Page de couverture de Packet Protector

Packet Protector

Packet Protector

Auteur(s): Packet Pushers
Écouter gratuitement

À propos de cet audio

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, cloud security, pen testing and red/blue teaming, security hardware and software, and more. Whether security is your full-time job or one of your many responsibilities, Packet Protector is your go-to cybersecurity resource.© Packet Pushers Interactive LLC Gestion et leadership Économie
Épisodes
  • PP099: The Care and Feeding of Kerberos for Windows Environments
    Mar 3 2026
    Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We’ll dive into... Read more »
    Voir plus Voir moins
    53 min
  • PP098: What Goes On Inside a Firewall?
    Feb 24 2026
    On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »
    Voir plus Voir moins
    58 min
  • PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
    Feb 17 2026
    With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »
    Voir plus Voir moins
    44 min
Pas encore de commentaire