

The Everything Feed - All Packet Pushers Pods
Packet Pushers
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Episodes
Mentioned books

Mar 20, 2024 • 50min
D2C237: Managing Medical IoT Devices on AWS
In this podcast episode, Randy Horton from Orthogonal and Ian Sutcliffe from AWS discuss the complexities of supporting regulated medical devices in the cloud. They explore the challenges of adhering to regulations, the importance of security, and the need for robust frameworks. The conversation highlights the non-prescriptive nature of regulations, encouraging best practices rather than... Read more »

Mar 20, 2024 • 34min
NAN058: The Story of containerlab with Roman Dodin (Part 2)
Welcome back for Part 2 of Eric’s interview with Roman Dodin, co-creator of containerlab. Roman describes containerlab as a “lab as code” tool that quickly and easily creates virtual networking topologies. With increased automation and containerization in network engineering, the tool’s popularity has exploded. We talk about how folks contribute to containerlab’s development and what... Read more »

Mar 19, 2024 • 35min
HS068: What’s the Point of Having a Tech Strategy?
What does having a tech strategy actually do for an organization? In today’s episode, Greg and Johna highlight how a good tech strategy benefits a company: creates a foundation of first principles, reduces bias in vendor decisions, better allocates human resources, kills bad ideas, sunsets projects, and makes meetings a little more enjoyable and harmonious.... Read more »

Mar 19, 2024 • 49min
PP006: Effective Security for Small IT Shops
Explore the challenges of cybersecurity in small IT shops, including priority setting, safeguarding sensitive data, and the importance of constant vigilance. Learn about the significance of security budgets and leadership buy-in, as well as the value of penetration testing and user awareness training. Discover the collaborative nature of cybersecurity in small IT environments and the benefits of community networking for professionals.

Mar 18, 2024 • 16min
Tech Bytes: Protecting Connected Medical Devices With Palo Alto Networks IoT Security (Sponsored)
Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best practices to manage medical device risks and ensure the... Read more »

Mar 18, 2024 • 53min
NB470: NetBox Labs Adds On-Prem Support; ASML Vs. The Netherlands
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »

Mar 15, 2024 • 48min
HN725: Standing up a DC Network Using Terraform
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and... Read more »

Mar 13, 2024 • 47min
NAN057: Nile Incorporates Network Automation from the Ground Up (Sponsored)
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »

Mar 12, 2024 • 43min
PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense
Discussing the roles of red, blue, and purple teams in cybersecurity, emphasizing collaborative attack simulations and defense strategies. Highlighting the importance of diverse perspectives in security exercises and the effectiveness of purple teaming. Exploring attacker behaviors within the MITRE ATTACK framework and comparing Red Team vs Purple Team approaches in security testing.

Mar 11, 2024 • 20min
Tech Bytes: Cisco ThousandEyes Deepens Visibility for Remote Workforce Management (Sponsored)
SecOps, NetOps, and help desks need integrated data, increased context, and the ability to quickly understand interdependencies in order to take on the complex tasks facing them. That’s why ThousandEyes is now integrated with Cisco Secure Access, Cisco’s SSE solution. Tune in to learn about ThousandEyes’ deeper visibility, system process metrics, streamlined test setup, and... Read more »


