Discover
SDNTECH: Networking, Cloud, and IoT
SDNTECH: Networking, Cloud, and IoT
Author: sdntechforum
Subscribed: 2Played: 11Subscribe
Share
© Copyright 2024 All rights reserved.
Description
Human-curated AI podcast for a lightweight technology discussion.
I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
30 Episodes
Reverse
Are your executives tuning out during security briefings? In this episode of the SDN Tech Networking Podcast — the world's first human-curated AI podcast — we take a deep dive into the world of cybersecurity architecture and do something most technical podcasts don't: we make it actually understandable for everyone in the room.
Pulling from insights shared at the SDN Tech Forum, we unpack:
🔐 The Communication Chasm – Why cybersecurity jargon alienates leadership and kills budget requests — and how powerful analogies (submarines, corrupt mailmen, hotel room numbers) can fix it
💾 The Three States of Data – Data at rest, in flight, and in use — and exactly how attackers target each one
🛑 Real-World Exploits Explained – Heartbleed, buffer overflows, SQL injection, SYN flooding, MITM attacks, and IoT RAM exhaustion — broken down clearly
🧱 Defensive Architecture – VPNs, Tor, Layer 3/5/7 firewalls, ASLR, and next-gen platforms from Cisco, Fortinet, and Palo Alto
✅ CERT's Top 10 Secure Coding Practices – The developer blueprint for building resilient systems
🤖 A Provocative Final Thought – What happens when we blindly trust AI to write and audit our security code?
Whether you're a CISO prepping for a board meeting, an IT architect, or just security-curious, this episode gives you the frameworks to speak cybersecurity fluently — without losing your audience.
🔔 Subscribe for weekly deep dives on networking, infrastructure, and technology strategy.
📌 Resources mentioned: SDN Tech Forum | CERT Top 10 Secure Coding Practices | OpenSSL (Heartbleed) | ASLR | BitLocker | Tor Project
#Cybersecurity #NetworkSecurity #CyberAwareness #InfoSec #DataProtection #CyberThreats #TechPodcast #SDNTech #ZeroTrust #Firewall #VPN #Encryption #CyberRisk #CISO #SecureCoding #Ransomware #Malware #DataBreach #IoTSecurity #TechLeadership #CybersecurityForAll #DigitalSecurity #Heartbleed #SQLInjection #TorNetwork
Everyone’s talking about smarter AI.
The MCP conversation made me realize something uncomfortable:
our biggest AI problems aren’t intelligence problems — they’re coordination problems.
MCP isn’t flashy. It doesn’t promise smarter models or autonomous agents taking over workflows. What it does instead is make context explicit, shareable, and boring.
That might sound small. It isn’t.
Most AI failures today don’t come from models being “dumb.” They come from systems misunderstanding each other, leaking assumptions, or silently losing context.
MCP treats interoperability as a UX problem, not a governance problem — and that framing might be the most important idea in modern AI infrastructure.
The future of AI may belong less to whoever builds the smartest model…
and more to whoever builds the calmest systems around them.
Question worth asking:
As models get smarter, will our real bottleneck be intelligence — or agreement?
Traditional Ethernet networks are collapsing under the insane demands of modern AI workloads—and the problem isn't speed, it's latency. In this episode of SDN Tech Networking Podcast, we break down the three seismic shifts happening in data center infrastructure right now.
#DataCenter #AI #ArtificialIntelligence #Networking #CloudComputing #InfiniBand
#GPUComputing #DeepLearning #MachineLearning #TechInfrastructure
Passwords are fading into the past — and passkeys are leading the charge toward safer, simpler logins. In this episode, we explore how passkeys work, why they’re more secure than traditional passwords, and what challenges users might face when transitioning across devices and ecosystems.
You’ll learn about:
How private and public keys pair to verify your identity
The role of biometrics and device-level security
How companies like Apple and Google are synchronizing passkeys
Current limitations and the future of interoperability
If you’ve wondered what makes passkeys different, how to set them up, and when they’ll finally replace passwords, this episode is for you.
Ever wondered how hyperscale data centers like Microsoft’s run their networks with unmatched flexibility and control? Meet Sonic (Software for Open Networking in the Cloud)—the open-source network operating system (NOS) that’s revolutionizing modern networking by breaking free from vendor lock-in and monolithic systems.
In this deep-dive breakdown, we explore:
✅ Why Sonic? – Born from Microsoft’s need to manage global-scale data centers, now an Open Compute Project (OCP) standard.
✅ The Architecture – How containerization (Docker) isolates network functions (BGP, LLDP, SNMP) for fault tolerance and modularity.
✅ The Brain: Redis DB – The single source of truth synchronizing config, app, and state databases in real-time.
✅ Hardware Abstraction (SAI & SyncD) – How Sonic decouples software from hardware, letting you run the same OS on different ASICs without rewriting code.
✅ Automation-First Design – Why CLI is for troubleshooting, but JSON/config files rule provisioning at scale.
✅ Customizing the ASIC Pipeline – How P4 profiles let you tune hardware resources (L2/L3 tables, VXLAN, MPLS) for leaf/spine roles.
Whether you’re a network engineer transitioning from traditional NOS or a cloud architect deploying hyperscale networks, this video gives you the conceptual blueprint of Sonic—without drowning in CLI commands.
🔗 Dive into the docs: Open Compute Project – SONiC
💡 Next Steps: Explore pipeline resource management and SAI deep dives to master Sonic’s full potential.
In this episode we explore the evolution of identity security, moving beyond traditional Multi-Factor Authentication (MFA) to embrace a full-stack Identity and Access Management (IAM) platform powered by Duo. Learn how Cisco Identity Intelligence (CII) provides crucial, multi-sourced, vendor-agnostic security insights across your entire digital ecosystem, including identity providers like Okta, Azure AD, and cloud platforms like AWS and GitHub.
#IdentitySecurity #DuoSecurity #CiscoIdentityIntelligence #ITDR #ISPM #ZeroTrust #Cybersecurity #MFA #IAM #HybridCloud
Are you wrestling with enterprise network complexity? Advanced features like traffic engineering, ultra-fast failover, and network slicing often mean piling on complex protocols. This podcast episode dives deep into Segment Routing over IPv6 (SRv6), a technology that promises to deliver these advanced capabilities while radically simplifying your network.
Join us as we cut through the hype to explore how SRv6 works, moving intelligence to the network edge and making the core stateless. We unpack key concepts like segments, SIDs, and network programming, and explain how SRv6 eliminates legacy protocols like LDP and RSVP-TE. Discover how SRv6 enables powerful services, from network slicing with Flex Algo to sub-50ms protection with TI-LFA, and even allows for user-defined functions that integrate with P4 and Kubernete
This episode takes a deep dive into Cisco Workflows and introduces Cisco's advanced multi-domain automation and orchestration engine, a powerful tool designed to eliminate repetitive tasks and streamline complex IT operations across diverse environments. Cisco Workflows offers an intuitive drag-and-drop interface for creating automated processes, supporting integration with a wide array of Cisco controllers and third-party tools, including Meraki, Catalyst Center, Cisco ISE, Webex, ThousandEyes, ACI, Nexus Dashboard, Intersight, Ansible, Terraform, and any system with a REST API or SSH adapter.
#CiscoWorkflows #Automation #Orchestration #MultiDomainAutomation #ITOps #NetworkAutomation #AI #LLM #Python #Webhooks #DigitalTransformation #Cisco #Meraki #Security #WorkflowAutomation #EnterpriseIT
Think blockchain is just about Bitcoin and crypto? Think again. In this deep dive, we go far beyond the fluctuating prices to explore the true power and potential of this revolutionary technology. We'll demystify key concepts like distributed ledgers, consensus mechanisms, and smart contracts. Discover how blockchain is tackling real-world challenges in everything from AI and supply chains to securing digital art and enabling a new era of data ownership with Web3. We'll also unpack complex topics like privacy, the rise of NFTs, and the future of central bank digital currencies. Join us as we unpack, analyze, and distill the essential insights you need to truly understand blockchain's role in our decentralized future.
#Blockchain #Crypto #Web3 #Decentralized #SmartContracts #NFTs #Bitcoin #Ethereum #FutureTech #sdntechforum
This episode delves into the intricate world of machine communication protocols, explaining how different parts of vehicles and machinery "speak" to each other. It begins by exploring the foundational Controller Area Network (CAN bus), highlighting its role as a "nervous system" for Electronic Control Units (ECUs) and its benefits such as simplified wiring, single-point diagnostics, and robustness. The episode also demystifies various higher-layer protocols built upon the CAN framework, including OBD2 for car diagnostics using Parameter IDs (PIDs), UDS (Unified Diagnostic Services) for deeper OEM-level access and firmware updates, J1939 for heavy-duty vehicles utilising Parameter Group Numbers (PGNs) and Suspect Parameter Numbers (SPNs), NMEA 2000 for maritime communication, and ISOBUS for agricultural machinery interoperability. Finally, the podcast addresses the crucial process of decoding raw hexadecimal data using DBC files (CAN database files), which act as a "Rosetta Stone" to convert cryptic values into meaningful physical units, underscoring the profound impact of understanding this hidden data on reliability, performance, and security across various industries like OEM R&D, fleet telematics, and smart agriculture.
Dive into the quantum revolution and its seismic impact on cybersecurity. This episode unpacks how quantum computing threatens to shatter modern encryption (like RSA and ECC) with algorithms like Shor’s and Grover’s. Discover the cutting-edge solutions—Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)—already being deployed by industry giants like Apple, NIST, and the NSA. Learn why "harvest now, decrypt later" is a critical threat today, explore real-world implementations (e.g., PQC in iOS, QKD in IPsec VPNs), and peek into the future of quantum machine learning and the quantum internet. Whether you’re a cybersecurity pro or a tech enthusiast, this episode will equip you to understand and prepare for the quantum era.
Key Takeaways:
Why quantum computers could crack today’s encryption by 2040.
How PQC and QKD work (and why they’re not magic bullets).
Practical steps to secure data against quantum threats now.
The future of quantum-safe AI and networks.
Dive into the intricate world of internet layers and discover how they form the backbone of global connectivity. This podcast episode explores the fundamental layers of the internet, from DNS and IP addresses to TCP and routing, shedding light on the protocols and processes that enable seamless communication across the globe. Join us as we unravel the complexities of the digital landscape and gain a deeper understanding of the technology that powers our online experiences.
In this exciting episode,we dive into the groundbreaking world of quantum computing! We explore how it stands apart from classical computation, especially through the lens of randomness. Discover the fundamental components of quantum computing—qubits, superposition, and entanglement—and learn how they open doors to extraordinary computational possibilities. We’ll also examine powerful quantum algorithms like Shor's algorithm, which redefines cryptography, and delve into the realms of molecular simulation and optimization. Along the way, we'll discuss the implications for quantum security and the hurdles that lie ahead in building robust quantum computers. Join us as we demystify this transformative technology, highlighting its core principles, potential applications, and the current state of development for a curious audience ready to glimpse the future!
#QuantumComputing #QKD #QuantumSecurity #SecureCommunication #Technology #Innovation #Podcast #Networking #SDNTechForum #FutureofTechnology
Join us as we delve into nearly two decades of data breach trends and analysis from the renowned Verizon Data Breach Investigations Report (DBIR). Each episode, we'll unpack key findings, explore evolving cyber threats, and extract valuable lessons for security professionals and business leaders looking to understand and mitigate the risks of data compromise. Learn from real-world case studies and statistical insights to strengthen your organization's security posture.
Join us for an engaging episode where we dive deep into eXtended Detection and Response (XDR) and its transformative role in the cybersecurity landscape. Our discussion highlights how XDR effectively tackles critical challenges like alert fatigue, tool integration, and adapting to increasingly complex cyber threats. With insights from industry experts, we explore the definition of XDR, its key functionalities, benefits, and the potential challenges it may face.
Discover Cisco's innovative approach to XDR, emphasizing its integration and automation capabilities to strengthen security operations. This episode reveals how XDR is not just a trend, but a vital solution that addresses long-standing issues in threat response and enhances the overall effectiveness of cybersecurity strategies. Tune in to learn how XDR is revolutionizing the way organizations protect themselves against cyber threats!
Get the lowdown on Precision Time Protocol (PTP) and why it's crucial for network engineers. Discover how PTP achieves nanosecond-level accuracy, its applications in finance, telecommunications, and more.
#PTP #IEEE1588 #NetworkEngineering #TimeSynchronization #PrecisionTiming #Telecom #FinTech #Industry40 #Tech #sdntechforum #sdntech #podcast
Agentic AI represents a significant advancement in artificial intelligence, focusing on creating autonomous agents capable of performing complex tasks, making decisions, and interacting with their environment. This podcast explores the key concepts, architectures, applications, and future directions of Agentic AI, providing insights into its potential to revolutionize various industries. Learn about the different types of agents, their key components, and the ethical considerations surrounding their development and deployment.
#AgenticAI #AI #ArtificialIntelligence #LLMs #Automation #FutureofWork #Innovation #Tech #MachineLearning #DeepLearning #AIagents #RAG #PromptEngineering #BusinessTransformation #EthicalAI #ResponsibleAI #sdntechforum #podcast
In this episode, We discuss the MITRE ATT&CK framework, a crucial resource for understanding and mitigating cyber threats. Learn how attackers operate, from reconnaissance to impact, and discover the techniques they use at each stage. Gain insights into defending against real-world attacks and building robust security strategies.
#sdntechforum #cybersecurity #cyberattacks #threatintelligence #MITREATT&CK #tactics #techniques #defence #securitystrategy #riskmitigation #threatmodelling
Improve your organization's security posture with Cisco Secure Access! Cisco Secure Access safeguards users, data, and devices as they securely connect to the internet, SaaS applications, and all private apps from both on-site and remote locations.
This comprehensive guide delves into key features such as Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Remote Browser Isolation (RBI), Auto Tunnels, and more.
#Cisco #CiscoSecurity #ZTNA #SWG #RBI #Cybersecurity #CloudSecurity #sdntechforum
In this episode, we explore software-defined segmentation and how it aligns with Zero trust.


















