Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Architectural Assistant Jobs Podcasts

show episodes
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork
 
MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) Alliances serves as a gateway into the lab for industry and governmental institutions seeking a closer connection to the work, researchers, and students of CSAIL. Our podcast aims to provide inside access to topics covered by CSAIL and other leaders advancing computer science and AI research.
  continue reading
 
Here we will journey into someone's life and learn about how they got to where they are now. No journeys are alike and there are many ways to get where we want to. It doesn't always have to be the traditional way of college as we are led to believe. We’ll definitely hear stories like that but that’s just one of so many ways to progress in life. With inflation, economic change, job restructure, so many things changing, how do we even know what or where we’re going? I hope that you find these ...
  continue reading
 
Loading …
show series
 
There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
  continue reading
 
Chris Miller, Tufts Professor and author, explains how semiconductors—those tiny chips inside your phone, car, and coffee maker—have become the most critical technology in the world. Today’s global economy, military power, and AI breakthroughs all hinge on who makes the chips and where. In this episode, Dr. Miller explores how the chip industry evo…
  continue reading
 
Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
  continue reading
 
Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
  continue reading
 
Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
  continue reading
 
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
  continue reading
 
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
  continue reading
 
Cybersecurity expert and venture capitalist Andy Ellis breaks down why the smartest organizations are using AI to augment their workers, not replace them. Today’s AI systems are best used when they serve as “semi-pro” tools—fast, scalable, surprisingly effective, but still guided by some human oversight. In this conversation, he shares cautionary t…
  continue reading
 
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
  continue reading
 
Charging 50% upfront. Blogging to get work. Teaching part-time and even working as a dinner lady in the early days. From just herself to a team of six. Refusing to play the “starving artist” trope. Claire Nash isn’t just running an architecture practice - she’s rewriting the manual. In this honest, funny and practical conversation, Claire breaks do…
  continue reading
 
Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
  continue reading
 
Award-winning author, strategist and curator Lucy Bullivant joins us to spill the tea on what it really takes to shape cities that work – and why good urbanism needs more than just good design. We dive into her journey from writing "Masterplanning Futures" to curating edutainment exhibitions, chairing design review panels and working hands-on with …
  continue reading
 
Ben Richards gave up the drawing board for the developer’s desk and now he’s got four businesses, millions in property deals, and a lot of stories from the front lines. In this episode, we dig into the nitty-gritty of going from architect to real estate entrepreneur - what actually happens when you swap the studio for the site, the hard truths abou…
  continue reading
 
Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
  continue reading
 
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
  continue reading
 
Can your phone make you a safer driver? Or is it part of the problem?MIT CSAIL Professor Sam Madden shares the origin story of Cambridge Mobile Telematics, a CSAIL spinout using smartphones and AI to prevent car crashes and save lives. In this episode, Professor Madden joins host Kara Miller to explore how accelerometers, algorithms, and well-timed…
  continue reading
 
Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
  continue reading
 
Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
  continue reading
 
Finches, zebras, Darwin... and AI? 🧠🌍Two centuries after Darwin explored the Galápagos, artificial intelligence is transforming how we study and protect the natural world, rapidly expanding what’s possible in biodiversity and ecology research. In this episode, MIT CSAIL Assistant Professor Sara Beery explains how AI is unlocking new possibilities i…
  continue reading
 
We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
  continue reading
 
Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
  continue reading
 
What happens when every company becomes a tech company—and the geeks take the wheel?Renowned economist, bestselling author, and MIT Principal Research Scientist Andrew McAfee unpacks how AI is transforming corporate strategy—from cement makers to software engineers. Drawing on insights from his book The Geek Way and his startup Workhelix, McAfee sh…
  continue reading
 
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and... Read more »…
  continue reading
 
This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant …
  continue reading
 
WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of ove…
  continue reading
 
Top 5 Mistakes in Architecture Marketing with Ayo Abbas In this episode, the host welcomes Ayo Abbas of Abbas Marketing to delve into the common mistakes made in architecture marketing. They discuss the top five errors, including misconceptions about marketing's role, underestimating the importance of storytelling, and the need to keep up with soci…
  continue reading
 
Exploring Architecture and Town Planning with UPP - Journey, Challenges, and Collaboration In this episode, join us as we dive into the fascinating world of Architecture and Town Planning with the unique practice, UPP. We meet Enrique, Motti, and James, who share their journey from a cozy basement startup to a thriving interdisciplinary firm. Learn…
  continue reading
 
On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and.…
  continue reading
 
How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Rea…
  continue reading
 
Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan...…
  continue reading
 
For a full, uncut video version of this show (shot in Professor Andreas' MIT CSAIL office!), watch here: https://www.youtube.com/watch?v=QBV5Bj_NnbA MIT CSAIL Associate Professor Jacob Andreas walks listeners through how LLMs like ChatGPT evolved from academic curiosities to industry-disrupting technologies. Reflecting on the transformations he has…
  continue reading
 
There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and …
  continue reading
 
The MIT CSAIL Alliances Podcast is collaborating with MIT Sloan’s Me, Myself, and AI podcast to share a special bonus episode this month.Paul Romer once considered himself the most optimistic economist. He rightfully predicted that technology would blow up as an economic driver coming out of the inflation of the 1970s, but acknowledges he did not f…
  continue reading
 
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity…
  continue reading
 
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »…
  continue reading
 
What does it take to build a thriving architecture business from scratch? Hakan Agca, founder of CrossWorks, joins the show to share his journey from working in top firms to running his own practice. We’re diving into the nuts and bolts of the business of architecture: taking risks, building networks, hiring as well as firing, scaling sustainably, …
  continue reading
 
How AI will Change Your Job with MIT Economics Professor David Autor & The Potential of Self-Supervised Learning with CSAIL PhD Student Sharut GuptaHost: Kara MillerPart One: MIT Economics Professor David Autor says that AI is “not like a calculator where you just punch in the numbers and get the right answer. It's much harder to figure out how to …
  continue reading
 
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, parti…
  continue reading
 
Old Meets New: A Deep Dive into Heritage and Conservation Architecture In this engaging livestream, join host Stephen Drew and special guest Jonathan Goode from Lillet Architects as they explore the world of heritage and conservation architecture. Jonathan shares insights from his 20-year career in London, focusing on maintaining the essence of his…
  continue reading
 
Join us in a fascinating discussion with Holly Welsh, Associate Director at DMFK Architects, as she delves into her journey in architecture, starting from her studies in Northumbria University to her current role. Explore how DMFK has adapted to the changing landscape of commercial office spaces, from traditional designs to innovative, user-centric…
  continue reading
 
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about... Read more »…
  continue reading
 
Exploring BIM for Landscape Architecture with Alejandro Gatica In this episode, Stephen Drew hosts a discussion with Alejandro Gatica, a seasoned architect and BIM manager from Gillespie's. They delve into the intricacies of using Building Information Modeling (BIM) for landscape architecture. Alejandro shares his journey from traditional architect…
  continue reading
 
Exploring the Unconventional Career in BIM with Alfonso Monedero from Heatherwick Studio In this episode, we step inside an aesthetically pleasing office to chat with Alfonso Monedero, head of BIM at Heatherwick Studio. Alfonso shares his unique journey from a Spanish architect struggling during the 2008 architectural crisis to becoming an influent…
  continue reading
 
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our gues…
  continue reading
 
Ste Taylor’s career path is anything but traditional—starting in architecture, navigating difficult times and redundancies before ultimately rising to Head of Design at Turley. In this episode, we dive into his unexpected journey, from falling out of love with architecture to mastering design and planning on the client side. We’ll also get into the…
  continue reading
 
Ever feel like you're stuck on the traditional architect path? Enrique Soler from Willmott Dixon Interiors is here to show you why playing it safe might be holding you back. We’ll get into the nuts and bolts of working within a contractor in the role of a designer, how interior design can open up whole new avenues for architects, and why sticking t…
  continue reading
 
Have we achieved Artificial General Intelligence? MIT CSAIL Professor Manolis Kellis argues yes. Computers can do nearly every intellectual task that humans are capable of and are rapidly tackling the physical tasks. What does this mean for the future of AI integration, regulation, and development? Hear Professor Kellis’ ideas about how businesses …
  continue reading
 
Originally from Spain, Victor shares his journey from studying architecture in Madrid to becoming the Design Director of HBA Residential in Singapore. Discover the nuances of designing for luxury clients, the importance of personal branding, and how to navigate your career in the architectural industry. Whether you're looking to enter the high-end …
  continue reading
 
Aqeel Sourjah joins us to chat about his journey from architecture to managing major ESG-driven office developments at Quadrant, including YY London in Canary Wharf and OSMO in Battersea. With a background in architecture and an MSc in Real Estate Development, Aqeel brings fresh insights into the intersection of design, development, and sustainabil…
  continue reading
 
Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path—including the home user network, first mile and last mile, and the WAN. On today’s Packet Protector, we learn how ADEM can complement your network and security …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play