Wil and Matt discuss tech, startups, and building really cool things with AI. Sometimes joined by (actual expert) friends.
…
continue reading
Mode Context Protocol Podcasts
NSScreencast features weekly bite-sized videso on iOS development. This free feed is just a sample of what is available for members. Subscribe today at https://nsscreencast.com.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading

1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading

1
Growth with Luke Harries from ElevenLabs, Building, Hiring and Automating the Best Horizontal AI Voice Platform, Backed by Research
51:49
51:49
Play later
Play later
Lists
Like
Liked
51:49"It's always the best." Chapters 00:00 Introduction and Setting the Stage 02:34 Luke's Journey to ElevenLabs 04:54 Growth Strategies and Hiring at ElevenLabs 06:58 Understanding Growth Teams 09:50 The Role of Product in Growth 12:33 Working Dynamics at ElevenLabs 15:15 Use Cases for ElevenLabs' Platforms 18:04 Voice Agents and Market Opportunities …
…
continue reading

1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26By Packet Pushers
…
continue reading

1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading

1
PP079: Rethinking the Architecture of Microsegmentation
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
…
continue reading

1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading

1
Building Software With Thorsten Ball: Decoupling Code for Agents, Finding "Your Pain" and Germans Use the Winky Face
1:10:37
1:10:37
Play later
Play later
Lists
Like
Liked
1:10:37"Elderly German Landlord.. she would use these winky face emojis" "Memes in blogs feel cheap" "Dude.... you didn't even run this" Takeaways The podcast jingle was created using AI technology. Thorsten's journey into programming began in his teenage years. He transitioned from music to software engineering after realizing his passion for coding. The…
…
continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading

1
PP076: RF Risks and How to See Unseen Threats
59:58
59:58
Play later
Play later
Lists
Like
Liked
59:58Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
…
continue reading

1
In Person!!! Topic of Agent Payments, Friendly Acquisitions, GPT-5, Endless Model Name and Many Free Ideas
1:10:45
1:10:45
Play later
Play later
Lists
Like
Liked
1:10:45Chapters 00:00 Introduction and Context of the Podcast 07:23 Updates on SimplePoll and AI Integration 18:14 Telemetry and Continuous Improvement in Development 24:30 Acquisitions and Industry Insights 32:37 Discussion on GPT-5 and Future of AI Models 39:13 Consumer Experience with AI Models 48:29 The Future of AI Content Verification 58:17 The Impa…
…
continue reading

1
PP075: Kernel Vs. User Mode In Endpoint Security Software
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
…
continue reading

1
PP074: News Roundup – Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35Packet Protector goes global for today’s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense’s cloud infrastructure (with the help of US ‘digital escorts’), Taiwanese chipmaker TSMC fires several employees over allegations of attempted theft of sensitive tech, an Arizona woman g…
…
continue reading

1
Uncut with Danilo Leal, Design Engineer at Zed, Prototyping in React and Built in Rust, Designing for an AI Assisted UX
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42TDLR: 10 episodes in and we are going full uncut conversation with Danilo Leal. One of the magician Design Engineers working on the Zed code editor. “I'll be making a jingle” “We prototype everything in React before Rust” Danilo Leal represents a new breed of designer and engineer. The role of design is becoming more approachable with technology. A…
…
continue reading

1
Sub Agent or Super Agent, MCP UI Over Lunch, Bitter Lesson Learnings, Locking in on Prompts and Trying to Live in the Future
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46TLDR Matt caught whitebait for dinner during his outdoor adventures. Wing foiling is a new sport gaining popularity. Sub agents are necessary for exploring context windows in AI. A2A and MCP servers are the future of AI integration. AI-assisted code review can streamline the development process. Prompting techniques are evolving and require careful…
…
continue reading

1
PP073: Identify Yourself: Authentication From SAML to FIDO2
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about …
…
continue reading
Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off …
…
continue reading

1
PP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?
46:20
46:20
Play later
Play later
Lists
Like
Liked
46:20CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how…
…
continue reading

1
Study Says AI Makes Developers Slower? F1 Movie Review, Coding and Testing for AI, Free Perplexity and Free Ideas
1:09:54
1:09:54
Play later
Play later
Lists
Like
Liked
1:09:54News The pod has twitter/x - https://x.com/badagentpod Wil’s new brand - tritanclub.com Links Boris Tane post on Cloudflare DOs + Drizzle - https://boristane.com/blog/durable-objects-database-per-user/ Experience with Claude Code - https://sankalp.bearblog.dev/my-claude-code-experience-after-2-weeks-of-usage/ Focus on inputs not outputs: https://jo…
…
continue reading

1
PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
…
continue reading

1
Sunil Pai, Agents SDK at Cloudflare, Becoming Accidentally Important at Work, React Core Team, Durable Objects EXPLAINED and Future of Computing
47:20
47:20
Play later
Play later
Lists
Like
Liked
47:20“UI is so over” “If all humans were perfect robots” "I just got stoned and did open source." "I rewrote their entire CLI." Sunil Pai's Backstory and Career Journey from India to London The Evolution of React and Sunil's Contributions Transition to Cloudflare and the Concept of Durable Objects Building PartyKit and Its Impact The Role of AI Agents a…
…
continue reading

1
Massive Trail Marathons, Got Parekh'd, Context Engineering Strikes Back, Armin Ronacher Shares Tips and .env Suckkksss
1:01:57
1:01:57
Play later
Play later
Lists
Like
Liked
1:01:57"Bullish on claude code" "I found Soham in our ATS" "these things have been like RLHF to fuck" Vibe Tunnel - https://vibetunnel.sh/ Armin Ronacher on Simon Willison’s blog - https://simonwillison.net/tags/armin-ronacher/ Amp by Sourcegraph - https://ampcode.com/ Matt is finalizing his event for AI Demo Days. Juliette completed a challenging maratho…
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading

1
CLOUDFLARE CONTAINERS!!! Claude Code vs AI SDK Showdown, Offsite Fun, United Sucks and Wil Goes Out Out in Berlin
45:32
45:32
Play later
Play later
Lists
Like
Liked
45:32"Context window… kaboom" "Am I gonna get cancelled for this" "United is not a good airline" "Just make more money." Takeaways Integrations bring people together in meaningful ways. Video podcasts are gaining popularity among Gen Z audiences. Editing podcasts can be time-consuming but rewarding. Family events can provide a refreshing break from work…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading

1
Structuring Codebases for AI, Claude Code in GitHub, Scale Acquired! Granola Cafe, AI Rules and More MCP
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46"Cortex podcast is God tier" "Claude Code is the best devtool this year" "gotta structure your codebase for AI" Stuff we talked about: Cortex podcast - https://www.relay.fm/cortex Claude Code in Github - https://github.com/anthropics/claude-code-action Shippie - https://github.com/mattzcarey/shippie Amp - https://sourcegraph.com/amp Claude Code Git…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading

1
AI Engineering is Dead? Hectic Stag Dos, Event FOMO or Not to Go and Agent Evals are HARRDDD
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12"We're always live." "I think evals are so hard." "AI engineering is dead." Stag do experiences can lead to unexpected personal updates. Consumer behavior in Las Vegas highlights the allure of gambling despite its downsides. Podcasting can encompass news, guest interviews, and personal stories. Traveling to Peru offers breathtaking experiences like…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading

1
With Lu Wilson, Teach was the Hardest Demo, Dev Rel?, Return to Office, Windsurf Acquisition and more MCP
1:10:07
1:10:07
Play later
Play later
Lists
Like
Liked
1:10:07Lu, Wilhelm, and Matt discuss the evolution and features of tldraw, "a very good whiteboard". They explore the office culture, community engagement through demos, and the integration of AI technologies. The challenges faced in AI development and the importance of developer relations are also highlighted, emphasizing the need for effective communica…
…
continue reading

1
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
…
continue reading

1
Opencode, Cloudflare, MCP MCP MCP, Scented Bin Liners and Broken Garmin Watches
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Wilhelm and Matt are starting a podcast together. They discuss the differences in humor between the UK and the US. Scented trash bags are surprisingly beneficial. Matt's Garmin watch has malfunctioned after years of use. Wilhelm is adjusting to life in San Francisco, noting its high cost of living. They plan to include guests in their podcast to en…
…
continue reading

1
PP062: Hunting for Host Security and Performance Issues with Stratoshark
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
PP058: Network Discovery with NMAP: You’ve Got Swaptions
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
…
continue reading

1
PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
…
continue reading
We'll first take a look at the AudioKit Cookbook application, which is a great way to see what is possible. Once we've seen some of the capabilities we can look at the code to get an idea of how to build things with AudioKit.We'll then add a package collection in Xcode to make bringing in the various AudioKit package dependencies a little easier.…
…
continue reading
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and... Read more »…
…
continue reading
We kick off a new series on audio programming for iOS using AudioKit. Before we jump into code, however, it is important to get a foundational understanding of how audio works and how it is represented by the audio hardware (sound cards, etc) that the software integrates with. In this episode we will talk about the fundamentals of audio, learn some…
…
continue reading

1
PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant …
…
continue reading

1
PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of ove…
…
continue reading

1
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and.…
…
continue reading

1
PP052: The State of the Network Security Market In 2025
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Rea…
…
continue reading

1
PP051: Security Certifications From Beginner to Advanced
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan...…
…
continue reading

1
PP050: Understanding–and Protecting Yourself From–the Malware Economy
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and …
…
continue reading

1
PP049: CSMM – A Practical Model for Improving Your Cloud Security
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity…
…
continue reading