Episodes

  • PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)
    Dec 9 2025
    Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspace, including email... Read more »
    Show more Show less
    47 mins
  • PP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of
    Dec 2 2025
    There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your WLAN less secure. Jennifer “JJ” Minella goes from Packet Protector co-host to guest as she discusses these issues with Drew Conry-Murray. This episode... Read more »
    Show more Show less
    1 hr and 3 mins
  • PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
    Nov 25 2025
    Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers of complexity... Read more »
    Show more Show less
    45 mins
  • PP087: Why SBOMs Are Cooler and More Useful Than You Think
    Nov 18 2025
    Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... Read more »
    Show more Show less
    46 mins
  • PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
    Nov 11 2025
    Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »
    Show more Show less
    45 mins
  • PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
    Nov 5 2025
    Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of... Read more »
    Show more Show less
    52 mins
  • PP084: Inside the CVE Process With Cisco (Sponsored)
    Oct 30 2025
    CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
    Show more Show less
    45 mins
  • PP083: A CISO’s Perspective on Model Context Protocol (MCP)
    Oct 21 2025
    Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understand how... Read more »
    Show more Show less
    44 mins