Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
Endpoint Security Strategies Podcasts
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading

1
Product Talk – Secure by Default: Inside Automox’s Approach to Product Security, E21
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Automox builds security into the foundation of its products, from engineering practices to company culture. You’ll learn how Automox’s “no security tax” p…
…
continue reading

1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
continue reading

1
Executive IT – Expert CFO Advice on Bridging IT and Business Strategy, E01
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43CFOs Ziad Fanous (Automox) and David Mehok (formerly CFO of Q2) join host Evan Kiely to break down how IT transformation drives real business value—not just cost savings. They share candid lessons from decades in finance leadership on: Aligning IT investments with company-wide goals Avoiding the pitfalls of tool consolidation and vendor lock-in Tra…
…
continue reading

1
Closing the Endpoint Gap: Business Continuity and IGEL’s Dual-Boot Solution
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL’s Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to…
…
continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading

1
Patch [FIX] Tuesday – October 2025 [Game Engine Gremlins, Windows Hello Attacks, and Exchange Exploits], E24
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49Happy Patch Tuesday! In this October episode, security specialists Ryan Braunstein and Mat Lee break down some of the month’s most critical vulnerabilities — and why this batch of CVEs might just be the spookiest yet. The duo dives deep into: A Unity Engine remote code execution flaw that impacts games, VR apps, and even training tools The Windows …
…
continue reading

1
Automate It – Social Engineering & the Human Risk Factor, E19
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43Jeremy Maldonado breaks down cybersecurity fundamentals from a real-world IT operations perspective. From phishing and social engineering to patching best practices and zero trust, Jeremy shares practical insights to help you protect your organization — starting with your own behavior. He covers: Why the human factor is still your biggest vulnerabi…
…
continue reading

1
Hands-On IT – CVE 101: Demystifying the Three-Letter Acronym, E22
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48By Automox
…
continue reading

1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26By Packet Pushers
…
continue reading

1
CISO IT – Back to Basics: Three Essentials for Secure IT Operations, E20
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14In this episode, Automox CISO Jason Kikta strips away the noise and focuses on the three core pillars of secure IT operations: asset inventory, patch management, and identity and access management (IAM). Jason shares firsthand stories from U.S. Cyber Command and explains why getting the basics right isn’t optional — it’s essential. Whether you’re b…
…
continue reading

1
CISO IT – Automation and Security Perfection, E03
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12In this episode of the Automox CISO IT Podcast, host Jason Kikta, CISO at Automox, explores how CISOs can advocate for automation maturity across IT and security teams. Jason breaks down why automation is critical for: Reducing human error and noise in detection Accelerating response speed during mass exploitation events Freeing up security teams t…
…
continue reading

1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading

1
Product Talk – Building Toward Autonomous Endpoint Management with JoLynn Dixon, E20
15:49
15:49
Play later
Play later
Lists
Like
Liked
15:49In this episode of Product Talk, host Peter Pflaster sits down with JoLynn Dixon, Senior Director of Product Management at Automox, to discuss the future of autonomous endpoint management (AEM) and how Automox is shaping the path forward. JoLynn shares her background in product leadership, the vision behind AEM, and why prioritizing customer feedba…
…
continue reading

1
Automox Insiders – Emilia Keeney, IT Technician, E02
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14In this episode of Automox Insiders, host Maddie Regis chats with IT Help Desk Technician Emilia Keeney about her path into IT, her experience joining Automox, and why automation is the unsung hero of IT. Emilia shares her journey through an accelerated IT program, what it’s like working on a small but mighty IT team, and why even the simplest supp…
…
continue reading

1
PP079: Rethinking the Architecture of Microsegmentation
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
…
continue reading

1
Executive IT – Why Proactivity Pays in IT & Security with Maxio’s COO Alan Taylor, E06
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14In this episode of Executive IT, host Evan Kiely sits down with Alan Taylor, COO of Maxio, to explore how IT and security shape business reliability, compliance, and growth. Alan shares his perspective as a seasoned operator in private-equity backed SaaS companies, covering: Why IT and security are non-negotiable investments for scaling businesses …
…
continue reading

1
Automox Insiders – Switching Classrooms: Katie Bleichman on Redefining Her Career Path, E19
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode of Automox Insiders, host Maddie Regis sits down with Katie Bleichman, Director of CX Operations and Enablement at Automox. Katie shares her inspiring journey from two decades in elementary education to leading customer experience in the SaaS and cybersecurity world. Discover how skills from the classroom translate into IT, what it …
…
continue reading

1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading

1
CISO IT – Great Security Begins with Great IT, E11
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with dis…
…
continue reading

1
Patch [FIX] Tuesday – September 2025: [Hyper-V on the Hot Seat, Phone Link Priv-Esc, and NTFS RCE], E23
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Stay ahead of September 2025 Patch Tuesday. Automox experts Ryan Braunstein, Henry Smith, and Seth Hoyt break down three high-impact items you need to act on now: Hyper-V privilege escalation, XAML/Phone Link elevation paths, and an NTFS remote code execution. You’ll get: Clear patch priorities and timing. Likely attack paths and real-world detecti…
…
continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading

1
Hands-On IT – Building Blocks of IT: From Problems to Solutions pt. 2, E21
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58In the second half of this crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado shift from defining IT problems to actually building, testing, and refining solutions. They dig into choosing the right tools without getting lost in endless options, the value of learning from APIs and documentation, and why “don’t rei…
…
continue reading

1
Automate IT – Building Blocks of IT: From Problems to Solutions pt. 1, E18
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this special crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado dive into the building blocks of IT solutions. They share practical ways to approach automation without the overwhelm—starting from defining real-world problems and breaking them into manageable steps. Along the way, they explore Linux as a proble…
…
continue reading

1
PP076: RF Risks and How to See Unseen Threats
59:58
59:58
Play later
Play later
Lists
Like
Liked
59:58Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
…
continue reading

1
Autonomous IT, Live! – 3 Ways to Make Your Path to Director of IT Less Scary
42:28
42:28
Play later
Play later
Lists
Like
Liked
42:28It’s not just a show, it's a lifeline for how to unscary a seemingly daunting career journey – no matter where you're at in your IT or security hustle. From super-talented IT cartoonist and influencer marketing service agency co-owner, Forrest Brazeal, and gifted Automox VP of Customer Experience, Charles Coaxum, to the sagely verbose CISO and VP o…
…
continue reading

1
Automate IT – Building Resilient IT Teams and Solutions, E12
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of resilience and adaptability in the IT field as we enter 2025. He emphasizes the need for personal and team resilience, effective communication, and the ability to learn from setbacks. The conversation covers practical steps for achieving IT resilience, includin…
…
continue reading

1
PP075: Kernel Vs. User Mode In Endpoint Security Software
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
…
continue reading

1
CISO IT — Hacker Summer Camp 2025: A Recap of Black Hat & DEF CON, E19
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, p…
…
continue reading

1
PP074: News Roundup – Microsoft Dumps Digital Escorts; Palo Alto Bundles Billions Aboard CyberArk
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35Packet Protector goes global for today’s security news roundup. Microsoft discontinues a program in which engineers in China supported the US Department of Defense’s cloud infrastructure (with the help of US ‘digital escorts’), Taiwanese chipmaker TSMC fires several employees over allegations of attempted theft of sensitive tech, an Arizona woman g…
…
continue reading

1
Patch [FIX] Tuesday – August 2025: [Crafted Files, Spoofed Certs, and Good Ol' SQL Injection], E22
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Join Automox cybersecurity experts Ryan Braunstein and Mat Lee for August 2025’s Patch [FIX] Tuesday, covering a Hyper-V privilege escalation, an Azure Virtual Machines spoofing flaw, and four serious SQL Server vulnerabilities. Learn how attackers could chain virtualization and cloud exploits, why crafted VHDX files and spoofed certificates are da…
…
continue reading

1
Rethinking Endpoint Strategy: Inside IGEL’s Preventive Security Model
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02In Episode 103 of IGEL Weekly, host Andy Whiteside and Chris Feeney dive deep into what it means to truly rethink endpoint strategy in 2025. Using James Millington’s recent blog as a guide, they explore IGEL’s Preventive Security Model — a lightweight, adaptive, and policy-aligned approach that moves beyond the bloated, reactive stacks of the past.…
…
continue reading

1
Hands-On IT – The State of IT Careers and the Role of AI with Forrest Brazeal, E11
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44In this episode of Hands-On IT, host Landon Miles sits down with special guest Forrest Brazeal to explore the current state of IT careers and the evolving role of AI in the tech landscape. As a renowned cloud architect and co-founder of Freeman and Forrest, Forrest shares his insights on upskilling for today’s competitive job market, the real impac…
…
continue reading

1
Automox Insiders – Curiosity, Adaptability, and Career Growth with Ryan Jeziorski, E13
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39In this episode of Automox Insiders, Maddie Regis speaks with Ryan Jeziorski, a Solutions Engineer at Automox, about the importance of IT adaptability and resilience. Ryan shares his diverse career background, his current role at Automox, and insights on how organizations can maintain uninterrupted services while adapting to changes in technology. …
…
continue reading

1
PP073: Identify Yourself: Authentication From SAML to FIDO2
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about …
…
continue reading

1
Automox Insiders – By Your Command: The Cybersecurity Directive with Tom Bowyer, E10
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07Maddie Regis speaks with Tom Bowyer, Director of Security at Automox, about the intersection of IT and cybersecurity. Tom shares his career journey, the importance of collaboration between IT and security teams, and insights into SOC compliance reports. He emphasizes the need for transparency, experimentation, and proactive problem-solving in enhan…
…
continue reading
Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off …
…
continue reading

1
Hands-On IT – A Prompt Engineering Deep Dive with Henry Smith, E20
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04In this episode of Hands-On IT, host Landon Miles is joined by Automox Security Engineer Henry Smith for a deep dive into prompt engineering and how it’s transforming the way IT and security teams work with AI. From crafting high-quality prompts to auditing and hardening code using large language models like Claude and ChatGPT, Landon and Henry sha…
…
continue reading

1
Product Talk – Alerting, Scheduling, and Smart Decisions, E19
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17Discover how Automox is transforming IT reporting. In this episode, Steph Rizzuto talks with product lead Emily Pace and engineer Ben Glass about new reporting features that give you real-time visibility, alerting, and automation. Learn how IT teams are cutting reporting time from 30 hours to 1, setting up custom alerts, and making smarter decision…
…
continue reading

1
PP071: SSE Vendor Test Results; Can HPE and Juniper Get Along?
46:20
46:20
Play later
Play later
Lists
Like
Liked
46:20CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how…
…
continue reading

1
Heroes of IT – Sleeping Easier: Milton Webster’s Story of Risk Reduction with Automox, E18
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50In this episode of Heroes of IT, Ashley sit down with Milton Webster to explore how his team transformed their IT operations using Automox. From reducing endpoint risk scores in record time to implementing automated Windows 11 upgrades with Worklets, Milton shares real-world wins and challenges from the frontlines of IT. Learn how a culture of proa…
…
continue reading

1
Autonomous IT, Live! Inside the Breach — Identity Hijack Response Exercise, E04
38:52
38:52
Play later
Play later
Lists
Like
Liked
38:52In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in. Here's the setup: a user unknowingly reuses compromised credentials with the company’s SSO provider.…
…
continue reading
In this episode of Automox's CISO IT Podcast, host Jason Kikta returns from Black Hat and DEF CON in Las Vegas to discuss one of the most talked-about IT events of the summer, and what it truly reveals about automation in IT. Contrary to popular fearmongering, Jason argues that the incident isn’t a cautionary tale against automation but a clear cal…
…
continue reading

1
PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
…
continue reading

1
Automox Insiders – Customer Experience by Design: A Conversation with Kat Breeggemann, E18
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29In this episode of Automox Insiders, host Maddie Regis sits down with Kat Breeggemann, Digital Customer Experience Manager at Automox, to explore her unique journey from journalism and communications into the world of customer success. Kat shares how a leap-of-faith internship opened the door to a career in CX, the pivotal moment she advocated for …
…
continue reading

1
Patch [FIX] Tuesday – July 2025: [BitLocker Attack, Secure Boot Expiry, Linux chroot+sudo privesc, and Malicious .Zips], E21
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29In this July 2025 Patch [FIX] Tuesday episode, Automox security experts Tom, Seth, and Cody unpack four high-impact threats — from Microsoft updates, to Linux vulns, and .zip exploit PoCs. Topics include a physical attack method bypassing BitLocker encryption (CVE-2025-48001), the looming expiration of secure boot certificates, a Linux privilege es…
…
continue reading

1
Executive IT – The Art of Procurement: You Don’t Get What You Deserve — You Get What You Negotiate, E02
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:53In this episode of Executive IT, host Evan Kiely and guest JB Snodgrass discuss the intricacies of procurement processes, effective negotiation strategies, the importance of timing and communication, and common pitfalls to avoid when evaluating tools. JB shares insights from his extensive experience in procurement, emphasizing the need for thorough…
…
continue reading

1
Automate IT – The Human Side of IT: A Toast to Sysadmins, E17
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08With a newborn at home and fueled by coffee (and Linux), Jeremy reflects on what it means to support both technology and people. In this episode, Jeremy tackles some of IT’s toughest challenges — maintaining balance, fostering gratitude, and safeguarding your mental health. Whether you’re rebooting servers at 2 am, automating backend workflows, or …
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading

1
Heroes of IT – Optimizing IT Workflows with Automox: Insights from Steve Engler, E06
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17Ashley sits down with Steve Engler from the Oklahoma Farm Bureau to explore his journey from taking apart his first computer to becoming a certified Automox expert and system admin. Stephen shares how he: Transitioned from the Air Force into IT Unlocked the full potential of Automox in a previously underused environment Built a hands-on lab to test…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading