logo
episode-header-image
Oct 2024
47m 31s

PP035: What IT Should Know About Securin...

Packet Pushers
About this episode
Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today’s Packet Protector, guest Mike Holcomb demystifies ICS and OT for IT... Read more »
Up next
Yesterday
PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the ... Show More
44m 32s
Nov 18
PP087: Why SBOMs Are Cooler and More Useful Than You Think
Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software ... Show More
46m 8s
Nov 11
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Har ... Show More
44m 39s
Recommended Episodes
Aug 1
Evolving Beyond MBSE to Tackle Aerospace Complexity – The Future of Systems Engineering Ep. 1
The aerospace and defense industry has a deep relationship with systems engineering. From all the way back to the Apollo program to now, systems engineering has helped deliver numerous complex aircraft and spacecraft, often in the form of model-based systems engineering (MBSE). H ... Show More
16m 37s
Aug 21
Turning Legacy Service Contracts into First Time Fix Wins - with Joe Lang of Comfort Systems
<p><span data-preserver-spaces="true">Today's guest is Joe Lang, Vice President of Service Technology and Innovation at Comfort Systems USA — a leading national provider of mechanical, electrical, and plumbing building systems services, with more than 45 operating companies acros ... Show More
25m 9s
Oct 2022
An IT security professional walks into an OT bar.
An assessment of port and terminal cybersecurity in the US. Tata Power discloses a cyberattack. The White House issues statements on cybersecurity. India’s power company collaborates on energy sector cybersecurity. Guests Special Agent in Charge, Tom Sobocinski, and Supervisory S ... Show More
37m 7s
Oct 2023
Heavy Wireless 012: Why Wireless Pros Should Get To Know LoRaWAN
LoRaWAN is a wireless protocol that's well suited for use cases that require long-range, low-power operations such as sensors, asset and livestock tracking, municipal "smart city" initiatives, and more. On today's Heavy Wireless, Keith Parsons welcomes Raymond Hendrix and Troy Ma ... Show More
21m 58s
Mar 2025
VRF Tech Talk Takeover
<p><span class="yt-core-attributed-string--link-inherit-color" dir= "auto">Roman Baugh and Donald Falese from VRF Tech Talk podcast takeover the HVAC School booth at AHR EXPO 2025. Join them as they talk about the new VRF products being unveiled, water cooled VRF up's and down's ... Show More
53m 45s
May 2024
Hacktivism targeting OT devices.
US Defense Department warns of Russian hacktivists targeting OT devices. The US government establishes safety and security board to advise the deployment of AI in critical infrastructure sectors. Vulnerabilities affect CyberPower UPS management software. US congressmen put forwar ... Show More
24m 36s
Aug 27
AlgoSec on AI, Automation, and the Next Era of Network Management
<p>The enterprise network is under pressure like never before. Hybrid environments, cloud migrations, edge deployments, and the sudden surge in AI workloads have made it increasingly difficult to keep application connectivity secure and reliable. The old model of device-by-device ... Show More
22m 30s
Jun 2025
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mo ... Show More
51m 57s
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
<p>In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what i ... Show More
36m 29s
Jan 2025
Anduril with Gokul Subramanian
<p>Anduril is a technology defense company with a focus on drones, computer vision, and other problems related to national security. It is a full-stack company that builds its own hardware and software, which leads to a great many interesting questions about cloud services, engin ... Show More
43m 5s