Rephonic
Artwork for Packet Protector

Packet Protector

Packet Pushers
Cybersecurity
CISA
Cyber Incident Reporting For Critical Infrastructure Act Of 2022
Penetration Testing
Iot Security
Critical Infrastructure
Ipv6 Security
Healthcare Ransomware Attacks
Ransomware
Penetration Testing Tools
Vulnerability Assessment
WPA3
Owasp
Compliance
Secure Ideas
Firmware Vulnerabilities
Hardware Supply Chain Risk
Data Security
Default Device Configurations
Post-Quantum Cryptography

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to prov... more

PublishesWeeklyEpisodes98Founded2 years ago
Number of ListenersCategories
BusinessCareersTechnology

Listen to this Podcast

Artwork for Packet Protector

Latest Episodes

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive... more

YouTube

Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other news, Google takes down a sprawling residential proxy ... more

YouTube

Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants, manufacturing sites, municipal power and water plants, an... more

YouTube

OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Network Break
Network BreakPacket Pushers
Heavy Wireless
Heavy WirelessPacket Pushers
Heavy Strategy
Heavy StrategyPacket Pushers
Heavy Networking
Heavy NetworkingPacket Pushers

Recent Guests

Shlomi Zahia
Senior Director of Product Management of the Prisma Browser
Palo Alto Networks
Episode: PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
Jimmy Taylor
Senior Solutions Engineer
Episode: PP093: Security Priorities for 2026 – A Roundtable Discussion
Marvin Martin
Network and Cybersecurity Practitioner
Episode: PP093: Security Priorities for 2026 – A Roundtable Discussion
Abhishek Agrawal
CEO and co-founder of Material Security
Material Security
Episode: PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)
Jennifer JJ Minella
Wireless security expert and presenter at the Wireless LAN Professionals Conference
Episode: PP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of
Ben Zilberman
Director of Product Marketing at Fortinet
Fortinet
Episode: PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
Joe Malcolm
CISO for Infrastructure Engineering at Cisco
Cisco
Episode: PP084: Inside the CVE Process With Cisco (Sponsored)
Marco Cassini
Incident Manager at Cisco's Product Security Incident Response Team (P-CERT)
Cisco
Episode: PP084: Inside the CVE Process With Cisco (Sponsored)
Asmin Hashmi
Principal Engineer at Cisco
Cisco
Episode: PP084: Inside the CVE Process With Cisco (Sponsored)

Hosts

Jennifer JJ Mannella
Co-host with expertise in cybersecurity and technical knowledge relevant to the subject matter discussed.
Drew Connery-Murray
Co-host and security specialist with robust experience in discussions about network security.

Reviews

4.9 out of 5 stars from 22 ratings
  • Great podcast covering cyber topics many others ignore

    Good solid information shared, great guests and very useful for any cyber person to listen to.

    Apple Podcasts
    5
    Smileyivan
    Australia6 months ago
  • Another great Packet Pushers podcast.

    Thanks

    Apple Podcasts
    5
    mrowell
    Australia8 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Feedback indicates that it effectively covers cybersecurity topics that many other resources might overlook.
Listeners appreciate the solid information shared and the quality of guests, noting its usefulness for cybersecurity professionals.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#215
Sweden/Technology
Apple Podcasts
#238
India/Technology

Talking Points

Recent interactions between the hosts and their guests.

PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
Q: What do you see as the risks and threats for the browser evolving over the next few years?
The risks will keep evolving as malicious actors continue to exploit the browser for attacks, leading to more AI-generated and spear-phishing attacks targeting identity and sensitive data.
PP087: Why SBOMs Are Cooler and More Useful Than You Think
Q: So how do we get the new one?
Every release should have an S-bomb; that should be a one-to-one.
PP087: Why SBOMs Are Cooler and More Useful Than You Think
Q: Can you explain what an S-bomb is and why we would want such a thing?
An S-bomb is a software bill of materials that lists all parts included in a software piece, similar to a physical bill of materials.
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
Q: Can apps still cross boundaries of segmentation and sandboxing?
Yes and no; while Apple and Android have sandboxed applications, if a malicious package is installed, it can bypass controls and gain access to sensitive data.
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
Q: Are there things I can do to specifically focus on their devices and add extra layers of security?
You should build a program specifically dedicated to high-value executives to ensure their security during travel, such as providing burner devices for use in sensitive scenarios.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Packet Protector

What is Packet Protector about and what kind of topics does it cover?

Content focuses on practical insights into networking and cybersecurity, addressing real-world challenges such as ransomware threats, securing remote workforces, and safeguarding IoT devices. Episodes often include discussions on current security news and delve into critical issues like cloud security, penetration testing, and various compliance requirements. These elements make the podcast particularly valuable for IT professionals seeking to enhance their security practices and understanding of various cybersecurity aspects.

Unique to this content is its blend of technical depth with accessible strategies, making it suitable for both seasoned cybersecurity experts and those with broader IT responsibilities looking to strengthen their sec... more

Where can I find podcast stats for Packet Protector?

Rephonic provides a wide range of podcast stats for Packet Protector. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Packet Protector and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Packet Protector get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Packet Protector, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Packet Protector?

Rephonic provides comprehensive predictive audience data for Packet Protector, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Packet Protector have?

To see how many followers or subscribers Packet Protector has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Packet Protector?

These podcasts share a similar audience with Packet Protector:

1. Network Break
2. Heavy Wireless
3. Heavy Strategy
4. Heavy Networking
5. Total Network Operations

How many episodes of Packet Protector are there?

Packet Protector launched 2 years ago and published 98 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Packet Protector?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Packet Protector?

Rephonic pulls ratings and reviews for Packet Protector from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Packet Protector?

Rephonic provides full transcripts for episodes of Packet Protector. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Packet Protector?

Recent guests on Packet Protector include:

1. Shlomi Zahia
2. Jimmy Taylor
3. Marvin Martin
4. Abhishek Agrawal
5. Jennifer JJ Minella
6. Ben Zilberman
7. Joe Malcolm
8. Marco Cassini

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days