PACKET CAPTURE / Week of November 18-22, 2024

FYI 

  • Packet Pushers now has merch! Show your love for your favorite pod or for all of Packet Pushers. T-shirts, hoodies, mugs, hats and more are available. | SHOP NOW

JOB ALERTS

Current postings from the Packet Pushers Slack Group

NEW PODCASTS

EP 504 | NOVEMBER 18, 2024

Cisco Updates Licensing, Branding with Wi-Fi 7; Google Cloud To Require MFA

Take a Network Break! This week we cover Cisco's Wi-Fi 7 launch; in addition to new APs, Cisco also updates its branding and rolls out "simplified" licensing that bundles features you might not want. Google warns that MFA will be required for Google Cloud in early 2025, Palo Alto Networks warns of a critical bug in its Panorama management console, and more tech news. | LISTEN NOW

SPONSORED | NOVEMBER 18, 2024

MinIO Optimizes Object Storage for AI Infrastructure (Sponsored)

Today on the Tech Bytes podcast we welcome back sponsor MinIO to talk about how AI is altering the data infrastructure landscape, and why organizations are looking to build AI infrastructure on-prem. We also dig into MinIO’s AIStor, a software-only, distributed object store that offers simplicity, scalability, and performance for AI infrastructure and other high-performance storage use cases. We’ll talk about unique features in AIStor, including the ability to extract contextual data from image objects. Our guest is Ugur Tigli, CTO at MinIO. | LISTEN NOW

EP 089 | NOVEMBER 19, 2024

Return to the Office: What’s Next?

Some high-profile companies like Amazon are mandating all employees return to the office, full time. Justifications, when given, mostly revolve around productivity and innovation. We say, whoa there! The data don't back up the idea that hybrid and remote work hurt productivity (kind of the opposite) or innovation, and the real justifications likely lie elsewhere. We're digging into that, and what you should do if one of these mandates hits you! | LISTEN NOW

EP 040 | NOVEMBER 19, 2024

Personal Privacy Tools

Surveillance is a fact of life with modern technology. Today's episode covers common tools for more private communication and Web browsing. We dig into the end-to-end encryption capabilities of Signal and WhatsApp, look at the capabilities and limits of their "disappearing message" features, and discuss what information law enforcement can access from these tools. We also look at the pros and cons of personal VPNs and Tor. | LISTEN NOW

EP 079 | NOVEMBER 20, 2024

From Network Monitoring to Observability: Make the Leap for Better NetOps

Today’s Network Automation Nerds is a special cross-over episode with Total Network Operations and host Scott Robohn. We take a deep dive into network observability with the authors of the book Modern Network Observability: Davide Flores, Christian Adell, and Josh VanDeraa.We talk about how to integrate diverse data sources, the tools required, and how observability can lead to more proactive network management. We also talk about how to build a modular observability stack, and how observability supports your network automation efforts. The conversation also touches on the need for continuous learning and adaptability. | LISTEN NOW

EP 004 | NOVEMBER 21, 2024

Essential Topics in Networking: Ethernet, NAT, and More

What are the most essential topics to understand for a new networkers? Ethan Banks and Holly Metlitzky address a listener’s question about foundational topics, covering what a network is, the differences between packet-switched and circuit-switched networks, and the nature of the internet as a "network of networks." They discuss the importance of Internet Protocol (IP), Ethernet, Wi-Fi, and Network Address Translation (NAT). Plus bonus material on entry-level certifications. | LISTEN NOW

EP 008 | NOVEMBER 21, 2024

How to Hire Top Performers

Hiring is never an easy process. On today’s Technically Leadership podcast, guest Brian Hogan and host Laura Santamaria talk about how to set up a fair and structured interview process, including the use of rubrics to evaluate candidates consistently. Brian discusses the challenges of assessing cultural fit and the subjective nature of defining a top performer. He also shares strategies for effective onboarding. | LISTEN NOW

EP 009 | NOVEMBER 22, 2024

From Network Monitoring to Observability: Make the Leap for Better NetOps

Today’s Total Network Operations is a special cross-over episode with Network Automation Nerds and host Eric Chou. We take a deep dive into network observability with the authors of the book Modern Network Observability: Davide Flores, Christian Adell, and Josh VanDeraa.We talk about how to integrate diverse data sources, the tools required, and how observability can lead to more proactive network management. We also talk about how to build a modular observability stack, and how observability supports your network automation efforts. The conversation also touches on the need for continuous learning and adaptability. | LISTEN NOW

EP 759 | NOVEMBER 22, 2024

Deploying the BGP Monitoring Protocol (BMP) at ISP Scale

On today's Heavy Networking, we talk with Bart Dorlandt, a network automation solutions architect. An ISP approached Bart with a use case for the BGP Monitoring Protocol (BMP). We discuss what BMP is good for, how it works, and the solution Bart built. We dive into the architecture he designed, the challenges he ran into in dealing with millions of records, why Kafka was essential, and more.| LISTEN NOW

NEW VIDEO BYTES

LATEST BLOG POSTS

SPONSORED | NOVEMBER 18, 2024

Strengthening Remote Protocol Security: Prisma Access Browser’s Integrated Approach to SSH and RDP

The following sponsored blog post was written by Nicole Moreno, Product Marketing Manager at Palo Alto Networks. We thank Palo Alto Networks for being a sponsor.

Several months ago CISA (Cybersecurity and Infrastructure Security Agency) reported that threat actors exploited multiple vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. In this case, attackers were able to gain unauthorized access to critical enterprise systems. Despite deploying tools to detect advanced threats, the attackers were able to bypass authentication mechanisms, execute arbitrary commands with elevated privileges, and even establish root-level persistence. | READ NOW