Episodes

  • PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
    Nov 25 2025
    Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers of complexity... Read more »
    Show more Show less
    45 mins
  • PP087: Why SBOMs Are Cooler and More Useful Than You Think
    Nov 18 2025
    Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... Read more »
    Show more Show less
    46 mins
  • PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
    Nov 11 2025
    Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »
    Show more Show less
    45 mins
  • PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
    Nov 5 2025
    Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of... Read more »
    Show more Show less
    52 mins
  • PP084: Inside the CVE Process With Cisco (Sponsored)
    Oct 30 2025
    CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
    Show more Show less
    45 mins
  • PP083: A CISO’s Perspective on Model Context Protocol (MCP)
    Oct 21 2025
    Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understand how... Read more »
    Show more Show less
    44 mins
  • PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
    Oct 14 2025
    Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read more »
    Show more Show less
    1 hr and 2 mins
  • PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
    Oct 7 2025
    From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub’s plans to harden npm packages.... Read more »
    Show more Show less
    48 mins