Podcast Episodes
Back to SearchNews Roundup - 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More
Episode 48
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a Beyo…
1 year ago
Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
Episode 47
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a …
1 year ago
IPv6 Security, Migration, and Adoption
Episode 46
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration,…
1 year, 1 month ago
Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency
Episode 45
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechani…
1 year, 1 month ago
Optimizing Security and Performance with ADEM & App Acceleration (Sponsored)
Episode 44
Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT te…
1 year, 2 months ago
The Perils and Perks of the CISO Track
Episode 43
A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and b…
1 year, 2 months ago
CISO Liability Insurance, A Seriously Dangerous Menu Hack, and more Security News
Episode 42
Our monthly news roundup discusses liability insurance for CISOs (if you are one, you should get it), serious intrusions of US telecom companies by C…
1 year, 2 months ago
Cyber Insurance from a Policyholder Perspective
Episode 41
Cyber insurance provides compensation if a company suffers financial loss due to a security incident such as a ransonware payment, costs of data reco…
1 year, 2 months ago
Personal Privacy Tools
Episode 40
Surveillance is a fact of life with modern technology, be it corporate data harvesting or government snooping. If you’re thinking about personal priv…
1 year, 3 months ago
Securing Active Directory from a Pen Tester's Perspective
Episode 39
Microsoft’s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today’s Packet Prot…
1 year, 3 months ago