logo
episode-header-image
Apr 2024
46m 50s

PP011: IoT Protocols: Detection and Prot...

Packet Pushers
About this episode
IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »
Up next
Aug 19
PP075: Kernel Vs. User Mode In Endpoint Security Software
Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStr ... Show More
43m 39s
Aug 12
PP074: News Roundup – Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk
Packet Protector goes global for today’s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense’s cloud infrastructure (with the help of US ‘digital escorts’), Taiwanese chipmaker TSMC fires several employees ove ... Show More
42m 35s
Aug 5
PP073: Identify Yourself: Authentication From SAML to FIDO2
From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo adviso ... Show More
40m 6s
Recommended Episodes
Dec 2024
Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]
This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected ... Show More
21m 15s
Dec 2019
53: Shadow Brokers
The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened.GuestThanks to Jake Williams from Rendition Security for telling us the story.SponsorsThis episode was sponsored by Th ... Show More
50m 4s
Feb 2025
NAN086: A Reality Check On AI for Network Operations
On today’s episode, we get a reality check on all the hype surrounding AI with guest Phil Gervasi. Phil provides background on Large Language Models (LLMs) and their applications, as well as the current state of AI technology. We also delve into practical use cases for AI in netw ... Show More
53m 24s
Nov 2024
151: Chris Rock
Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east.https://x.com/chrisrockhackerSponsorsSupport for this show comes from Varonis. Do you wonder what your company’s ransomware blast r ... Show More
57m 57s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Dec 2024
Tech Bytes: Protecting OT/IoT Devices With FortiLink NAC (Sponsored)
Today on the Tech Bytes podcast, sponsored by Fortinet, we talk about IoT and OT risks and how to mitigate them. One option from Fortinet is FortiLink NAC, a free feature that can help you segment and protect IoT and OT devices and can even help deploy virtual patches. Another op ... Show More
18m 49s
Feb 2025
HN767: Effective Networking on the Cheap
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, ta ... Show More
1h 9m
May 2024
Being watched
There are words of warning about facial recognition, biometrics and artificial intelligence - technologies increasingly being adopted by law enforcement worldwide. Also on Tech Life this week, we learn about an African company offering a local alternative to the big electric vehi ... Show More
26m 28s
Jun 25
Hang Up and Hang Out: AI Agents Give Us a Phone-Free Future
Apps were supposed to make life easier to navigate, but they often create more complexity. Planning a trip can involve hundreds of digital touchpoints over several months. But new advances–especially the growth of AI agents–coupled with ambient and voice-recognition technology, c ... Show More
30 m