packet Pushers network. It&#8217;s called Pocket Protector, a podcast exploring the intersection of networking and security. Each week, we&#8217;re drilling into topics, from wired and wireless network security to access control and zero<a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/join-us-for-packet-protector-a-new-cybersecurity-podcast/" title="ReadJoin Us For Packet Protector, A New Cybersecurity Podcast">... Read more &#187;</a>]]></description>
      <enclosure url="https://feeds.packetpushers.net/link/23910/16558002/Packet_Protector_trailer.mp3" length="718202" type="audio/mpeg"/>
      <itunes:title>Join Us For Packet Protector, A New Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>45</itunes:duration>
      <itunes:author>Packet Pushers</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>cybersecurity, networking, engineers, security, compliance, </itunes:keywords>
      <itunes:subtitle>Hi, I’m Jennifer Minella and I’m excited to finally share with you all that I’ll be co-hosting a new podcast on the Packet Pushers network. It’s called Pocket Protector, a podcast exploring the inter…</itunes:subtitle>
      <itunes:summary>Hi, I&amp;#8217;m Jennifer Minella and I&amp;#8217;m excited to finally share with you all that I&amp;#8217;ll be co-hosting a new podcast on the Packet Pushers network. It&amp;#8217;s called Pocket Protector, a podcast exploring the intersection of networking and security. Each week, we&amp;#8217;re drilling into topics, from wired and wireless network security to access control and zero&lt;a class="excerpt-read-more" href="https://packetpushers.net/podcasts/packet-protector/join-us-for-packet-protector-a-new-cybersecurity-podcast/" title="ReadJoin Us For Packet Protector, A New Cybersecurity Podcast"&gt;... Read more &amp;#187;&lt;/a&gt;</itunes:summary>
    </item>
  </channel>
</rss>
