The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation w…
Greg Ferro, Ethan Banks, Drew Conry-Murray, Chris Wahl, Scott Lowe
Listeners of Packet Pushers - Full Podcast Feed that love the show mention: packet pushers, greg and ethan, networking industry, best networking podcast, infrastructure, vendors, bones, tech podcast, data, technology, amazing job, touch, example, date, highly recommended, analysis, commute, resource, believe, deep.
The Packet Pushers - Full Podcast Feed is an incredible podcast that has been keeping listeners informed and engaged for years. With a focus on IT and the networking industry, this podcast provides a wealth of information and helps create a sense of community among its listeners. The hosts are knowledgeable and interactive, making the show engaging and enjoyable.
One of the best aspects of this podcast is the depth of information it provides. Whether you're a networking professional or simply interested in technology, this podcast covers a wide range of topics that will keep you up-to-date with the latest trends and developments in the field. The guests on the show are experts in their respective areas, providing valuable insights and analysis.
Another great aspect of this podcast is its interactive nature. The hosts are appreciative of their fan base and frequently invite them to participate in discussions and ask questions. This creates a sense of community among listeners, allowing them to feel involved and part of something greater.
While there aren't many negative aspects to this podcast, one minor downside could be that some episodes may be too technical for casual listeners. However, for those who are interested in networking or work in the IT industry, this level of detail is highly beneficial.
In conclusion, The Packet Pushers - Full Podcast Feed is an outstanding podcast that delivers valuable information about IT, networking, and the industry as a whole. With knowledgeable hosts and engaging content, it's no wonder that this podcast has garnered such a devoted fan base over the years.

Scott Robohn and networking expert Russ White dive into the concept of design for operations. That is, they look at how to connect the design of a protocol or solution to how people are actually going to use it. They examine how protocol designers often overlook the teams that must operate them, creating some “inoperable”... Read more »

Palo Alto Networks released a slew of product news at the 2026 RSA conference around AI security, SASE, and a new certificate lifecycle management offering. On today's Heavy Networking, sponsored by Palo Alto Networks, Ethan and Drew dig into these announcements to get details about how they work. They also talk about the risks of... Read more »

Alexis Bertholf and Kevin Nanns sit down for a conversation with Andrei Istrate, Senior Mobile Developer at Toptal. Andrei has taken the “mobile” part of his job literally: he’s built a life around travel and experiences rather than settling in one location. Andrei talks about the travel opportunities that remote work has presented, how he... Read more »

William Collins and Eyvonne Sharp invite Skylar Sands, Senior Automation Engineer at World Wide Technology, to discuss what it means to integrate AI into the daily workflow in a meaningful way. Together they break down the shift in the automation engineer's role now that AI can instantly generate the “toolkit” of Python, Ansible, and Bash,... Read more »

Eric Chou is joined by returning guest, Danny Wade a.k.a. Devnet Dan, to unpack everything you missed from AutoCon 4. AutoCon 4 had a heavy focus on AI's role in network automation and Danny was there in person, has already blogged about his insights, and is here to break down the trends, takeaways, and key... Read more »

On today's sponsored episode, Ned Bellavance and Kyler Middleton welcome guest Marcin Wyszynski, Head of R&D at Spacelift to guide them through the potential future of IaC and how AI is changing the landscape of developer productivity, especially around infrastructure. They discuss two of Spacelift’s products, Spacelift Intent and Spacelift Intelligence. Spacelift Intent is an... Read more »

Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »

How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon? John Burke and Johna Johnson revisit the signs indicating that an AI bubble is in full swing and pointing to the potential for collapse in the near term. Doomsaying having been... Read more »

Take a Network Break! We sound a red alert about a swarm of critical D-Link vulnerabilities. In this week’s news, CISA warns organizations to harden endpoint management systems in the wake of a cyberattack that used the target’s own Microsoft Intune system to wipe thousands of devices, Cisco rolls an NVIDIA ASIC into an N9100... Read more »

Eric Chou, author of the AI Networking Cookbook and host of Network Automation Nerds, joins Ethan and Drew to discuss adding artificial intelligence to your network automation toolbox. The AI Networking Cookbook is aimed at network engineers and provides a systematic approach to learning AI for network automation. Together they break down pros and cons... Read more »

In this sponsored episode, Dylan Hensler, Customer Solutions Specialist with Statseeker, joins Scott for a breakdown of what allows Statseeker to move beyond traditional network monitoring. Together they discuss Statseeker’s ability to help NetOps teams detect issues faster, prove root cause, and operate with confidence by turning raw data into operational intelligence. They also discuss... Read more »

Today's topic is Multiprotocol Label Switching or MPLS, a foundational technology that powers service provider networks and enterprise WANs all over the world. To help us break it down, we've invited James Bensley, a Network Tech Lead who’s spent fifteen years with MPLS. James explains what spurred the creation of MPLS and how it works... Read more »

One of the early design principles of the Internet was end-to-end connectivity: that is, every device on the Internet would be publicly addressable, and every device could share its resources or provide services. That design principle wasn’t achieved with IPv4 for a variety of reasons (including address scarcity, and many network owners not wanting endpoints... Read more »

Building a Network Source of Truth (NSoT) is only step one in an automation effort — turning it into operational automation is where outcomes happen. In this sponsored episode by Network to Code, Eric Fetty, a self-taught network engineer who literally automated his way through his CCIE lab, shares how he's doing exactly that at... Read more »

Kyler and Ned sit down with Liz Fong-Jones, Technical Fellow at Honeycomb, to discuss the impact of AI on open-source contributions. Liz proposes shifting the script from code patch contributions to detailed bug reports. They also break down the distinction between programming and software engineering, and the critical role of OpenTelemetry in ensuring the observability... Read more »

In this sponsored episode, FluidCloud co-founders Sharad Kumar and Harshit Omar sit down with William and Eyvonne to discuss how FluidCloud tackles multi-cloud portability. They detail how FluidCloud acts as a cloning platform that scans an existing cloud or VMware environment, extracts complex infrastructure configurations (including compute and storage, as well as firewall rules and... Read more »

OpenIntent is an open-source, collaborative effort by network operators to develop a standard schema to describe the necessary information needed to deploy network equipment. Keith sits down with Jake Snyder, the developer behind OpenIntent. They discuss why he developed OpenIntent, the building blocks of the schema, and his vision for seamless Wi-Fi design interoperability. AdSpot... Read more »

On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »

Mav Turner, Chief Product Officer at Kentik, joins John Burke and Drew Conry-Murray for an in-depth conversation on the importance of deep visibility into enterprise networks. As networks grow more complex and stretch from on-prem and WAN to multi-cloud and edge locations, this sponsored discussion explores how good visibility supports everything from daily operations to... Read more »

Take a Network Break! We begin with listener follow-up on Cisco SD-WAN vulnerabilities and a report that Nvidia is investing billions to develop open-source AI models. In our Red Alert section we warn of multiple vulnerabilities in Veeam’s backup software for Windows and a couple of Chrome zero-days. We cover new features in Fortinet’s FortiOS... Read more »

Scott sits down for an in-depth conversation with Kireeti Kompella. Together they explore his impactful career and the evolution of modern networking. Kireeti, a key figure in protocol development, shares his journey from the Kernel Group at Juniper to leading work on fundamental technologies including his contributions to the C-chip patent. AdSpot Sponsor: Meter Meter... Read more »

One of the early promises of public cloud was that, in theory, you could move workloads from Cloud Provider A to Cloud Provider B for any number of reasons: lower costs, new capabilities, better uptime, and so on. In practice, once a workload goes into a public cloud and you build out all the other... Read more »

Kevin and Alexis take a break from their regular interviews to answer your questions! Join them for an unfiltered, wide-ranging discussion including the value of certifications, online learning pros and cons, how networking engineering jobs are changing, how to maintain a healthy work-life balance, and more. AdSpot Sponsor: Statseeker Statseeker gives engineers near real-time performance... Read more »

Wingpy is an open-source tool that aims to make it easier to automate network tasks that use Cisco APIs. Today Eric is joined by returning guest Andreas Baekdahl, the creator of Wingpy. They discuss why Andreas started Wingpy, how it can help streamline your workflows, and how you can start using it right away. They... Read more »

The tech industry is split between two fantasies – that AI writes production software while you get coffee, and that everything AI touches is slop. The reality is messier and more interesting: AI tools are force multipliers for people who already know what good looks like, and an expertise amplifier disguised as an easy button. ... Read more »

FluidCloud calls itself a cloud-cloning platform. In other words, the company can map and copy all the cloud infrastructure settings from one public cloud—including compute, storage, networking, and identity—and port those settings to a different public cloud. On today’s sponsored Day Two DevOps, Ned and Kyler talk with FluidCloud’s co-founders to understand how the platform... Read more »

At CES in January, NVIDIA, AMD, Siemens and others spun elaborate tales of a world suffused with AI: AI in the cloud, AI at the desktop, AI in the factory, AI underneath enterprise software and as the UI for enterprise software and agentically accomplishing anything and everything in a world of embodied, physical AI. Johna... Read more »

Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools... Read more »

Take a Network Break! Guest commentator Tom Hollingsworth joins Drew for today’s episode. We start with a double Red Alert from Cisco for its Secure FMC software. On the news front, Cato Networks adds adaptive threat prevention to its SASE offering that looks for seemingly innocuous signals that could add up to an attack, Google... Read more »

Today on the Tech Bytes podcast we hear from Statseeker, a network monitoring company that collects high-fidelity network data to help engineers and administrators get visibility into physical, virtual, and logical interfaces to find problems faster, understand root causes, and spot behaviors and anomalies so you can prevent problems instead of just reacting to them.... Read more »

Software Defined Networking (SDN) is a centralized architecture in which a controller, or a hierarchy of controllers, runs software that computes network-engineered paths and pushes that forwarding scheme into the network. It’s also very complex, which can lead to network failures. What if there was a way to keep the benefits of SDN while also... Read more »

Today's learning adventure is an overview of multicast. Ethan and Holly have invited a guest to share his multicast expertise: Lenny Giuliano, Sr. Distinguished Systems Engineer at HPE Juniper Networks. Lenny guides them through multicast principles and shares examples of where and how it’s used in live networks. He also explains how the OSPF routing... Read more »

If you’re looking for a network automation project but you’re worried about breaking stuff, why not build your automation adventure around IPv6? If your production traffic runs on IPv4, you can experiment with automated configurations and changes using IPv6 without negatively impacting that v4 traffic. You can get a two-for one experience learning both IPv6... Read more »

Engineers and developers are using AI like never before, including in production. That has potential consequences, both good and bad, for uptime, operations, security and risk management, and more. Today’s guest, Rich Mogull, guides us through the decision-making process of adding AI to your production lifecycle and possible ramifications. Rich is Chief Analyst at the... Read more »

Digi International has a whole lot of things that aren’t exactly in the Wi-Fi space, but are close enough to be of interest to WLAN engineers. Joining us today to talk about Digi International’s wireless tech, and what it means for wireless LAN pros, is Bob Blumenscheid. Bob discusses Digi’s offerings, including their XBee modules,... Read more »

Today we're going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We'll dive into... Read more »

Take a Network Break! We start with follow-up on the proper pronunciation of the US state of Nevada, and then sound the alarm about new research that gets around WiFi client isolation and could enable man-in-the-middle attacks. On the news front, AMD and Meta strike a massive deal in which AMD will sell its stock... Read more »

OT networks used to be air-gapped. These days, more and more OT networks are being bridged by IT networks, which exposes critical industrial controls and other systems to serious risk. On today's Tech Bytes, sponsored by Palo Alto Networks, we dig into how organizations can detect “precursor signals” that may indicate a broader attack chain,... Read more »

With the continued growth of data centers for clouds, neoclouds (especially AI model training), for carriers, and for the enterprise, it's important to discuss data center network operations and issues. Scott is joined by Dr. Peter Welcher, a consultant, blogger, and Tech Field contributor. Together, they dive into how latency and the rise of AI... Read more »

Our topic today is the designing and building of high-performance networking hardware. If you assume the hardware details don't matter, you're missing the intentional engineering required to build truly reliable and quiet infrastructure. In this sponsored episode, we discuss Meter's hardware philosophy with our guest, Joshua Markell, Head of Hardware at Meter. Joshua walks us... Read more »

Alexis and Kevin sit down with Mike Miller to discuss what brought him from the back of a garbage truck to his current position as a Virtual Chief Information Security Officer (VCISO). He breaks down how a VCISO differs from a CISO, and discusses the two types of clients looking for VCISO services: those looking... Read more »

William and Eyvonne tackle the biggest AI stories of early 2026. They dissect Matt Schumer’s viral “Something Big is Happening” essay – agreeing professionals need to skill up now while pushing back on the doomsday framing with real-world examples from engineering disciplines. The conversation takes a fascinating turn as Eyvonne draws a parallel between AI-assisted... Read more »

Eric sits down with David Henderson, Principal Architect for NetDevOps at Presidio, to discuss the practical journey for network engineers transitioning from manual CLI operations to scalable NetDevOps and automation. They discuss how traditional networking knowledge and certifications are foundational, and suggest essential tools and habits for beginning your automation journey. David also shares a... Read more »

On today's show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »

Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification, given the privileged access they typically have to IT systems and tools. Moreover, in this AI era, background checks need to be deeper and more effective than before–in the past we didn't need to verify... Read more »

Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »

Traditional routing protocols like OSPF simply choose the “shortest” path. If the shortest path is full of traffic and there are alternate paths carrying nothing, OSPF can't help you. Path Computation Element (PCE) along with Path Computation Element Protocol (PCEP) is a way to construct forwarding paths through the network based on factors that distributed... Read more »

Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It's likely that as a network engineer, you'll be managing, or at least dealing with, firewalls in your... Read more »

Ed, Nick, and Tom discuss the need for Network Address Translation v6 to v6 (NAT66). While Network Prefix Translation (NPTv6) exists, its limitations make it insufficient for real-world business needs. They also highlight that without a standardized NAT66, the market is forcing vendors to implement their own, hindering widespread IPv6 adoption. Episode Links: IPv6-to-IPv6 Network... Read more »

Kat Traxler, Principal Security Researcher at Vectra AI, returns to the podcast to discuss her AI-powered vulnerability research workflow. She explains how she uses two different AI models to act as the “blackboard” while she applies her expertise to triage AI-generated ideas to increase her productivity. She also asks a concerning question: As AI automates... Read more »

Adrian Granados joins Keith Parsons to discuss new iOS tools available for the WLAN Pi. These new tools extend a professional’s ability to run Wi-Fi scanning and analysis apps such a Wi-Fi Explorer Pi and Airtool Pi on iOS devices such as iPhones and iPads. Along with the small, portable WLAN Pi itself, these apps... Read more »