Rephonic
Artwork for Packet Protector

Packet Protector

Packet Pushers
Cybersecurity
CISA
Cyber Incident Reporting For Critical Infrastructure Act Of 2022
Penetration Testing
Iot Security
Critical Infrastructure
Ipv6 Security
Healthcare Ransomware Attacks
Ransomware
Penetration Testing Tools
Vulnerability Assessment
WPA3
Secure Ideas
Compliance
OWASP
Hardware Supply Chain Risk
Firmware Vulnerabilities
Data Security
Default Device Configurations
Quantum Computing

Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to prov... more

PublishesWeeklyEpisodes101Founded2 years ago
Number of ListenersCategories
BusinessCareersTechnology

Listen to this Podcast

Artwork for Packet Protector

Latest Episodes

Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these... more

YouTube

Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it cro... more

YouTube

On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which... more

YouTube

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Network Break
Network BreakPacket Pushers
Heavy Wireless
Heavy WirelessPacket Pushers
Heavy Strategy
Heavy StrategyPacket Pushers
Heavy Networking
Heavy NetworkingPacket Pushers

Recent Guests

Eric Keen
Principal security consultant at Secure Ideas
Secure Ideas
Episode: PP099: The Care and Feeding of Kerberos for Windows Environments
Matthias Nagel
Proof of concept engineer at HPE Networking
Hewlett Packard Enterprise Networking
Episode: PP098: What Goes On Inside a Firewall?
Shlomi Zahia
Senior Director of Product Management of the Prisma Browser
Palo Alto Networks
Episode: PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
Jimmy Taylor
Senior Solutions Engineer
Episode: PP093: Security Priorities for 2026 – A Roundtable Discussion
Marvin Martin
Network and Cybersecurity Practitioner
Episode: PP093: Security Priorities for 2026 – A Roundtable Discussion
Abhishek Agrawal
CEO and co-founder of Material Security
Material Security
Episode: PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)
Jennifer JJ Minella
Wireless security expert and presenter at the Wireless LAN Professionals Conference
Episode: PP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of
Ben Zilberman
Director of Product Marketing at Fortinet
Fortinet
Episode: PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
Ed Harmoush
Former network engineer with AWS and Rackspace, creator of practicalnetworking.net.
practicalnetworking.net
Episode: PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates

Hosts

Jennifer JJ Minella
Host with expertise in wireless security and presenter at major technology conferences.
Drew Connery-Murray
Co-host with extensive knowledge in cybersecurity and network security.

Reviews

4.9 out of 5 stars from 23 ratings
  • Great podcast covering cyber topics many others ignore

    Good solid information shared, great guests and very useful for any cyber person to listen to.

    Apple Podcasts
    5
    Smileyivan
    Australia7 months ago
  • Another great Packet Pushers podcast.

    Thanks

    Apple Podcasts
    5
    mrowell
    Australia9 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the practical information shared, which is deemed extremely useful for cybersecurity professionals.
The content features great guests providing a wealth of knowledge on overlooked cyber topics.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#176
Canada/Technology
Apple Podcasts
#214
New Zealand/Technology

Talking Points

Recent interactions between the hosts and their guests.

PP100: Building and Securing AI Agents – A Case Study
Q: What were the biggest security challenges you had to address during deployment?
Key challenges included ensuring private data remained confidential, implementing OAuth token management with encryption and IP restrictions, creating an auditable activity trail, and deploying guardrails to block risky inputs/outputs. We also had to design a process for approving new MCP integrations and maintain strict control over which actions the agent could perform.
PP100: Building and Securing AI Agents – A Case Study
Q: What makes the shift from a bot to an agent significant from a security perspective?
Agentic mode enables the bot to use tools across platforms, perform multi-step tasks, and handle correlated data, which introduces new risk vectors. It required implementing token-based authorization, scoped access, and robust auditing to ensure actions could be traced back to an authenticated user and to enforce guardrails.
PP100: Building and Securing AI Agents – A Case Study
Q: Why did you want to build a bot in the healthcare environment?
The initial spark came from seeing that enterprise users were already using a general tool for translation and summarization, and there was a need for an enterprise-safe pathway to enable the same capabilities without exposing private documents or bypassing governance. The goal was to create a paved path that was easy to use and secure, not a hard ban.
PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
Q: What do you see as the risks and threats for the browser evolving over the next few years?
The risks will keep evolving as malicious actors continue to exploit the browser for attacks, leading to more AI-generated and spear-phishing attacks targeting identity and sensitive data.
PP087: Why SBOMs Are Cooler and More Useful Than You Think
Q: So how do we get the new one?
Every release should have an S-bomb; that should be a one-to-one.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Packet Protector

What is Packet Protector about and what kind of topics does it cover?

This podcast focuses on the critical intersection of networking and security, providing actionable insights invaluable for IT and infrastructure professionals. Topics range from fending off ransomware attacks, securing remote workers, and compliance audits, to addressing rogue IoT devices. Each episode not only covers the latest developments in the security landscape but also delves into essential themes such as wired and wireless network security, access control, cloud security, penetration testing, and security hardware and software. With a commitment to delivering both technical and strategic content, the resource is ideal for security practitioners dedicated to enhancing cybersecurity practices across various contexts.

Where can I find podcast stats for Packet Protector?

Rephonic provides a wide range of podcast stats for Packet Protector. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Packet Protector and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Packet Protector get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Packet Protector, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Packet Protector?

Rephonic provides comprehensive predictive audience data for Packet Protector, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Packet Protector have?

To see how many followers or subscribers Packet Protector has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Packet Protector?

These podcasts share a similar audience with Packet Protector:

1. Network Break
2. Heavy Wireless
3. Heavy Strategy
4. Heavy Networking
5. Total Network Operations

How many episodes of Packet Protector are there?

Packet Protector launched 2 years ago and published 101 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Packet Protector?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Packet Protector?

Rephonic pulls ratings and reviews for Packet Protector from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Packet Protector?

Rephonic provides full transcripts for episodes of Packet Protector. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Packet Protector?

Recent guests on Packet Protector include:

1. Eric Keen
2. Matthias Nagel
3. Shlomi Zahia
4. Jimmy Taylor
5. Marvin Martin
6. Abhishek Agrawal
7. Jennifer JJ Minella
8. Ben Zilberman

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days