Podcast Episodes

Back to Search
What Goes On Inside a Firewall?

Episode 98

On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through vario…

4 hours ago

Short Long
View Episode
How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

Episode 97

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, ident…

1 week ago

Short Long
View Episode
Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?

Episode 96

Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to…

2 weeks ago

Short Long
View Episode
OT and ICS - Where Digital and Physical Risks Meet

Episode 95

Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critica…

3 weeks ago

Short Long
View Episode
Understanding OAuth and Reducing Authorization Risks

Episode 94

OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These t…

4 weeks ago

Short Long
View Episode
Security Priorities for 2026 - A Roundtable Discussion

Episode 93

The start of a new year is a good time to assess what’s important. We’ve gathered some Packet Protector listeners to talk about their security priori…

1 month ago

Short Long
View Episode
News Roundup--Old Gear Faces New Attacks, Cyber Trust Mark's Trust Issues, Alarms Howl for Kimwolf Botnet

Episode 92

Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a …

1 month, 1 week ago

Short Long
View Episode
News Roundup--Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids' Toys

Episode 91

Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that use…

2 months, 1 week ago

Short Long
View Episode
Why Native Controls Aren't Enough to Protect Your Cloud Workspaces (Sponsored)

Episode 90

Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account…

2 months, 2 weeks ago

Short Long
View Episode
Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of

Episode 89

There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS prob…

2 months, 3 weeks ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us