Packet Protector

Packet Pushers
undefined
Jan 20, 2026 • 1h 3min

PP093: Security Priorities for 2026 – A Roundtable Discussion

The start of a new year is a good time to assess what’s important. We’ve gathered some Packet Protector listeners to talk about their security priorities for 2026 in a roundtable discussion with hosts JJ and Drew. We talk about key risks for 2026, whether those risks have changed since last year, use cases for... Read more »
undefined
Jan 13, 2026 • 52min

PP092: News Roundup–Old Gear Faces New Attacks, Cyber Trust Mark’s Trust Issues, Alarms Howl for Kimwolf Botnet

Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could... Read more »
undefined
Dec 16, 2025 • 54min

PP091: News Roundup–Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids’ Toys

Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s pledge to follow... Read more »
undefined
12 snips
Dec 9, 2025 • 47min

PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)

Abhishek Agrawal, CEO of Material Security, dives into the challenges of securing productivity suites like Google Workspace and Microsoft 365. He discusses why native controls often fall short in thwarting threats like phishing and account takeovers. Abhishek highlights how Material Security supplements these platforms with unique organizational signals to enhance threat detection and automated remediation. He also explores the risks associated with AI search and the importance of post-breach resilience, ensuring organizations can respond effectively to security incidents.
undefined
8 snips
Dec 2, 2025 • 1h 3min

PP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of

Jennifer JJ Manella, a wireless networking and security expert, dives into the murky waters of WLAN misconfigurations. She reveals the perils of peer isolation and the critical balance needed for guest networks. JJ discusses the nuances between WPA2 and WPA3, stressing the importance of careful device migration. Misconfigured RADIUS setups could expose credentials, she warns, emphasizing the need for stringent certificate validation. The conversation also covers upcoming Wi-Fi 7 features and the client stickiness that could complicate deployments.
undefined
Nov 25, 2025 • 45min

PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)

Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers of complexity... Read more »
undefined
Nov 18, 2025 • 46min

PP087: Why SBOMs Are Cooler and More Useful Than You Think

Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... Read more »
undefined
Nov 11, 2025 • 45min

PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates

Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »
undefined
Nov 5, 2025 • 52min

PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks

Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of... Read more »
undefined
Oct 30, 2025 • 45min

PP084: Inside the CVE Process With Cisco (Sponsored)

Osman Hashmi, a Principal Engineer at Cisco, Joe Malcolm, the CISO for Infrastructure Engineering, and Marco Cassini, an Incident Manager at Cisco's PSIRT, dive into the complexities of the CVE process. They discuss how key organizations like MITRE and NVD contribute to CVE management, explore the role of NVD in scoring vulnerabilities, and unpack the importance of Cisco’s CNA role. Additionally, they touch on responsible disclosure practices, the impact of customer collaboration on validation, and how AI is being integrated into security workflows.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app