PLAY PODCASTS
Packet Protector

Packet Protector

Practical conversations at the intersection of security and networking

Packet Pushers

110 episodesEN

Show overview

Packet Protector has been publishing since 2024, and across the 2 years since has built a catalogue of 110 episodes. That works out to roughly 75 hours of audio in total. Releases follow a weekly cadence.

Episodes typically run thirty-five to sixty minutes — most land between 37 min and 49 min — and the run-time is fairly consistent across the catalogue. None of the episodes are flagged explicit by the publisher. It is catalogued as a EN-language Technology show.

The show is actively publishing — the most recent episode landed 2 days ago, with 18 episodes already out so far this year. Published by Packet Pushers.

Episodes
110
Running
2024–2026 · 2y
Median length
43 min
Cadence
Weekly

From the publisher

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.

Latest Episodes

View all 110 episodes

PP109: ThreatLocker Enforces Zero Trust With Strict Application Control (Sponsored)

May 12, 202644 min

PP108: How to Build and Sustain a Successful Zero Trust Project

May 5, 202651 min

PP107: Why Now’s the Time to Prepare for a Post-Quantum World (Sponsored)

Apr 28, 202651 min

PP106: Architecting for Wi-Fi 7, Zero Trust, PQC, and More

Apr 21, 202621 min

PP105: Cybercrime Has Gone Industrial: Insights from HPE Threat Labs (Sponsored)

Apr 14, 202637 min

Ep 104PP104: How SocGholish Picks Locks to Let In Ransomware

In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and then sell that access to other threat actors who specialize in ransomware, exfiltration, and other crimes. SocGholish is a widely used tool in the access broker toolkit. Typically disguised as a legitimate software update, SocGholish... Read more »

Apr 7, 202628 min

Ep 103PP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)

Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show... Read more »

Mar 31, 202656 min

Ep 102PP102: What’s Driving SASE Adoption?

Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »

Mar 24, 202656 min

Ep 101PP101: Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption

On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »

Mar 17, 202644 min

Ep 100PP100: Building and Securing AI Agents – A Case Study

Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools... Read more »

Mar 10, 202643 min

Ep 99PP099: The Care and Feeding of Kerberos for Windows Environments

Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We’ll dive into... Read more »

Mar 3, 202652 min

Ep 98PP098: What Goes On Inside a Firewall?

On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »

Feb 24, 202657 min

Ep 97PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »

Feb 17, 202644 min

Ep 96PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?

Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other news, Google takes down a sprawling residential proxy network, the popular Notepad++ app takes steps to recover from a serious compromise, and a Polish... Read more »

Feb 10, 202651 min

Ep 95PP095: OT and ICS – Where Digital and Physical Risks Meet

Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants, manufacturing sites, municipal power and water plants, and more, are under increasing attack. On today’s Packet Protector we return to the OT/ICS realm to talk about... Read more »

Feb 3, 202653 min

Ep 94PP094: Understanding OAuth and Reducing Authorization Risks

OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »

Jan 27, 20261h 10m

Ep 93PP093: Security Priorities for 2026 – A Roundtable Discussion

The start of a new year is a good time to assess what’s important. We’ve gathered some Packet Protector listeners to talk about their security priorities for 2026 in a roundtable discussion with hosts JJ and Drew. We talk about key risks for 2026, whether those risks have changed since last year, use cases for... Read more »

Jan 20, 20261h 2m

Ep 92PP092: News Roundup–Old Gear Faces New Attacks, Cyber Trust Mark’s Trust Issues, Alarms Howl for Kimwolf Botnet

Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could... Read more »

Jan 13, 202651 min

Ep 91PP091: News Roundup–Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids’ Toys

Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s pledge to follow... Read more »

Dec 16, 202554 min

Ep 90PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)

Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspace, including email... Read more »

Dec 9, 202546 min
© Packet Pushers Interactive LLC