Rephonic
Artwork for Packet Protector

Packet Protector

Packet Pushers
Cybersecurity
CISA
Cyber Incident Reporting For Critical Infrastructure Act Of 2022
Penetration Testing
Iot Security
Critical Infrastructure
Ipv6 Security
Healthcare Ransomware Attacks
Ransomware
Penetration Testing Tools
Vulnerability Assessment
WPA3
Owasp
Compliance
Secure Ideas
Firmware Vulnerabilities
Hardware Supply Chain Risk
Data Security
Default Device Configurations
Quantum Computing

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to prov... more

PublishesWeeklyEpisodes80Founded2 years ago
Number of ListenersCategories
BusinessCareersTechnology

Listen to this Podcast

Artwork for Packet Protector

Latest Episodes

Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Ne... more

You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the ... more

YouTube

Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is... more

YouTube

Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible wor... more

YouTube

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Network Break
Network BreakPacket Pushers
Heavy Wireless
Heavy WirelessPacket Pushers
Heavy Strategy
Heavy StrategyPacket Pushers
Heavy Networking
Heavy NetworkingPacket Pushers

Recent Guests

Dr. Brett Walkenhorst
CTO of Best Steel Networks
Best Steel Networks
Episode: PP076: RF Risks and How to See Unseen Threats
Wolf Goerlich
Former Duo Advisory cybersecurity expert and current Chief Security Officer in the public sector.
Episode: PP073: Identify Yourself: Authentication From SAML to FIDO2
Akili Akridge
Leader in mobile security programs for Fortune 100s and federal agencies
(No specific affiliation mentioned)
Episode: PP072: Mobile Device Threat Management
Johna Johnson
Adviser to Fortune 500 on quantum computing
Nemertes Research
Episode: PP069: A Quantum Primer: It’s More Than Cracking Crypto
Natalie Somersall
Principal Solutions Engineer for the public sector at Chainguard
Chainguard
Episode: PP068: Common Kubernetes Risks and What to Do About Them
John Howard
Head of network infrastructure at Proton, with 20 years of experience in making and breaking networks.
Proton
Episode: PP067: Protecting Secrets With Vault and TruffleHog
Chris McHenry
Chief Product Officer at Aviatrix
Aviatrix
Episode: PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
Gerald Combs
CFO of the Wireshark Foundation and Director of Open Source Projects at Sysdig
Wireshark Foundation
Episode: PP062: Hunting for Host Security and Performance Issues with Stratoshark
Andy Champagne
SVP and CTO of Akamai Labs
Akamai Labs
Episode: PP060: Subsea Cables and the Watery Risks to Critical Infrastructure

Hosts

Drew Connery-Murray
Co-host and security specialist, providing insights into network security and cybersecurity practices.
Jennifer JJ Minelli
Co-host and cybersecurity expert, specializing in technical discussions and current cybersecurity events.

Reviews

4.9 out of 5 stars from 22 ratings
  • Great podcast covering cyber topics many others ignore

    Good solid information shared, great guests and very useful for any cyber person to listen to.

    Apple Podcasts
    5
    Smileyivan
    Australiaa month ago
  • Another great Packet Pushers podcast.

    Thanks

    Apple Podcasts
    5
    mrowell
    Australia3 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Investigations into overlooked cyber topics are well-received, with many finding the information useful for professionals in the field.
Listeners appreciate the practical, actionable insights offered on security topics, emphasizing the expertise and quality of guests featured.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#128
Brazil/Technology
Apple Podcasts
#194
Saudi Arabia/Technology
Apple Podcasts
#243
Poland/Technology

Talking Points

Recent interactions between the hosts and their guests.

PP076: RF Risks and How to See Unseen Threats
Q: How do we get visibility into this broader RF environment?
First, use your wireless intrusion detection systems effectively, and second, invest in dedicated receivers for comprehensive monitoring.
PP076: RF Risks and How to See Unseen Threats
Q: What is an evil twin attack?
An evil twin attack involves creating a fake access point that imitates a legitimate network to trick devices into connecting and compromising data.
PP076: RF Risks and How to See Unseen Threats
Q: Can you talk about what the risks are, what the risk level is?
The risk level can vary depending on what you're trying to protect, but both surveillance and wireless network compromise are real concerns.
PP072: Mobile Device Threat Management
Q: How should companies deal with personal devices in a business environment?
Companies should allow personal devices with stringent controls, ensuring that corporate data is protected and that personal behavior does not compromise organizational security.
PP072: Mobile Device Threat Management
Q: What does mobile threat detection actually cover?
Mobile threat detection encompasses visibility into mobile device activity, detecting malicious applications and threats, and providing security against various attack vectors.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Packet Protector

What is Packet Protector about and what kind of topics does it cover?

This series focuses on the critical intersection of networking and cybersecurity, offering valuable insights for IT and infrastructure professionals. The episodes cover a wide variety of topics relevant to both wired and wireless security, including ransomware defense, rogue IoT device detection, compliance audits, access control, and cloud security. With a blend of current security headlines and deep dives into technical and strategic discussions, listeners can expect to gain practical information applicable to their own security challenges. The inclusion of expert guests from the industry adds depth and expertise, making it a valuable resource for anyone involved in cybersecurity, whether as a primary role or an additional responsibility.... more

Where can I find podcast stats for Packet Protector?

Rephonic provides a wide range of podcast stats for Packet Protector. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Packet Protector and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Packet Protector get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Packet Protector, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Packet Protector?

Rephonic provides comprehensive predictive audience data for Packet Protector, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Packet Protector have?

To see how many followers or subscribers Packet Protector has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Packet Protector?

These podcasts share a similar audience with Packet Protector:

1. Network Break
2. Heavy Wireless
3. Heavy Strategy
4. Heavy Networking
5. Total Network Operations

How many episodes of Packet Protector are there?

Packet Protector launched 2 years ago and published 80 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Packet Protector?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Packet Protector?

Rephonic pulls ratings and reviews for Packet Protector from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Packet Protector?

Rephonic provides full transcripts for episodes of Packet Protector. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Packet Protector?

Recent guests on Packet Protector include:

1. Dr. Brett Walkenhorst
2. Wolf Goerlich
3. Akili Akridge
4. Johna Johnson
5. Natalie Somersall
6. John Howard
7. Chris McHenry
8. Gerald Combs

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days