Podcast Episodes
Back to SearchWhat Goes On Inside a Firewall?
Episode 98
On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through vario…
8 hours ago
How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
Episode 97
With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, ident…
1 week ago
Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?
Episode 96
Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to…
2 weeks ago
OT and ICS - Where Digital and Physical Risks Meet
Episode 95
Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critica…
3 weeks ago
Understanding OAuth and Reducing Authorization Risks
Episode 94
OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These t…
4 weeks ago
Security Priorities for 2026 - A Roundtable Discussion
Episode 93
The start of a new year is a good time to assess what’s important. We’ve gathered some Packet Protector listeners to talk about their security priori…
1 month ago
News Roundup--Old Gear Faces New Attacks, Cyber Trust Mark's Trust Issues, Alarms Howl for Kimwolf Botnet
Episode 92
Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a …
1 month, 1 week ago
News Roundup--Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids' Toys
Episode 91
Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that use…
2 months, 1 week ago
Why Native Controls Aren't Enough to Protect Your Cloud Workspaces (Sponsored)
Episode 90
Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account…
2 months, 2 weeks ago
Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of
Episode 89
There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS prob…
2 months, 3 weeks ago