Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Health & Fitness
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/02/0a/b5/020ab5fc-1a5b-3841-adfc-75d4e7e8de4b/mza_5791319916606868037.jpg/600x600bb.jpg
Packet Protector
Packet Pushers
85 episodes
4 days ago
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
Show more...
Technology
Business,
Careers
RSS
All content for Packet Protector is the property of Packet Pushers and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
Show more...
Technology
Business,
Careers
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/02/0a/b5/020ab5fc-1a5b-3841-adfc-75d4e7e8de4b/mza_5791319916606868037.jpg/600x600bb.jpg
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
Packet Protector
44 minutes 3 seconds
1 week ago
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understand how... Read more »
Packet Protector
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »