Episodios

  • PP109: ThreatLocker Enforces Zero Trust With Strict Application Control (Sponsored)
    May 12 2026
    ThreatLocker takes an opinionated approach to Zero Trust. The company, our sponsor for today’s episode, starts with application control. It uses endpoint software that runs on PCs and servers to allow or deny applications to run. It can also monitor and control the behavior of allowed applications. ThreatLocker has extended its platform to include network... Read more »
    Más Menos
    45 m
  • PP108: How to Build and Sustain a Successful Zero Trust Project
    May 5 2026
    In theory, a zero trust initiative seems straightforward: you just need the right tools and maybe some whiteboard sessions to work out the architecture. In practice, our guests note that zero trust “unfolds inside organizations filled with legacy systems, political friction, budget constraints, and competing priorities.” Without accounting for those complications, a zero trust project... Read more »
    Más Menos
    51 m
  • PP107: Why Now’s the Time to Prepare for a Post-Quantum World (Sponsored)
    Apr 28 2026
    A cryptographically relevant quantum computer is, at some point, going to emerge that can crack modern encryption. But we don’t know when, so it’s tempting to set this problem aside. On today’s sponsored episode, we talk about why ignoring Post-Quantum Cryptography (PQC) isn’t an effective strategy. Sponsor Cisco is here to make the case for... Read more »
    Más Menos
    51 m
  • PP106: Architecting for Wi-Fi 7, Zero Trust, PQC, and More
    Apr 21 2026
    For decades, network and security professionals have adapted to technology change in a piecemeal fashion: a new rule here, an upgrade there, a new product deployment over yonder. On today’s Packet Protector, co-host Jennifer ‘JJ’ Jabbusch makes the case for why several emerging technologies require IT pros to think about security at an architectural level.... Read more »
    Más Menos
    21 m
  • PP105: Cybercrime Has Gone Industrial: Insights from HPE Threat Labs (Sponsored)
    Apr 14 2026
    Threat actors are behaving more like professional organizations in an effort to launch more effective and profitable attacks. We explore this and other themes from the latest Threat Labs report from HPE, our sponsor for today’s Packet Protector episode. We also look at how older vulnerabilities are still contributing to today’s exploits, why security organizations... Read more »
    Más Menos
    37 m
  • PP104: How SocGholish Picks Locks to Let In Ransomware
    Apr 7 2026
    In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and then sell that access to other threat actors who specialize in ransomware, exfiltration, and other crimes. SocGholish is a widely used tool in the access broker toolkit. Typically disguised as a legitimate software update, SocGholish... Read more »
    Más Menos
    28 m
  • PP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)
    Mar 31 2026
    Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show... Read more »
    Más Menos
    57 m
  • PP102: What’s Driving SASE Adoption?
    Mar 24 2026
    Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »
    Más Menos
    56 m