Today we discuss how to secure your all-powerful root accounts on the three major public cloud providers: AWS, Azure, and GCP. Our guests today, Ned Bellavance and Kyler Middleton from the Day Two Cloud podcast (soon to be Day Two DevOps podcast), describe the struggle of securely managing several root accounts at once. They take... Read more »
Asking questions is a critical skill whether you’re an outside consultant or on an internal IT team. In today’s episode, Greg and Johna review what kind of questions to ask and how to ask them. They discuss the ‘Five Whys,’ identifying points of invariance, discovering unknown unknowns, and watching out for landmines. They also cover... Read more »
In part two of Scott Robohn’s interview, Scott tells us about his experience starting his own business and co-founding the Network Automation Forum and the AutoCon conference series. He describes the strong desire among many engineers to drive network automation forward, and how AutoCon creates a community to help make that happen. He and Eric... Read more »
Natural disaster responders, large event planners, and rural kids trying to do their homework all have something in common: they need a little extra help to get connected. COWs, COLTs, and WOWs can do just that. Mark Houtz joins Keith Parsons to explain how and why COW operators do what they do. First, he explains... Read more »
Drew and JJ have recovered from the overstimulation of the RSA expo floor and are ready to discuss their takeaways from the conference. They discuss the surprising emphasis on microsegmentation and storage backups, and the not-so-surprising focus on IoT security and AI-assisted products. They also pull back the curtain on what the conference’s own SOC... Read more »
All good things must come to an end, and in this case that means saying farewell to Kubernetes Unpacked. In this final episode, Michael and Kristina pack up the Kubernetes Unpacked podcast. They look back on covering issues including sustainability, security, open source projects, and certifications. They thank the professionals who joined the show as... Read more »
Welcome to a crossover episode with the Day Two Cloud podcast! Eric Chou was there for the birth of the public cloud. Before DevOps or SREs were a thing, before Azure was Azure, Eric was a network engineer for Amazon, helping them build out their retail technology platform. Of course, that platform evolved into the... Read more »
To be an effective technologist in a corporation, your efforts need to be aligned with the business strategy of your organization. In today’s episode, Johna and Greg show you how to do this, even if your organization has no written business strategy. They explain how to “read the tea leaves” to tell if your organization... Read more »
Matter is an IoT protocol that has security and interoperability baked into it. Steve Hanna, the chair of the Product Security Working Group in the Connectivity Standards Alliance, joins the show today to walk us through this IP-based protocol for smart home devices. He compares Matter to an armored car, delivering a valuable payload securely... Read more »
Scott Robohn is responsible for so much of the current buzz and awareness of network automation. Today, we sit down with the co-founder of Network Automation Forum to learn about his own journey. We chat about his education and the question of if college degrees are necessary. We also talk about his experience at big... Read more »
Tabletop security exercises can help organizations game out their response to a security incident. From the technical and business considerations to legal and PR implications, a tabletop exercise, like Dungeons and Dragons, lets you play-test attack and defense scenarios. Johna Till Johnson, CEO of Nemertes consulting firm and co-host of the Heavy Strategy podcast, joins... Read more »
A cardboard box with a circuit printed on it that harvests just enough power to activate a radio and have it chirp something out a short distance: that’s just one of the cool products and 802.11 standards that stood out at this year’s Wi-Fi World Congress USA. Drew Lentz joins the show to recap the... Read more »
Firing the wrong person, mistakenly rebooting core switches in a massive network, not passing the CCIE exam– today we talk all about failure. For this conversation, we’re joined by fellow Packet Pushers Kyler Middleton and Ned Bellavance, hosts of the Day Two Cloud podcast. We swap stories, discuss response and prevention, and talk about accountability,... Read more »
Kubernetes turns ten years old this summer. We take the opportunity to look at where it’s been and where it’s going. While many other open source projects folded over time, Kubernetes took the world by storm with the support of diverse entities including CNCF, Microsoft, AWS, Google, RedHat, and individual contributors. Moving forward, we predict... Read more »
Zero trust is a buzzword, but what does it actually mean and how will it impact network engineers? Jennifer is here to get us up to speed. First, she gives a general description: It’s a security architectural strategy that’s progressing toward increased observability and trust inferences. Then she breaks it down for the three main... Read more »
Don’t call it remote work. Today Johna and Greg dive into distributed work– the future where there is no office vs. remote, there are just asynchronistic workers and their computer screens. Leaders have to move beyond “management by walking around” or “onboarding by shadowing.” They need to carefully select their ecosystem of tools (and tools... Read more »
Curious about what it takes to write a technical book as a network engineer? You’re in luck. The team behind Nautobot is also the team behind the book “Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking.” Jason, Ken, and John tell us about their writing process, timeline,... Read more »
Have you ever noticed “threat hunting” in vendor products and wondered exactly what it means? James Williams is here to explain: Threat hunting is the R&D of detection engineering. A threat hunter imagines what an attacker might try and, critically, how that behavior would show up in the logs of a particular environment. Then the... Read more »
Evaluating wireless use cases at a nuclear power plant is a little bit different than your average industrial job, starting with the stripdown to put on plant-provided clothing. Ferney Munoz joins us today to talk about his experience working as a wireless consultant at nuclear power plants. Obviously, radiation interference is a heightened issue, as... Read more »
Kristina attended KubeCon EU in March and she’s still trying to process it all. In today’s episode, Michael interviews her about what stood out most to her. They dive into the conference’s heavy emphasis on AI, particularly how Kubernetes can help with more efficient GPU utilization. Kristina also reports back on the United Nations hackathon... Read more »