The Everything Feed - All Packet Pushers Pods
Channel Details
The Everything Feed - All Packet Pushers Pods
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Recent Episodes
1493 episodesHS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong
To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity...
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that n...
Tech Bytes: Why Equinix Should Be Part of Your AI Network Strategy (Sponsored)
AI infrastructure conversations tend to be dominated by GPUs, data center buildouts, and power and water consumption. But networks also play a crucial...
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
The architecture and tech stack of a Secure Access Service Edge (SASE) solution will influence how the service performs, the robustness of its securit...
TNO047: Advice From Both Sides of the Network Aisle
Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough t...
IPB186: An Inside Look at RFC 9872 for Discovering v6 Prefixes
RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC,...
N4N041: Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB)
If you’ve ever wondered what the difference is between a Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB), today’s show is f...
D2DO285: The Death of IaC Has Been Greatly Exaggerated
While declaring the death of Infrastructure as Code (IaC) or Terraform may get you clicks on LinkedIn, IaC is alive and kicking. On today’s Day Two De...
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and...
HW063: Designing a Wireless-First Office
A wireless-first office is a sensible goal these days when most laptops don’t have an Ethernet port and lots of devices use Wi-Fi. Wireless and networ...
NB548: Broadcom Brings Chips to Wi-Fi 8 Party; Attorneys General Scrutinize HPE/Juniper Settlement
Take a Network Break! On today’s coverage, F5 releases an emergency security update after state-backed threat actors breach internal systems, and Nort...
HN801: Will a Natural Language Interface (NLI) Replace Your CLI?
Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of n...
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsore...
LIU002: Do You Need a College Degree to Succeed in IT?
A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need th...
TCG060: Rockets, Networks, and Markets With Michael Reid
Michael Reid went from studying aerospace engineering to becoming CEO at Megaport, a global network-as-a-service platform. How did he get there, and w...
NAN103: The Evolution of Multi-Cloud Networking
We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud pod...
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offe...
HS114: In or Out? Deciding Which IT Functions to Bring In or Push Out
In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key fun...
NB547: New Cisco Router Targets AI DCI; Salesforce Launches ServiceNow Competitor
Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two cri...
TNO045: IP and Optical Integration: Automation Across Layers
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-gener...
HN800: Root Cause Analysis for the Entire Stack (Sponsored)
Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue...
IPB185: When IPv6 VPN and DNS Don’t Cooperate
Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect,...
N4N040: Mock Interview for a Network Administration Job
The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applyin...
D2DO284: AI, MCP, and the Identities that Tie Them All Together
AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agent...
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop...
HW062: Designing Access Points For the Enterprise
When vendors design and build enterprise Wi-Fi access points, they must balance performance and cost. With the help of guest Rosalie Bibona, Product M...
NB546: Meta Mulls GPU Startup Purchase; Indirect Prompt Injection Exacerbates AI Risks
Take a Network Break! We start with a two-part listener follow-up and sound alarms about a serious flaw in Termix and tens of thousands of still-vulne...
Tech Bytes: Building a UEC-Supported AI Data Center Fabric With Nokia (Sponsored)
The network plays a key role in AI model and inference training. On today’s Tech Bytes podcast, sponsored by Nokia, we talk about why you need a high-...
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is movin...
HN799: Multi-Homing IPv6 to Your Home Lab
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but t...
LIU001: Growing Pains
Starting any new endeavor is hard. That’s particularly true for a career in tech. And that’s the reason Alexis Bertholf and Kevin Nanns are launching...
TCG059: From Source of Truth to Knowledge Graph – Rethinking Network Data
Network automation has a data problem. Traditional tools may hit limitations when managing complex infrastructure relationships. We explore how OpsMil...
NAN102: Practical Applications for AI in Network Automation
As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joini...
PP080: The State of OT Risks in 2025 (and What to Do About Them)
What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security f...
HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship
Sure, some days you hate your job. But how do you know when an IT position has gone from being run-of-the-mill annoying to truly toxic? And what do yo...
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall...
HN798: Fortinet Offers a SOC Every Org Can Grow Into (Sponsored)
On today’s Heavy Networking: the Security Operations Center, or SOC. When I think of a SOC, I picture a miniature version of NASA’s mission control: l...
TNO043: Under the Manhole Cover: The Architecture of an Internet Exchange
In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those thing...
IPB184: IPv6 Basics: Dual-Stack
We’re diving into another IPv6 Basics today with the topic of dual-stack, which means running the IPv4 and IPv6 protocol stacks simultaneously. We get...
N4N039: Configuring an IPsec Tunnel
We dive back into the world of IPsec with an episode dedicated to configuring IPsec tunnels. After discussing a listener comment regarding transport m...