
Adam Pointon
Chief executive and co-founder of Knock Knock. He discusses the company's identity-to-firewall glue and its applications for internal services and networks.
Top 3 podcasts with Adam Pointon
Ranked by the Snipd community

53 snips
Apr 30, 2025 • 1h 3min
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
Adam Pointon, CEO of Knocknoc, shares insights on the vital security enhancements unlocked by IPv6. He emphasizes its role in enabling zero-trust access control and network isolation for critical systems. The discussion also touches on severe vulnerabilities found in Apple's AirPlay, highlighting ongoing challenges in cybersecurity. Pointon explains how Knocknoc's technology enhances firewall management and the adoption hurdles of IPv6. His engaging narrative sheds light on the innovative approaches needed in the evolving landscape of network security.

38 snips
Sep 17, 2025 • 53min
Risky Business #807 -- Shai-Hulud npm worm wreaks old-school havoc
In this discussion, Adam Pointon, CEO and co-founder of Knock Knock, shares insights on innovative identity authentication solutions and their application in securing internal services. The conversation dives into the alarming Shai-Hulud npm worm, which can steal developer credentials, and the significant ransomware attack on Jaguar Land Rover that threatens smaller suppliers. They also tackle concerns surrounding vulnerabilities in popular cybersecurity systems like Kerberos and discuss practical strategies for navigating the complexities of network security.

8 snips
Mar 26, 2025 • 31min
Soap Box: Knocknoc glues your SSO to your firewalls for Just-in-Time network access
In this engaging conversation, Adam Pointon, CEO of Knocknoc, shares his expertise in innovative network access control solutions. He discusses the importance of securing Single Sign-On services and minimizing exposure by integrating advanced tools like Identity-Aware Proxies. Adam clarifies common misconceptions about SSO vulnerabilities and highlights strategies to isolate critical applications from the internet to enhance security. With a focus on Just-in-Time Network Access Control, he outlines how to streamline access while maintaining robust protection for sensitive environments.