The Everything Feed - All Packet Pushers Pods

Packet Pushers
undefined
Mar 20, 2024 • 50min

D2C237: Managing Medical IoT Devices on AWS

In this podcast episode, Randy Horton from Orthogonal and Ian Sutcliffe from AWS discuss the complexities of supporting regulated medical devices in the cloud. They explore the challenges of adhering to regulations, the importance of security, and the need for robust frameworks. The conversation highlights the non-prescriptive nature of regulations, encouraging best practices rather than... Read more »
undefined
Mar 20, 2024 • 34min

NAN058: The Story of containerlab with Roman Dodin (Part 2)

Welcome back for Part 2 of Eric’s interview with Roman Dodin, co-creator of containerlab. Roman describes containerlab as a “lab as code” tool that quickly and easily creates virtual networking topologies. With increased automation and containerization in network engineering, the tool’s popularity has exploded. We talk about how folks contribute to containerlab’s development and what... Read more »
undefined
Mar 19, 2024 • 35min

HS068: What’s the Point of Having a Tech Strategy?

What does having a tech strategy actually do for an organization? In today’s episode, Greg and Johna highlight how a good tech strategy benefits a company: creates a foundation of first principles, reduces bias in vendor decisions, better allocates human resources, kills bad ideas, sunsets projects, and makes meetings a little more enjoyable and harmonious.... Read more »
undefined
Mar 19, 2024 • 49min

PP006: Effective Security for Small IT Shops

Explore the challenges of cybersecurity in small IT shops, including priority setting, safeguarding sensitive data, and the importance of constant vigilance. Learn about the significance of security budgets and leadership buy-in, as well as the value of penetration testing and user awareness training. Discover the collaborative nature of cybersecurity in small IT environments and the benefits of community networking for professionals.
undefined
Mar 18, 2024 • 16min

Tech Bytes: Protecting Connected Medical Devices With Palo Alto Networks IoT Security (Sponsored)

Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best practices to manage medical device risks and ensure the... Read more »
undefined
Mar 18, 2024 • 53min

NB470: NetBox Labs Adds On-Prem Support; ASML Vs. The Netherlands

This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »
undefined
Mar 15, 2024 • 48min

HN725: Standing up a DC Network Using Terraform

Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and... Read more »
undefined
Mar 13, 2024 • 47min

NAN057: Nile Incorporates Network Automation from the Ground Up (Sponsored)

What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »
undefined
Mar 12, 2024 • 43min

PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense

Discussing the roles of red, blue, and purple teams in cybersecurity, emphasizing collaborative attack simulations and defense strategies. Highlighting the importance of diverse perspectives in security exercises and the effectiveness of purple teaming. Exploring attacker behaviors within the MITRE ATTACK framework and comparing Red Team vs Purple Team approaches in security testing.
undefined
Mar 11, 2024 • 20min

Tech Bytes: Cisco ThousandEyes Deepens Visibility for Remote Workforce Management (Sponsored)

SecOps, NetOps, and help desks need integrated data, increased context, and the ability to quickly understand interdependencies in order to take on the complex tasks facing them. That’s why ThousandEyes is now integrated with Cisco Secure Access, Cisco’s SSE solution. Tune in to learn about ThousandEyes’ deeper visibility, system process metrics, streamlined test setup, and... Read more »

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app