logo
episode-header-image
Apr 2024
46m 50s

PP011: IoT Protocols: Detection and Prot...

Packet Pushers
About this episode
IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »
Up next
Yesterday
PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the ... Show More
44m 32s
Nov 18
PP087: Why SBOMs Are Cooler and More Useful Than You Think
Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software ... Show More
46m 8s
Nov 11
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Har ... Show More
44m 39s
Recommended Episodes
Dec 2024
Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]
This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected ... Show More
18m 15s
Dec 2019
53: Shadow Brokers
<p>The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened.</p><p>Guest</p><p>Thanks to <a href="https://twitter.com/MalwareJake">Jake Williams</a> from <a href="https://rend ... Show More
50m 4s
Feb 2025
NAN086: A Reality Check On AI for Network Operations
On today’s episode, we get a reality check on all the hype surrounding AI with guest Phil Gervasi. Phil provides background on Large Language Models (LLMs) and their applications, as well as the current state of AI technology. We also delve into practical use cases for AI in netw ... Show More
53m 24s
Nov 2024
151: Chris Rock
<p>Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east.</p><p>https://x.com/chrisrockhacker<br><br>Sponsors<br>Support for this show comes from Varonis. Do you wonder what your compan ... Show More
57m 57s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Dec 2024
Tech Bytes: Protecting OT/IoT Devices With FortiLink NAC (Sponsored)
Today on the Tech Bytes podcast, sponsored by Fortinet, we talk about IoT and OT risks and how to mitigate them. One option from Fortinet is FortiLink NAC, a free feature that can help you segment and protect IoT and OT devices and can even help deploy virtual patches. Another op ... Show More
18m 49s
Feb 2025
HN767: Effective Networking on the Cheap
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, ta ... Show More
1h 9m
May 2024
Being watched
There are words of warning about facial recognition, biometrics and artificial intelligence - technologies increasingly being adopted by law enforcement worldwide. Also on Tech Life this week, we learn about an African company offering a local alternative to the big electric vehi ... Show More
26m 28s
Oct 21
Securing the AI Frontier: Irregular Co-founder Dan Lahav
Irregular co-founder Dan Lahav is redefining what cybersecurity means in the age of autonomous AI. Working closely with OpenAI, Anthropic, and Google DeepMind, Dan, co-founder Omer Nevo and team are pioneering “frontier AI security”—a proactive approach to safeguarding systems wh ... Show More
44m 9s