Episodes

  • PP108: How to Build and Sustain a Successful Zero Trust Project
    May 5 2026
    In theory, a zero trust initiative seems straightforward: you just need the right tools and maybe some whiteboard sessions to work out the architecture. In practice, our guests note that zero trust “unfolds inside organizations filled with legacy systems, political friction, budget constraints, and competing priorities.” Without accounting for those complications, a zero trust project... Read more »
    Show more Show less
    51 mins
  • PP107: Why Now’s the Time to Prepare for a Post-Quantum World (Sponsored)
    Apr 28 2026
    A cryptographically relevant quantum computer is, at some point, going to emerge that can crack modern encryption. But we don’t know when, so it’s tempting to set this problem aside. On today’s sponsored episode, we talk about why ignoring Post-Quantum Cryptography (PQC) isn’t an effective strategy. Sponsor Cisco is here to make the case for... Read more »
    Show more Show less
    51 mins
  • PP106: Architecting for Wi-Fi 7, Zero Trust, PQC, and More
    Apr 21 2026
    For decades, network and security professionals have adapted to technology change in a piecemeal fashion: a new rule here, an upgrade there, a new product deployment over yonder. On today’s Packet Protector, co-host Jennifer ‘JJ’ Jabbusch makes the case for why several emerging technologies require IT pros to think about security at an architectural level.... Read more »
    Show more Show less
    21 mins
  • PP105: Cybercrime Has Gone Industrial: Insights from HPE Threat Labs (Sponsored)
    Apr 14 2026
    Threat actors are behaving more like professional organizations in an effort to launch more effective and profitable attacks. We explore this and other themes from the latest Threat Labs report from HPE, our sponsor for today’s Packet Protector episode. We also look at how older vulnerabilities are still contributing to today’s exploits, why security organizations... Read more »
    Show more Show less
    37 mins
  • PP104: How SocGholish Picks Locks to Let In Ransomware
    Apr 7 2026
    In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and then sell that access to other threat actors who specialize in ransomware, exfiltration, and other crimes. SocGholish is a widely used tool in the access broker toolkit. Typically disguised as a legitimate software update, SocGholish... Read more »
    Show more Show less
    28 mins
  • PP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)
    Mar 31 2026
    Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show... Read more »
    Show more Show less
    57 mins
  • PP102: What’s Driving SASE Adoption?
    Mar 24 2026
    Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »
    Show more Show less
    56 mins
  • PP101: Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption
    Mar 17 2026
    On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
    Show more Show less
    44 mins