Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Endpoint Security Strategies Podcasts

show episodes
 
Artwork
 
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork
 
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
  continue reading
 
Artwork
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
  continue reading
 
Loading …
show series
 
In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Automox builds security into the foundation of its products, from engineering practices to company culture. You’ll learn how Automox’s “no security tax” p…
  continue reading
 
Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
  continue reading
 
CFOs Ziad Fanous (Automox) and David Mehok (formerly CFO of Q2) join host Evan Kiely to break down how IT transformation drives real business value—not just cost savings. They share candid lessons from decades in finance leadership on: Aligning IT investments with company-wide goals Avoiding the pitfalls of tool consolidation and vendor lock-in Tra…
  continue reading
 
In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL’s Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to…
  continue reading
 
Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
  continue reading
 
Happy Patch Tuesday! In this October episode, security specialists Ryan Braunstein and Mat Lee break down some of the month’s most critical vulnerabilities — and why this batch of CVEs might just be the spookiest yet. The duo dives deep into: A Unity Engine remote code execution flaw that impacts games, VR apps, and even training tools The Windows …
  continue reading
 
Jeremy Maldonado breaks down cybersecurity fundamentals from a real-world IT operations perspective. From phishing and social engineering to patching best practices and zero trust, Jeremy shares practical insights to help you protect your organization — starting with your own behavior. He covers: Why the human factor is still your biggest vulnerabi…
  continue reading
 
In this episode, Automox CISO Jason Kikta strips away the noise and focuses on the three core pillars of secure IT operations: asset inventory, patch management, and identity and access management (IAM). Jason shares firsthand stories from U.S. Cyber Command and explains why getting the basics right isn’t optional — it’s essential. Whether you’re b…
  continue reading
 
In this episode of the Automox CISO IT Podcast, host Jason Kikta, CISO at Automox, explores how CISOs can advocate for automation maturity across IT and security teams. Jason breaks down why automation is critical for: Reducing human error and noise in detection Accelerating response speed during mass exploitation events Freeing up security teams t…
  continue reading
 
What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
  continue reading
 
In this episode of Product Talk, host Peter Pflaster sits down with JoLynn Dixon, Senior Director of Product Management at Automox, to discuss the future of autonomous endpoint management (AEM) and how Automox is shaping the path forward. JoLynn shares her background in product leadership, the vision behind AEM, and why prioritizing customer feedba…
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis chats with IT Help Desk Technician Emilia Keeney about her path into IT, her experience joining Automox, and why automation is the unsung hero of IT. Emilia shares her journey through an accelerated IT program, what it’s like working on a small but mighty IT team, and why even the simplest supp…
  continue reading
 
Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
  continue reading
 
In this episode of Executive IT, host Evan Kiely sits down with Alan Taylor, COO of Maxio, to explore how IT and security shape business reliability, compliance, and growth. Alan shares his perspective as a seasoned operator in private-equity backed SaaS companies, covering: Why IT and security are non-negotiable investments for scaling businesses …
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis sits down with Katie Bleichman, Director of CX Operations and Enablement at Automox. Katie shares her inspiring journey from two decades in elementary education to leading customer experience in the SaaS and cybersecurity world. Discover how skills from the classroom translate into IT, what it …
  continue reading
 
You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
  continue reading
 
In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with dis…
  continue reading
 
Stay ahead of September 2025 Patch Tuesday. Automox experts Ryan Braunstein, Henry Smith, and Seth Hoyt break down three high-impact items you need to act on now: Hyper-V privilege escalation, XAML/Phone Link elevation paths, and an NTFS remote code execution. You’ll get: Clear patch priorities and timing. Likely attack paths and real-world detecti…
  continue reading
 
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
  continue reading
 
In the second half of this crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado shift from defining IT problems to actually building, testing, and refining solutions. They dig into choosing the right tools without getting lost in endless options, the value of learning from APIs and documentation, and why “don’t rei…
  continue reading
 
In this special crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado dive into the building blocks of IT solutions. They share practical ways to approach automation without the overwhelm—starting from defining real-world problems and breaking them into manageable steps. Along the way, they explore Linux as a proble…
  continue reading
 
Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
  continue reading
 
It’s not just a show, it's a lifeline for how to unscary a seemingly daunting career journey – no matter where you're at in your IT or security hustle. From super-talented IT cartoonist and influencer marketing service agency co-owner, Forrest Brazeal, and gifted Automox VP of Customer Experience, Charles Coaxum, to the sagely verbose CISO and VP o…
  continue reading
 
In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of resilience and adaptability in the IT field as we enter 2025. He emphasizes the need for personal and team resilience, effective communication, and the ability to learn from setbacks. The conversation covers practical steps for achieving IT resilience, includin…
  continue reading
 
Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
  continue reading
 
Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, p…
  continue reading
 
Packet Protector goes global for today’s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense’s cloud infrastructure (with the help of US ‘digital escorts’), Taiwanese chipmaker TSMC fires several employees over allegations of attempted theft of sensitive tech, an Arizona woman g…
  continue reading
 
Join Automox cybersecurity experts Ryan Braunstein and Mat Lee for August 2025’s Patch [FIX] Tuesday, covering a Hyper-V privilege escalation, an Azure Virtual Machines spoofing flaw, and four serious SQL Server vulnerabilities. Learn how attackers could chain virtualization and cloud exploits, why crafted VHDX files and spoofed certificates are da…
  continue reading
 
In Episode 103 of IGEL Weekly, host Andy Whiteside and Chris Feeney dive deep into what it means to truly rethink endpoint strategy in 2025. Using James Millington’s recent blog as a guide, they explore IGEL’s Preventive Security Model — a lightweight, adaptive, and policy-aligned approach that moves beyond the bloated, reactive stacks of the past.…
  continue reading
 
In this episode of Hands-On IT, host Landon Miles sits down with special guest Forrest Brazeal to explore the current state of IT careers and the evolving role of AI in the tech landscape. As a renowned cloud architect and co-founder of Freeman and Forrest, Forrest shares his insights on upskilling for today’s competitive job market, the real impac…
  continue reading
 
In this episode of Automox Insiders, Maddie Regis speaks with Ryan Jeziorski, a Solutions Engineer at Automox, about the importance of IT adaptability and resilience. Ryan shares his diverse career background, his current role at Automox, and insights on how organizations can maintain uninterrupted services while adapting to changes in technology. …
  continue reading
 
From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about …
  continue reading
 
Maddie Regis speaks with Tom Bowyer, Director of Security at Automox, about the intersection of IT and cybersecurity. Tom shares his career journey, the importance of collaboration between IT and security teams, and insights into SOC compliance reports. He emphasizes the need for transparency, experimentation, and proactive problem-solving in enhan…
  continue reading
 
Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off …
  continue reading
 
In this episode of Hands-On IT, host Landon Miles is joined by Automox Security Engineer Henry Smith for a deep dive into prompt engineering and how it’s transforming the way IT and security teams work with AI. From crafting high-quality prompts to auditing and hardening code using large language models like Claude and ChatGPT, Landon and Henry sha…
  continue reading
 
Discover how Automox is transforming IT reporting. In this episode, Steph Rizzuto talks with product lead Emily Pace and engineer Ben Glass about new reporting features that give you real-time visibility, alerting, and automation. Learn how IT teams are cutting reporting time from 30 hours to 1, setting up custom alerts, and making smarter decision…
  continue reading
 
CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how…
  continue reading
 
In this episode of Heroes of IT, Ashley sit down with Milton Webster to explore how his team transformed their IT operations using Automox. From reducing endpoint risk scores in record time to implementing automated Windows 11 upgrades with Worklets, Milton shares real-world wins and challenges from the frontlines of IT. Learn how a culture of proa…
  continue reading
 
In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in. Here's the setup: a user unknowingly reuses compromised credentials with the company’s SSO provider.…
  continue reading
 
In this episode of Automox's CISO IT Podcast, host Jason Kikta returns from Black Hat and DEF CON in Las Vegas to discuss one of the most talked-about IT events of the summer, and what it truly reveals about automation in IT. Contrary to popular fearmongering, Jason argues that the incident isn’t a cautionary tale against automation but a clear cal…
  continue reading
 
There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis sits down with Kat Breeggemann, Digital Customer Experience Manager at Automox, to explore her unique journey from journalism and communications into the world of customer success. Kat shares how a leap-of-faith internship opened the door to a career in CX, the pivotal moment she advocated for …
  continue reading
 
In this July 2025 Patch [FIX] Tuesday episode, Automox security experts Tom, Seth, and Cody unpack four high-impact threats — from Microsoft updates, to Linux vulns, and .zip exploit PoCs. Topics include a physical attack method bypassing BitLocker encryption (CVE-2025-48001), the looming expiration of secure boot certificates, a Linux privilege es…
  continue reading
 
In this episode of Executive IT, host Evan Kiely and guest JB Snodgrass discuss the intricacies of procurement processes, effective negotiation strategies, the importance of timing and communication, and common pitfalls to avoid when evaluating tools. JB shares insights from his extensive experience in procurement, emphasizing the need for thorough…
  continue reading
 
With a newborn at home and fueled by coffee (and Linux), Jeremy reflects on what it means to support both technology and people. In this episode, Jeremy tackles some of IT’s toughest challenges — maintaining balance, fostering gratitude, and safeguarding your mental health. Whether you’re rebooting servers at 2 am, automating backend workflows, or …
  continue reading
 
Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
  continue reading
 
Ashley sits down with Steve Engler from the Oklahoma Farm Bureau to explore his journey from taking apart his first computer to becoming a certified Automox expert and system admin. Stephen shares how he: Transitioned from the Air Force into IT Unlocked the full potential of Automox in a previously underused environment Built a hands-on lab to test…
  continue reading
 
Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play