Inside Towers Managing Editor Jim Fryer shares the Ethernet with some of Telecom's key players in this Tower and Wireless Infrastructure News Podcast. Subscribe to the Inside Towers daily newsletter here: https://insidetowers.com/subscription/
…
continue reading
Let's Get Digital is your gateway to the innovators and ideas transforming the digital infrastructure industry. From wireless telecom to fiber networks and data centers, this podcast explores all things digital infrastructure—diving into the trends, technologies, and people shaping the future of connectivity. Hosted by Broadstaff CEO Carrie Charles, each episode features candid conversations with top industry leaders, uncovering the intersection of technology, talent, and transformation. Dis ...
…
continue reading
Join "The Technology Addicts" podcast by Avnet Abacus, a leading European distributor of cutting-edge tech products. Explore the exciting world of interconnect, passive, electromechanical, power supply, energy storage, wireless & sensor products and solutions with our inspiring interview guests.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Welcome to NEDAS Live! Where Wireline and Wireless Meet, the podcast where we address the communications infrastructure ecosystem, brought to you by NEDAS. Since 2010, NEDAS programs bring together industry thought leaders, cutting-edge technologies and end-user solutions shaping a new communications infrastructure landscape and enabling a more connected world. Your host is Ilissa Miller, President of NEDAS.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Join Jim Mancini, Mike Nusser, and Dionisio Roman on the Rooted in Innovation podcast, where we meet with Arborists, Developers, Municipalities Workers, and other industry experts each month to explore their best tips and practices, industry insights, and current projects. Sponsored by Tree Staple, we dig deep into the tree care and landscape development industries to get all the dirt on how these experts have successfully transformed both cities and forests. Whether you want to catch up on ...
…
continue reading
The growing connectivity of electric vehicles and their charging infrastructure opens new opportunities – and new vulnerabilities. This episode explores the rising threat of cyber-attacks on charging stations, the need for holistic system security, and why trust in digital infrastructure is essential for the success of e-mobility. For more expert a…
…
continue reading
For electromobility to become a true mainstream solution, charging needs to be simple, accessible, and built around the user. In this episode, we explore how better apps, open roaming, Plug & Charge, and secure payment systems can remove friction – and turn EVs into the most convenient mobility option for everyone. For more insights and technologie…
…
continue reading

1
Crosstown Vision: Mike Underdown on scaling Fiber in America cities
30:24
30:24
Play later
Play later
Lists
Like
Liked
30:24In this episode, Mike Underdown, Founder and CEO of Crosstown Fiber, shares his remarkable journey through the telecom industry — from pioneering CLECs to founding one of Chicago’s most unique underground fiber infrastructure companies. Mike discusses how Crosstown Fiber is building diverse, high-capacity fiber routes critical to data center interc…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading

1
#241 - Power & Tel: Telecom in Transition
21:43
21:43
Play later
Play later
Lists
Like
Liked
21:43Wireless, fiber, and data center markets are projected to grow in 2025 and in subsequent years. Nonetheless, these markets are encountering challenges due to the prevailing macroeconomic conditions. These factors collectively influence the telecom supply chain in both beneficial and adverse manners. Gus Vasilakis, VP of Canada Sales & Global Busine…
…
continue reading

1
Why parked EVs are key to future energy systems
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Electric vehicles can now feed power back into the grid – and that’s just the beginning. This episode looks at the rise of bidirectional charging, controllable infrastructure, and V2G systems that turn EVs into decentralised energy storage. It’s a look at how smart charging solutions are revolutionising the connection between mobility and energy. F…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading
Electric vehicles are going mainstream, with global consumer interest hitting a historic high. This episode examines the numbers behind the tipping point, the need for 65 million charging stations by 2035, and the technologies ensuring charging is as easy and reliable as fuelling. For more insights, projections, and infrastructure strategies, explo…
…
continue reading

1
How smart charging connects energy and mobility
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41Charging stations are evolving into intelligent energy hubs. This episode explores how integrated energy management, home systems, and bidirectional charging are linking the mobility and energy revolutions – and what it means for infrastructure, renewables, and the electricity grid. For more expert insights, forecasts, and technologies shaping the …
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading

1
Can Europe meet its 2035 EV goals with current infrastructure?
3:19
3:19
Play later
Play later
Lists
Like
Liked
3:19Electromobility is accelerating across Europe, creating urgent demand for scalable EV Charging infrastructure. This episode explores the rapid growth of the charging market, smart energy management, and the key technologies enabling it. For more data, insights, and innovations, explore the full EV Charging Special Edition of Focus Magazine. Downloa…
…
continue reading

1
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
…
continue reading

1
Bonus Episode: Cybersecurity Challenges Faced by Canadian Organizations
1:09:30
1:09:30
Play later
Play later
Lists
Like
Liked
1:09:30In this episode of the CDW Canada Tech Talks podcast, host KJ Burke discusses the findings of the 2025 CDW Canada Cybersecurity Study with cybersecurity experts Ivo Wiens and Ben Boi-Doku. They explore the evolving landscape of cybersecurity threats, the importance of continuous security testing and the challenges faced by small and medium business…
…
continue reading

1
#240 - Sitetracker - Beyond the Build: Managing Digital Infrastructure Efficiently
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35Building and managing digital infrastructure —whether it’s towers, fiber networks, or data centers—is a multifaceted challenge, requiring precise coordination across design, construction, and ongoing operations. Brant Carter, VP-Product at Sitetracker, discusses with John Celentano, Inside Towers Business Editor, overarching industry trends and how…
…
continue reading

1
Powering the AI Revolution: Zayo’s Bold Move to Lead the Future of Fiber and Digital Infrastructure
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46In this episode, Andrés Irlando, President and COO of Zayo Group, unpacks the transformative impact of Zayo’s acquisition of Crown Castle’s fiber assets and what it means for the future of digital infrastructure. From expanding Zayo’s metro reach and boosting AI corridor connectivity to bridging the digital divide and enabling edge computing, Andre…
…
continue reading

1
PP062: Hunting for Host Security and Performance Issues with Stratoshark
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
How to Launch a New Product in an Old-School Industry with Taron Young
40:21
40:21
Play later
Play later
Lists
Like
Liked
40:21What does it take to bring a brand-new building product to market and actually make it stick? In this episode, veteran market developer Taron Young shares insights from 20+ years in the construction and building materials industry. From code compliance to product education, distribution channels to holding spec, Taron breaks down what it really tak…
…
continue reading

1
Engineering the Future: AI, Automation and the Tech Powering Telecom's Next Chapter with Sean Shahini of Inorsa
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24In this episode, Sean Shahini, Founder and CEO of Inorsa, shares how his company is using automation, AI, and cloud-based tools to streamline telecom engineering. From reducing tower site design time from weeks to minutes to optimizing permitting processes, Sean offers a compelling vision for how innovation can remove bottlenecks and accelerate inf…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
Riding the Wireless Wave: Big Moves, Bold Priorities and The Power of Community with Patrick Halley of WIA
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49In this episode of Let’s Get Digital, host Carrie Charles sits down with Patrick Halley, President & CEO of the Wireless Infrastructure Association (WIA), to explore the bold moves and powerful community behind America’s wireless future. Patrick shares WIA’s mission to champion digital infrastructure and its deep roots in advocacy, workforce develo…
…
continue reading

1
PP058: Network Discovery with NMAP: You’ve Got Swaptions
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
…
continue reading

1
How Brightspeed is shaping America's Digital Future with Tom Maguire
34:37
34:37
Play later
Play later
Lists
Like
Liked
34:37In this episode of Let’s Get Digital, host Carrie Charles sits down with Tom Maguire, CEO of Brightspeed, to explore how the company has rapidly become the third-largest fiber builder in the U.S. Tom shares his inspiring journey from summer hire at New York Telephone to leading Brightspeed’s mission of connecting millions of homes with high-speed f…
…
continue reading

1
PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
…
continue reading

1
E58: Powering the Future of Digital Infrastructure: A Conversation on Advanced Battery Technology
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28In the latest episode of NEDAS Live!, host, and founder and CEO of iMiller Public Relations, Ilissa Miller welcomes Tod Higginbotham, COO of ZincFive and an expert in energy storage solutions and the former CEO of Powergenics. Episode #58 dives into the critical role that innovative battery technologies play in powering digital infrastructure today…
…
continue reading
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and... Read more »…
…
continue reading

1
E57: The Future of Communications: A Conversation with Joel Ogren
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19In this episode of NEDAS Live! podcast, you'll join host Ilissa Miller as she sits down with Joel Ogren, CEO and founder of Assured Communications, for a fascinating look at how communications infrastructure has evolved over his 40+ year career. You'll discover how the telecommunications landscape has transformed since Joel founded his company more…
…
continue reading

1
PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant …
…
continue reading

1
#239 - Myths Costing U.S. TowerCos Million (and How to Fix Them)
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14Digital twins have become a powerful tool for TowerCos - helping to uncover hidden revenue, reduce costs, and improve decision-making. But misconceptions about site data and operations are still costing TowerCos millions, according to vHive. In this episode, vHive’s CRO Itai Karelic joins Inside Towers' John Celentano to break down five costly myth…
…
continue reading

1
How Smart Agriculture is Making Farming Smarter, Greener, and More Profitable
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Farming is undergoing a quiet revolution – one powered by IoT, AI, and embedded technologies. In this episode of The Technology Addicts, we dive into the world of Smart Agriculture with Bevan Braude, Manager Vertical Markets at TRIA, formerly Avnet Embedded. From livestock trackers to autonomous tractors, connected solutions are reshaping modern fa…
…
continue reading

1
PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of ove…
…
continue reading

1
#238 - Towers & Withstanding the Test of Time with Congruex
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Although designed to last a long time, towers undergo continual loading changes as mobile network operators and wireless service providers add, upgrade or replace their transmission equipment. And towers must withstand constant changes in the weather. Mike Seymour, President and Bryan Lanier, Vice President-Operations at Congruex Wireless Solutions…
…
continue reading

1
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and.…
…
continue reading

1
PP052: The State of the Network Security Market In 2025
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Rea…
…
continue reading

1
Innovation as a Service: Rethinking Digital Solutions with Yazz Krdzalic of Equus
36:31
36:31
Play later
Play later
Lists
Like
Liked
36:31In this episode of Let's Get Digital, Carrie Charles interviews Yazz Krdzalic, Vice President of Market Development at Equus Compute Solutions (ECS). Yazz shares how ECS is transforming digital infrastructure with immersion cooling systems that maximize compute power and private 5G networks enabling seamless connectivity in remote areas. He highlig…
…
continue reading

1
#237 - Telecommunications Against Trafficking and Exploitation
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35Human trafficking involves the exploitation of men, women and children, for some sort of control or monetary gain. The Telecommunications Against Trafficking and Exploitation, or T.A.T.E., initiative offers guidelines for the many men and women who work in telecom to help prevent such exploitations by knowing what to look for and how to respond. As…
…
continue reading

1
PP051: Security Certifications From Beginner to Advanced
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan...…
…
continue reading

1
PP050: Understanding–and Protecting Yourself From–the Malware Economy
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and …
…
continue reading

1
#236 - Harmoni Towers - Colocating Tenants on Towers
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37Tower companies report an increase in colocation requests from MNOs and other wireless operators, more than for lease amendments on existing sites. Onboarding second or third tenants involves different considerations than hosting the anchor tenant. Harmoni Towers' CCO Chas Peterson and SVP of Business Development Aaron Bloom discuss these key coloc…
…
continue reading

1
Bandwidth Builders: The People & Stories Behind the Fiber Revolution with Dan Caruso
1:30:34
1:30:34
Play later
Play later
Lists
Like
Liked
1:30:34In this episode of Let’s Get Digital with Carrie Charles, we sit down with Dan Caruso, a powerhouse in telecommunications and digital infrastructure. Known as "The Bear" for his tenacity and drive, Dan is the visionary founder and former CEO of Zayo Group, where he led the company to a $14.3 billion exit. His unmatched track record includes co-foun…
…
continue reading

1
PP049: CSMM – A Practical Model for Improving Your Cloud Security
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity…
…
continue reading

1
From Data Centers to DeepSeek: Navigating the Future of Digital Infrastructure with Hunter Newby
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44In the premiere episode of Let’s Get Digital with Carrie Charles, we dive deep into the future of digital infrastructure with industry icon Hunter Newby of Newby Ventures. As a pioneer in carrier-neutral Meet-Me-Rooms, data centers, and network interconnection, Hunter shares his insights on the evolution of rural broadband, the BEAD funding impact,…
…
continue reading

1
From Permits to Infrastructure: The Unsung Work of Civil Engineers with Steve Parker
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52In this episode of Rooted in Innovation, we sit down with Steve Parker, a seasoned civil engineer with decades of experience in property development and infrastructure. Steve takes us through the unseen yet essential role civil engineers play in making our homes and communities function smoothly. From navigating permits and stormwater regulations t…
…
continue reading

1
PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More
39:08
39:08
Play later
Play later
Lists
Like
Liked
39:08JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »…
…
continue reading
In this episode, Martin Bazinet and Joseph Reele join KJ to discuss why data centres both private and public are growing at such a rapid rate. As we see the surge of demand how do large organizations keep pace with power and cooling demands and how can we translate that into guidance for our private data centres and our edge deployments? At scale h…
…
continue reading

1
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, parti…
…
continue reading

1
PP046: IPv6 Security, Migration, and Adoption
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about... Read more »…
…
continue reading

1
E56: Navigating Digital Infrastructure’s Next Frontier: A Conversation with Jonathan Hjembo, Senior Manager of Infrastructure Research at TeleGeography
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04Tune in for a conversation with Jonathan Hjembo, Senior Manager of Infrastructure Research at TeleGeography. The discussion explores the critical challenges and opportunities in the communications infrastructure ecosystem, particularly focusing on the unprecedented growth driven by AI deployment needs in 2024-2025. Jonathan explains TeleGeography's…
…
continue reading

1
PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our gues…
…
continue reading