Curated content, insights and opportunities designed to elevate careers and strengthen teams in Architecture and Design.
…
continue reading
Architectural Assistant Jobs Podcasts
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) Alliances serves as a gateway into the lab for industry and governmental institutions seeking a closer connection to the work, researchers, and students of CSAIL. Our podcast aims to provide inside access to topics covered by CSAIL and other leaders advancing computer science and AI research.
…
continue reading
Here we will journey into someone's life and learn about how they got to where they are now. No journeys are alike and there are many ways to get where we want to. It doesn't always have to be the traditional way of college as we are led to believe. We’ll definitely hear stories like that but that’s just one of so many ways to progress in life. With inflation, economic change, job restructure, so many things changing, how do we even know what or where we’re going? I hope that you find these ...
…
continue reading

1
PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
…
continue reading

1
The Promise and Peril of Computer Chips with Tufts Professor Chris Miller
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34Chris Miller, Tufts Professor and author, explains how semiconductors—those tiny chips inside your phone, car, and coffee maker—have become the most critical technology in the world. Today’s global economy, military power, and AI breakthroughs all hinge on who makes the chips and where. In this episode, Dr. Miller explores how the chip industry evo…
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading

1
Beyond the Hype: How AI is Actually Reshaping Business with Andy Ellis
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03Cybersecurity expert and venture capitalist Andy Ellis breaks down why the smartest organizations are using AI to augment their workers, not replace them. Today’s AI systems are best used when they serve as “semi-pro” tools—fast, scalable, surprisingly effective, but still guided by some human oversight. In this conversation, he shares cautionary t…
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading

1
Small Practice, Big Impact: Claire Nash on Cash Flow, Clients and Confidence
56:23
56:23
Play later
Play later
Lists
Like
Liked
56:23Charging 50% upfront. Blogging to get work. Teaching part-time and even working as a dinner lady in the early days. From just herself to a team of six. Refusing to play the “starving artist” trope. Claire Nash isn’t just running an architecture practice - she’s rewriting the manual. In this honest, funny and practical conversation, Claire breaks do…
…
continue reading

1
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
…
continue reading

1
Writing, Curating, Strategising: Lucy Bullivant’s Urbanist Toolkit
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57Award-winning author, strategist and curator Lucy Bullivant joins us to spill the tea on what it really takes to shape cities that work – and why good urbanism needs more than just good design. We dive into her journey from writing "Masterplanning Futures" to curating edutainment exhibitions, chairing design review panels and working hands-on with …
…
continue reading

1
Why Most Architects Shouldn’t Be Developers (But Some Should) ft. Ben Richards
57:37
57:37
Play later
Play later
Lists
Like
Liked
57:37Ben Richards gave up the drawing board for the developer’s desk and now he’s got four businesses, millions in property deals, and a lot of stories from the front lines. In this episode, we dig into the nitty-gritty of going from architect to real estate entrepreneur - what actually happens when you swap the studio for the site, the hard truths abou…
…
continue reading

1
PP062: Hunting for Host Security and Performance Issues with Stratoshark
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
Driving Behavior by Design: MIT CSAIL Professor Sam Madden on the Science of Safer Roads with AI
34:20
34:20
Play later
Play later
Lists
Like
Liked
34:20Can your phone make you a safer driver? Or is it part of the problem?MIT CSAIL Professor Sam Madden shares the origin story of Cambridge Mobile Telematics, a CSAIL spinout using smartphones and AI to prevent car crashes and save lives. In this episode, Professor Madden joins host Kara Miller to explore how accelerometers, algorithms, and well-timed…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
How AI Can Help Save the Natural World, with MIT CSAIL Assistant Professor Sara Beery
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11Finches, zebras, Darwin... and AI? 🧠🌍Two centuries after Darwin explored the Galápagos, artificial intelligence is transforming how we study and protect the natural world, rapidly expanding what’s possible in biodiversity and ecology research. In this episode, MIT CSAIL Assistant Professor Sara Beery explains how AI is unlocking new possibilities i…
…
continue reading

1
PP058: Network Discovery with NMAP: You’ve Got Swaptions
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
…
continue reading

1
PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
…
continue reading

1
AI's Hidden Business Effects: MIT Principal Research Scientist Andrew McAfee Explores how AI is Affecting Enterprise
47:27
47:27
Play later
Play later
Lists
Like
Liked
47:27What happens when every company becomes a tech company—and the geeks take the wheel?Renowned economist, bestselling author, and MIT Principal Research Scientist Andrew McAfee unpacks how AI is transforming corporate strategy—from cement makers to software engineers. Drawing on insights from his book The Geek Way and his startup Workhelix, McAfee sh…
…
continue reading
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and... Read more »…
…
continue reading

1
PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant …
…
continue reading

1
PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of ove…
…
continue reading

1
Oops! Did I Do That? Ayo Abbas Spills the Tea on the Top 5 Architecture Marketing Mistakes
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26Top 5 Mistakes in Architecture Marketing with Ayo Abbas In this episode, the host welcomes Ayo Abbas of Abbas Marketing to delve into the common mistakes made in architecture marketing. They discuss the top five errors, including misconceptions about marketing's role, underestimating the importance of storytelling, and the need to keep up with soci…
…
continue reading

1
Exploring Architecture and Town Planning with UPP - Journey, Challenges, and Collaboration
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Exploring Architecture and Town Planning with UPP - Journey, Challenges, and Collaboration In this episode, join us as we dive into the fascinating world of Architecture and Town Planning with the unique practice, UPP. We meet Enrique, Motti, and James, who share their journey from a cozy basement startup to a thriving interdisciplinary firm. Learn…
…
continue reading

1
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and.…
…
continue reading

1
PP052: The State of the Network Security Market In 2025
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Rea…
…
continue reading

1
PP051: Security Certifications From Beginner to Advanced
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan...…
…
continue reading

1
AI's Language Leap: MIT CSAIL Associate Professor Jacob Andreas Explores NLP and LLMs
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49For a full, uncut video version of this show (shot in Professor Andreas' MIT CSAIL office!), watch here: https://www.youtube.com/watch?v=QBV5Bj_NnbA MIT CSAIL Associate Professor Jacob Andreas walks listeners through how LLMs like ChatGPT evolved from academic curiosities to industry-disrupting technologies. Reflecting on the transformations he has…
…
continue reading

1
PP050: Understanding–and Protecting Yourself From–the Malware Economy
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and …
…
continue reading

1
Me, Myself & AI: AI Hype and Skepticism with Economist Paul Romer (Bonus Episode!)
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52The MIT CSAIL Alliances Podcast is collaborating with MIT Sloan’s Me, Myself, and AI podcast to share a special bonus episode this month.Paul Romer once considered himself the most optimistic economist. He rightfully predicted that technology would blow up as an economic driver coming out of the inflation of the 1970s, but acknowledges he did not f…
…
continue reading

1
PP049: CSMM – A Practical Model for Improving Your Cloud Security
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity…
…
continue reading

1
PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More
39:08
39:08
Play later
Play later
Lists
Like
Liked
39:08JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »…
…
continue reading

1
The Business of Architecture: Risks, Rewards, and Real Talk with Hakan Agca at Cross Works
51:03
51:03
Play later
Play later
Lists
Like
Liked
51:03What does it take to build a thriving architecture business from scratch? Hakan Agca, founder of CrossWorks, joins the show to share his journey from working in top firms to running his own practice. We’re diving into the nuts and bolts of the business of architecture: taking risks, building networks, hiring as well as firing, scaling sustainably, …
…
continue reading

1
MIT CSAIL Podcast: How AI will Change Your Job and The Potential of Self-Supervised Learning
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17How AI will Change Your Job with MIT Economics Professor David Autor & The Potential of Self-Supervised Learning with CSAIL PhD Student Sharut GuptaHost: Kara MillerPart One: MIT Economics Professor David Autor says that AI is “not like a calculator where you just punch in the numbers and get the right answer. It's much harder to figure out how to …
…
continue reading

1
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, parti…
…
continue reading

1
What is Heritage and Conservation, Ft. Jonathan Goode at Le Lay Architects
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12Old Meets New: A Deep Dive into Heritage and Conservation Architecture In this engaging livestream, join host Stephen Drew and special guest Jonathan Goode from Lillet Architects as they explore the world of heritage and conservation architecture. Jonathan shares insights from his 20-year career in London, focusing on maintaining the essence of his…
…
continue reading

1
Reimagining Workplaces: Exploring the Future of Office Design with Hollie Welch at dMFK
40:01
40:01
Play later
Play later
Lists
Like
Liked
40:01Join us in a fascinating discussion with Holly Welsh, Associate Director at DMFK Architects, as she delves into her journey in architecture, starting from her studies in Northumbria University to her current role. Explore how DMFK has adapted to the changing landscape of commercial office spaces, from traditional designs to innovative, user-centric…
…
continue reading

1
PP046: IPv6 Security, Migration, and Adoption
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about... Read more »…
…
continue reading

1
How BIM is Changing Landscape Architecture: A Conversation with Alejandro Gatica at Gillespies
49:56
49:56
Play later
Play later
Lists
Like
Liked
49:56Exploring BIM for Landscape Architecture with Alejandro Gatica In this episode, Stephen Drew hosts a discussion with Alejandro Gatica, a seasoned architect and BIM manager from Gillespie's. They delve into the intricacies of using Building Information Modeling (BIM) for landscape architecture. Alejandro shares his journey from traditional architect…
…
continue reading

1
BIM-ing Innovation: How Alfonso Monedero Bridges Tech and Creativity at Heatherwick Studio
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Exploring the Unconventional Career in BIM with Alfonso Monedero from Heatherwick Studio In this episode, we step inside an aesthetically pleasing office to chat with Alfonso Monedero, head of BIM at Heatherwick Studio. Alfonso shares his unique journey from a Spanish architect struggling during the 2008 architectural crisis to becoming an influent…
…
continue reading

1
PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our gues…
…
continue reading

1
From Setbacks to Success: Ste Taylor’s Journey to Head of Design at Turley
51:36
51:36
Play later
Play later
Lists
Like
Liked
51:36Ste Taylor’s career path is anything but traditional—starting in architecture, navigating difficult times and redundancies before ultimately rising to Head of Design at Turley. In this episode, we dive into his unexpected journey, from falling out of love with architecture to mastering design and planning on the client side. We’ll also get into the…
…
continue reading

1
Breaking the Architect Mold: Enrique Soler’s Shift to Interior Design at Willmott Dixon Interiors
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26Ever feel like you're stuck on the traditional architect path? Enrique Soler from Willmott Dixon Interiors is here to show you why playing it safe might be holding you back. We’ll get into the nuts and bolts of working within a contractor in the role of a designer, how interior design can open up whole new avenues for architects, and why sticking t…
…
continue reading

1
The Revolutionary Potential of AI with CSAIL Professor Manolis Kellis
43:32
43:32
Play later
Play later
Lists
Like
Liked
43:32Have we achieved Artificial General Intelligence? MIT CSAIL Professor Manolis Kellis argues yes. Computers can do nearly every intellectual task that humans are capable of and are rapidly tackling the physical tasks. What does this mean for the future of AI integration, regulation, and development? Hear Professor Kellis’ ideas about how businesses …
…
continue reading

1
Designing Without Limits: Lessons from the Ultra-Luxury World, ft Victor LG at HBA
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10Originally from Spain, Victor shares his journey from studying architecture in Madrid to becoming the Design Director of HBA Residential in Singapore. Discover the nuances of designing for luxury clients, the importance of personal branding, and how to navigate your career in the architectural industry. Whether you're looking to enter the high-end …
…
continue reading

1
Switching Careers from Architecture to Real Estate: Ft. Aqeel Sourjah at Quadrant Estates
48:40
48:40
Play later
Play later
Lists
Like
Liked
48:40Aqeel Sourjah joins us to chat about his journey from architecture to managing major ESG-driven office developments at Quadrant, including YY London in Canary Wharf and OSMO in Battersea. With a background in architecture and an MSc in Real Estate Development, Aqeel brings fresh insights into the intersection of design, development, and sustainabil…
…
continue reading

1
PP044: Optimizing Security and Performance with ADEM and App Acceleration (Sponsored)
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path—including the home user network, first mile and last mile, and the WAN. On today’s Packet Protector, we learn how ADEM can complement your network and security …
…
continue reading