Episodes

  • PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
    Nov 11 2025
    Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »
    Show more Show less
    45 mins
  • PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
    Nov 5 2025
    Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of... Read more »
    Show more Show less
    52 mins
  • PP084: Inside the CVE Process With Cisco (Sponsored)
    Oct 30 2025
    CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
    Show more Show less
    45 mins
  • PP083: A CISO’s Perspective on Model Context Protocol (MCP)
    Oct 21 2025
    Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understand how... Read more »
    Show more Show less
    44 mins
  • PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
    Oct 14 2025
    Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read more »
    Show more Show less
    1 hr and 2 mins
  • PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
    Oct 7 2025
    From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub’s plans to harden npm packages.... Read more »
    Show more Show less
    48 mins
  • PP080: The State of OT Risks in 2025 (and What to Do About Them)
    Sep 30 2025
    What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... Read more »
    Show more Show less
    45 mins
  • PP079: Rethinking the Architecture of Microsegmentation
    Sep 23 2025
    Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a working... Read more »
    Show more Show less
    58 mins