

The Everything Feed - All Packet Pushers Pods
Packet Pushers
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Episodes
Mentioned books

Oct 1, 2024 • 40min
HS084: Straight Talk from Cisco’s CIO (Sponsored)
Fletcher Previn, SVP and Chief Information Officer at Cisco, brings over 20 years of tech leadership to the table. He shares insights on fostering a strong technology culture and the role of IT as a strategic partner in business. The conversation delves into Cisco's position as both customer and product innovator, enhancing user experience through structured feedback and addressing hybrid work challenges. Previn also discusses building Cisco's AI infrastructure, highlighting new innovations and the importance of asking the right questions to drive improvement.

Oct 1, 2024 • 40min
NB497: Blocking AI Scraper Bots; HPE, Arista Reach for Bigger Slices of the Enterprise
This week, the discussion dives into serious vulnerabilities found in HPE and Cisco devices, highlighting the importance of bug bounty programs. The benefits of network slicing versus traditional private networks are explored, along with Cloudflare's new tools to combat AI scraper bots. Innovations in network management feature new AI for IoT identification and monitoring third-party devices. Additionally, emerging technologies in broadband aim to enhance capabilities, while advancements in SASE aim to simplify operations and enhance network security.

8 snips
Sep 30, 2024 • 18min
Tech Bytes: Security and Operational Benefits of Fortinet Unified SASE (Sponsored)
In this engaging discussion, Fortinet representatives delve into the powerful concepts of Unified SASE, which merges networking and cloud security for a seamless experience. They explore the introduction of generative AI through the 40AI assistant to enhance network operations and identify IoT vulnerabilities. The conversation also emphasizes Zero Trust principles in safeguarding data privacy and discusses dynamic endpoint security measures to combat threats like phishing. Discover how Sovereign SASE adapts to local regulations while ensuring flexibility and automation for businesses.

Sep 27, 2024 • 53min
HN751: Top Tips for Building A CCIE-EI Lab
In this discussion, Mason Reimert shares his expertise on preparing for the CCIE Enterprise Infrastructure lab exam. He dives into essential strategies like hands-on labbing and the significance of familiarizing oneself with SD-WAN and SD-Access. Mason emphasizes resource management, virtualization tools, and automation techniques. Listeners learn about building effective labs, understanding APIs, and bridging knowledge gaps. He also highlights the importance of community engagement for aspiring CCIE candidates.

Sep 26, 2024 • 35min
TL004: Fostering Psychological Safety for Tech Teams
Wesley Faulkner, an expert in fostering psychological safety within tech teams, discusses vital concepts that can transform workplace dynamics. He highlights how this principle enables team members to voice concerns freely and enhances communication. The conversation touches on the difference between leadership and management, emphasizing collaboration, especially for junior developers. Faulkner also connects psychological safety to product quality and discusses its relevance in today's unstable job market, urging continuous community engagement.

Sep 25, 2024 • 42min
NAN074: Integrate and Collaborate with Codespaces and Containerlab
Discover how GitHub Codespaces is revolutionizing developer environments in the cloud. Learn about the integration with Containerlab, simplifying network lab sharing. The discussion emphasizes the shift from traditional Dockerfiles to development containers, boosting consistency and collaboration. Dive into user-friendly cost management and explore innovative tools enhancing container lab experiences. Don't miss the insights on Visual Studio Code workflows and the exciting launch of Project Daytona.

Sep 24, 2024 • 37min
PP032: Unpacking RPKI for BGP Security
Explore the urgent need to secure the Border Gateway Protocol (BGP) against hackers and configuration mistakes. Discover the role of Resource Public Key Infrastructure (RPKI) in combating route hijacks and enhancing authenticity in internet routing. Dive into intriguing case studies, like the unintended YouTube access incident, highlighting the complexities of route management. Learn about double Route Origin Authorizations (ROAs) and how collaborative efforts between cybersecurity teams can fortify BGP security. Historical policies and current regulatory pressures also shape the landscape.

Sep 24, 2024 • 42min
HS083: Why Protocols Fail: Russ White’s Perspective on Effective Architecture
Network veteran Russ White, a senior architect at Akamai Technologies, shares his deep insights into why protocols fail. He explores the balance of complexity in network architecture and warns against premature optimization, calling it ‘the root of all evil.’ The discussion dives into the intricacies of network protocols like BGP and IPv6, emphasizing the need for adaptable designs. White also reflects on the importance of understanding state and advocates for flexible architectural solutions that future-proof IT infrastructures.

Sep 23, 2024 • 20min
Tech Bytes: Reduce GenAI App Risks Without Reducing Productivity (Sponsored)
Generative AI tools are reshaping industries from search to video creation. Organizations are torn between embracing these technologies for enhanced productivity and addressing the looming security threats. The podcast delves into unique risks associated with these applications and the need for robust security measures. It highlights strategies to mitigate risks during interactions with AI chatbots and emphasizes the imperative for a new discipline in AI risk management to safeguard sensitive data in a rapidly evolving landscape.

Sep 23, 2024 • 51min
NB496: Nokia’s Enterprise Data Center Intentions; Are AI ChatBots Worth the Nuclear Waste?
The latest tech news reveals big moves in energy and connectivity. Explore Microsoft's plan to revive a nuclear power plant and its implications. Juniper's Wi-Fi 7 access points promise advanced networking capabilities, while T-Mobile's 5G network slicing supports emergency services. The conversation also dives into cybersecurity threats, like the takedown of a Chinese botnet, alongside the burgeoning realm of generative AI and its associated risks. Finally, the emerging discipline of AI risk management garners attention, highlighting the need for proactive data policies.


