Podcast Episodes

Back to Search
No image available

The State of OT Risks in 2025 (and What to Do About Them)


Episode 80


What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss rans…


Published on 2 months, 1 week ago

No image available

Rethinking the Architecture of Microsegmentation


Episode 79


Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that…


Published on 2 months, 2 weeks ago

No image available

Using Free Tools for Detection Engineering


Episode 78


You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer…


Published on 2 months, 3 weeks ago

No image available

News Roundup--Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program


Episode 77


Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breac…


Published on 3 months ago

No image available

RF Risks and How to See Unseen Threats


Episode 76


Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard…


Published on 3 months, 1 week ago

No image available

Kernel Vs. User Mode In Endpoint Security Software


Episode 75


Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running se…


Published on 3 months, 3 weeks ago

No image available

PP074: News Roundup – Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk


Episode 74


Packet Protector goes global for today’s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense’s cloud infrastructure (with the he…


Published on 4 months ago

No image available

Identify Yourself: Authentication From SAML to FIDO2


Episode 73


From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by th…


Published on 4 months, 1 week ago

No image available

Mobile Device Threat Management


Episode 72


Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s Packe…


Published on 4 months, 1 week ago

No image available

SSE Vendor Test Results; Can HPE and Juniper Get Along?


Episode 71


CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Te…


Published on 4 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate